Source: YKri2nEBWE.exe, 00000000.00000003.2255321255.0000000005EDD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: YKri2nEBWE.exe, 00000000.00000003.2255321255.0000000005EDD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: YKri2nEBWE.exe, 00000000.00000003.2255321255.0000000005EDD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: YKri2nEBWE.exe, 00000000.00000003.2255321255.0000000005EDD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: YKri2nEBWE.exe, 00000000.00000003.2255321255.0000000005EDD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: YKri2nEBWE.exe, 00000000.00000003.2255321255.0000000005EDD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: YKri2nEBWE.exe, 00000000.00000003.2255321255.0000000005EDD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: YKri2nEBWE.exe, 00000000.00000003.2255321255.0000000005EDD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: YKri2nEBWE.exe, 00000000.00000003.2255321255.0000000005EDD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: YKri2nEBWE.exe, 00000000.00000003.2283078885.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2282746044.000000000159C000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2283719723.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2284073141.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2309668421.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000002.2368577753.00000000015B8000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2286941764.00000000015A7000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2287405344.00000000015AA000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2327042056.00000000015A7000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2366814829.00000000015B5000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174533511.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2326949332.000000000159E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2283078885.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2282746044.000000000159C000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2283719723.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2284073141.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2309668421.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000002.2368577753.00000000015B8000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2286941764.00000000015A7000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2287405344.00000000015AA000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2327042056.00000000015A7000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2366814829.00000000015B5000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.000000000152C000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174533511.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2326949332.000000000159E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2327042056.00000000015A7000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2366814829.00000000015B5000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.000000000152C000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174533511.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2326949332.000000000159E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: YKri2nEBWE.exe, 00000000.00000003.2255321255.0000000005EDD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: YKri2nEBWE.exe, 00000000.00000003.2255321255.0000000005EDD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: YKri2nEBWE.exe, 00000000.00000003.2176974679.0000000005E20000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2177049592.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2177131102.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.000000000152C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg |
Source: YKri2nEBWE.exe, 00000000.00000003.2176974679.0000000005E20000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2177049592.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2177131102.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: YKri2nEBWE.exe, 00000000.00000003.2176974679.0000000005E20000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2177049592.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2177131102.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: YKri2nEBWE.exe, 00000000.00000003.2176974679.0000000005E20000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2177049592.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2177131102.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: YKri2nEBWE.exe, 00000000.00000003.2283078885.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2282746044.000000000159C000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2283719723.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2284073141.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2286941764.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.= |
Source: YKri2nEBWE.exe, 00000000.00000003.2174829287.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly |
Source: YKri2nEBWE.exe, 00000000.00000003.2283078885.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2282746044.000000000159C000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2283719723.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2284073141.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2286941764.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamb |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174829287.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstat# |
Source: YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatiS |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174829287.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.cc |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174829287.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com |
Source: YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.000000000152C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174829287.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/g |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap& |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174829287.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=E |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng |
Source: YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.000000000152C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.000000000152B000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174533511.00000000015BC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.000000000152C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.000000000152C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.000000000152C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=FRRi |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=s |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174829287.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTR |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174829287.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174829287.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportec |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=oOCAGrkRfpQ6&l=e |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?C |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174829287.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&am |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174829287.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174829287.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.j3 |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174829287.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatics |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174829287.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.y |
Source: YKri2nEBWE.exe, 00000000.00000003.2176974679.0000000005E20000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2177049592.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2177131102.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: YKri2nEBWE.exe, 00000000.00000003.2176974679.0000000005E20000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2177049592.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2177131102.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: YKri2nEBWE.exe, 00000000.00000003.2176974679.0000000005E20000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2177049592.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2177131102.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2287052008.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2282630199.0000000005DF0000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2327042056.00000000015CE000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2366999109.00000000015CE000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000002.2368272162.0000000001532000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2282746044.00000000015CE000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000002.2368499776.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2284073141.00000000015CE000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000002.2368621513.00000000015CE000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2283684889.0000000005DF0000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174849256.0000000001571000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2283078885.00000000015CE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/0 |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001564000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/W |
Source: YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2326949332.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174829287.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174829287.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apiB |
Source: YKri2nEBWE.exe, 00000000.00000002.2368272162.0000000001529000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apiS |
Source: YKri2nEBWE.exe, 00000000.00000002.2368577753.00000000015B8000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2327042056.00000000015A7000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2366814829.00000000015B5000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2326949332.000000000159E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apil |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174849256.0000000001571000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apimC |
Source: YKri2nEBWE.exe, 00000000.00000003.2327042056.00000000015CE000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2366999109.00000000015CE000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000002.2368621513.00000000015CE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apis |
Source: YKri2nEBWE.exe, 00000000.00000002.2368577753.00000000015B8000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2366814829.00000000015B5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apix |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2366999109.00000000015CE000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000002.2368621513.00000000015CE000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174849256.0000000001571000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/pi |
Source: YKri2nEBWE.exe, 00000000.00000003.2366999109.00000000015CE000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000002.2368621513.00000000015CE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/piNXxr& |
Source: YKri2nEBWE.exe, 00000000.00000003.2327042056.00000000015CE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/t |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001564000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174849256.0000000001571000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/uo0 |
Source: YKri2nEBWE.exe, 00000000.00000003.2326949332.000000000155D000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2282746044.00000000015CE000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2283078885.00000000015CE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com:443/api |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001532000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151486923.0000000001571000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174829287.00000000015A7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.000000000152B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilte |
Source: YKri2nEBWE.exe, 00000000.00000003.2283078885.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2282746044.000000000159C000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2283719723.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2284073141.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2309668421.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000002.2368577753.00000000015B8000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2286941764.00000000015A7000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2287405344.00000000015AA000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2327042056.00000000015A7000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2366814829.00000000015B5000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174533511.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2326949332.000000000159E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.0000000001532000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.0000000001532000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900 |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.000000000152C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges |
Source: YKri2nEBWE.exe, 00000000.00000003.2174597834.000000000152B000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174533511.00000000015BC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2283078885.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2282746044.000000000159C000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2283719723.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2284073141.000000000159E000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2309668421.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000002.2368577753.00000000015B8000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2286941764.00000000015A7000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2287405344.00000000015AA000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2327042056.00000000015A7000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2366814829.00000000015B5000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2151309651.000000000152C000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2174533511.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2326949332.000000000159E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2257083014.00000000060FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: YKri2nEBWE.exe, 00000000.00000003.2257083014.00000000060FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: YKri2nEBWE.exe, 00000000.00000003.2176974679.0000000005E20000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2177049592.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2177131102.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: YKri2nEBWE.exe, 00000000.00000003.2176974679.0000000005E20000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2177049592.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp, YKri2nEBWE.exe, 00000000.00000003.2177131102.0000000005E1D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: YKri2nEBWE.exe, 00000000.00000003.2257083014.00000000060FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc |
Source: YKri2nEBWE.exe, 00000000.00000003.2257083014.00000000060FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6 |
Source: YKri2nEBWE.exe, 00000000.00000003.2257083014.00000000060FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: YKri2nEBWE.exe, 00000000.00000003.2257083014.00000000060FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: YKri2nEBWE.exe, 00000000.00000003.2257083014.00000000060FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg |
Source: YKri2nEBWE.exe, 00000000.00000003.2257083014.00000000060FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: YKri2nEBWE.exe, 00000000.00000003.2151287475.00000000015AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E1273C second address: E1274D instructions: 0x00000000 rdtsc 0x00000002 jo 00007FCA18DB50E6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E1274D second address: E1275E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jne 00007FCA18C4F696h 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E128A4 second address: E128AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E12D41 second address: E12D46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E12D46 second address: E12D4C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E12D4C second address: E12D50 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E12EE6 second address: E12EF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jnl 00007FCA18DB50E6h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E148B4 second address: E1494B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FCA18C4F6A2h 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c pushad 0x0000000d mov dword ptr [ebp+122D1F5Bh], ebx 0x00000013 mov dword ptr [ebp+122D1F5Bh], edi 0x00000019 popad 0x0000001a push 00000000h 0x0000001c jmp 00007FCA18C4F69Dh 0x00000021 push 97BBF7BFh 0x00000026 ja 00007FCA18C4F6A0h 0x0000002c add dword ptr [esp], 684408C1h 0x00000033 xor ecx, dword ptr [ebp+122D318Ch] 0x00000039 mov edx, dword ptr [ebp+122D3936h] 0x0000003f push 00000003h 0x00000041 mov ecx, ebx 0x00000043 push 00000000h 0x00000045 push 00000000h 0x00000047 push eax 0x00000048 call 00007FCA18C4F698h 0x0000004d pop eax 0x0000004e mov dword ptr [esp+04h], eax 0x00000052 add dword ptr [esp+04h], 00000014h 0x0000005a inc eax 0x0000005b push eax 0x0000005c ret 0x0000005d pop eax 0x0000005e ret 0x0000005f push 00000003h 0x00000061 add dword ptr [ebp+122D1E3Ah], ebx 0x00000067 push 8A0E2394h 0x0000006c push ebx 0x0000006d pushad 0x0000006e ja 00007FCA18C4F696h 0x00000074 push eax 0x00000075 push edx 0x00000076 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E1494B second address: E1498E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 add dword ptr [esp], 35F1DC6Ch 0x0000000d mov dword ptr [ebp+122D1C71h], edi 0x00000013 lea ebx, dword ptr [ebp+1244F78Bh] 0x00000019 push 00000000h 0x0000001b push ecx 0x0000001c call 00007FCA18DB50E8h 0x00000021 pop ecx 0x00000022 mov dword ptr [esp+04h], ecx 0x00000026 add dword ptr [esp+04h], 00000015h 0x0000002e inc ecx 0x0000002f push ecx 0x00000030 ret 0x00000031 pop ecx 0x00000032 ret 0x00000033 mov dx, si 0x00000036 push eax 0x00000037 push esi 0x00000038 je 00007FCA18DB50ECh 0x0000003e push eax 0x0000003f push edx 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E149D8 second address: E149F6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push edi 0x0000000e pop edi 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E14AEB second address: E14B0A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50F2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E14B58 second address: E14B5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E14B5E second address: E14BBF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 mov ecx, dword ptr [ebp+122D1D81h] 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push ebp 0x00000014 call 00007FCA18DB50E8h 0x00000019 pop ebp 0x0000001a mov dword ptr [esp+04h], ebp 0x0000001e add dword ptr [esp+04h], 0000001Dh 0x00000026 inc ebp 0x00000027 push ebp 0x00000028 ret 0x00000029 pop ebp 0x0000002a ret 0x0000002b mov edx, dword ptr [ebp+122D3B2Ah] 0x00000031 mov dword ptr [ebp+122D37A5h], edi 0x00000037 call 00007FCA18DB50E9h 0x0000003c jmp 00007FCA18DB50EBh 0x00000041 push eax 0x00000042 push eax 0x00000043 push edx 0x00000044 jns 00007FCA18DB50E8h 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E14BBF second address: E14BC5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E14BC5 second address: E14C05 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c push edi 0x0000000d jmp 00007FCA18DB50F6h 0x00000012 pop edi 0x00000013 mov eax, dword ptr [eax] 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FCA18DB50F8h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E14C05 second address: E14C0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E14C0B second address: E14C24 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FCA18DB50EBh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E14C24 second address: E14C29 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E14C29 second address: E14C7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pop eax 0x00000008 push 00000003h 0x0000000a push 00000000h 0x0000000c push esi 0x0000000d call 00007FCA18DB50E8h 0x00000012 pop esi 0x00000013 mov dword ptr [esp+04h], esi 0x00000017 add dword ptr [esp+04h], 00000017h 0x0000001f inc esi 0x00000020 push esi 0x00000021 ret 0x00000022 pop esi 0x00000023 ret 0x00000024 push 00000000h 0x00000026 sub dword ptr [ebp+122D1E66h], ebx 0x0000002c clc 0x0000002d push 00000003h 0x0000002f adc si, 779Ch 0x00000034 jmp 00007FCA18DB50ECh 0x00000039 push E6B39F79h 0x0000003e push ecx 0x0000003f push eax 0x00000040 push edx 0x00000041 je 00007FCA18DB50E6h 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E14C7C second address: E14C80 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: DFC8DA second address: DFC8FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCA18DB50EFh 0x00000009 popad 0x0000000a ja 00007FCA18DB50EEh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: DFC8FC second address: DFC901 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: DFC901 second address: DFC925 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FCA18DB50E6h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e pushad 0x0000000f push esi 0x00000010 pop esi 0x00000011 jo 00007FCA18DB50E6h 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FCA18DB50EAh 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E34B55 second address: E34B71 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FCA18C4F696h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jl 00007FCA18C4F69Eh 0x00000010 jl 00007FCA18C4F696h 0x00000016 pushad 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E353EC second address: E353F2 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E353F2 second address: E3540B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007FCA18C4F69Fh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E3554B second address: E35567 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50F8h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E35567 second address: E3557E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FCA18C4F69Eh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E356F5 second address: E35705 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jnl 00007FCA18DB50E6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E35705 second address: E3570F instructions: 0x00000000 rdtsc 0x00000002 jng 00007FCA18C4F696h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E35B4C second address: E35B52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E35B52 second address: E35B56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E35B56 second address: E35B5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E35B5A second address: E35B65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E35B65 second address: E35B6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E360EE second address: E3611E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007FCA18C4F6A9h 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FCA18C4F69Fh 0x00000010 push edx 0x00000011 pop edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: DFC8F6 second address: DFC8FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E363D5 second address: E3640E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a pushad 0x0000000b popad 0x0000000c pop esi 0x0000000d pop ecx 0x0000000e jg 00007FCA18C4F6C8h 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FCA18C4F6A5h 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E01804 second address: E01808 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E01808 second address: E01814 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E01814 second address: E01818 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E01818 second address: E0181E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E3A385 second address: E3A39E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCA18DB50F5h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E09F99 second address: E09FB4 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FCA18C4F6A2h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E09FB4 second address: E09FB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E41D91 second address: E41D97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E41D97 second address: E41D9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E42079 second address: E4209B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FCA18C4F6A8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E42470 second address: E42476 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E42476 second address: E42486 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FCA18C4F696h 0x00000008 jnc 00007FCA18C4F696h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E42486 second address: E42490 instructions: 0x00000000 rdtsc 0x00000002 js 00007FCA18DB50ECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E42490 second address: E424AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007FCA18C4F6A2h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E42625 second address: E4262B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4262B second address: E42631 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E42631 second address: E42644 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push edx 0x0000000a pop edx 0x0000000b jng 00007FCA18DB50E6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4559F second address: E455EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push edx 0x00000008 jl 00007FCA18C4F696h 0x0000000e pop edx 0x0000000f popad 0x00000010 push eax 0x00000011 jns 00007FCA18C4F6A2h 0x00000017 mov eax, dword ptr [esp+04h] 0x0000001b jmp 00007FCA18C4F6A6h 0x00000020 mov eax, dword ptr [eax] 0x00000022 push eax 0x00000023 push edx 0x00000024 jng 00007FCA18C4F69Ch 0x0000002a jg 00007FCA18C4F696h 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E455EC second address: E45630 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50ECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d push edi 0x0000000e js 00007FCA18DB50ECh 0x00000014 ja 00007FCA18DB50E6h 0x0000001a pop edi 0x0000001b pop eax 0x0000001c xor edi, 24686CEFh 0x00000022 jmp 00007FCA18DB50ECh 0x00000027 push 030E6A92h 0x0000002c push eax 0x0000002d push edx 0x0000002e push edi 0x0000002f jnl 00007FCA18DB50E6h 0x00000035 pop edi 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E459F8 second address: E459FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E459FC second address: E45A06 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E45A06 second address: E45A29 instructions: 0x00000000 rdtsc 0x00000002 je 00007FCA18C4F696h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d jmp 00007FCA18C4F6A3h 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E45B26 second address: E45B2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E461A0 second address: E461A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E46361 second address: E46365 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E46365 second address: E46380 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FCA18C4F6A2h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E46406 second address: E4640A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4640A second address: E46414 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E46414 second address: E46418 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E464DC second address: E464E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E464E1 second address: E464E6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E464E6 second address: E464F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FCA18C4F696h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E464F9 second address: E464FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4674B second address: E46759 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E46759 second address: E4675D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4776E second address: E47773 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E47773 second address: E47817 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jmp 00007FCA18DB50F5h 0x0000000d nop 0x0000000e push 00000000h 0x00000010 push edx 0x00000011 call 00007FCA18DB50E8h 0x00000016 pop edx 0x00000017 mov dword ptr [esp+04h], edx 0x0000001b add dword ptr [esp+04h], 0000001Dh 0x00000023 inc edx 0x00000024 push edx 0x00000025 ret 0x00000026 pop edx 0x00000027 ret 0x00000028 push eax 0x00000029 jbe 00007FCA18DB50ECh 0x0000002f sub dword ptr [ebp+122D1E6Eh], ecx 0x00000035 pop edi 0x00000036 push 00000000h 0x00000038 push 00000000h 0x0000003a push ecx 0x0000003b call 00007FCA18DB50E8h 0x00000040 pop ecx 0x00000041 mov dword ptr [esp+04h], ecx 0x00000045 add dword ptr [esp+04h], 00000015h 0x0000004d inc ecx 0x0000004e push ecx 0x0000004f ret 0x00000050 pop ecx 0x00000051 ret 0x00000052 call 00007FCA18DB50EEh 0x00000057 mov esi, eax 0x00000059 pop esi 0x0000005a mov dword ptr [ebp+122D29E4h], ecx 0x00000060 mov dword ptr [ebp+122D1F3Ah], esi 0x00000066 push 00000000h 0x00000068 cld 0x00000069 mov esi, dword ptr [ebp+122D3A4Ah] 0x0000006f xchg eax, ebx 0x00000070 push eax 0x00000071 push edx 0x00000072 jmp 00007FCA18DB50EBh 0x00000077 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E49F17 second address: E49FA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FCA18C4F6A2h 0x0000000b jng 00007FCA18C4F696h 0x00000011 popad 0x00000012 popad 0x00000013 mov dword ptr [esp], eax 0x00000016 push 00000000h 0x00000018 push ecx 0x00000019 call 00007FCA18C4F698h 0x0000001e pop ecx 0x0000001f mov dword ptr [esp+04h], ecx 0x00000023 add dword ptr [esp+04h], 00000015h 0x0000002b inc ecx 0x0000002c push ecx 0x0000002d ret 0x0000002e pop ecx 0x0000002f ret 0x00000030 jmp 00007FCA18C4F6A2h 0x00000035 push 00000000h 0x00000037 sub dword ptr [ebp+1244A725h], ecx 0x0000003d push 00000000h 0x0000003f push 00000000h 0x00000041 push ebp 0x00000042 call 00007FCA18C4F698h 0x00000047 pop ebp 0x00000048 mov dword ptr [esp+04h], ebp 0x0000004c add dword ptr [esp+04h], 00000018h 0x00000054 inc ebp 0x00000055 push ebp 0x00000056 ret 0x00000057 pop ebp 0x00000058 ret 0x00000059 mov esi, dword ptr [ebp+12451C24h] 0x0000005f xchg eax, ebx 0x00000060 push eax 0x00000061 push edx 0x00000062 jnp 00007FCA18C4F69Ch 0x00000068 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E49C91 second address: E49C97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E49FA8 second address: E49FAE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E49FAE second address: E49FBC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E49FBC second address: E49FC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E49FC1 second address: E49FC7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4A958 second address: E4A95E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4BCF3 second address: E4BD09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCA18DB50F2h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4C784 second address: E4C79F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCA18C4F6A6h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4E8CA second address: E4E94C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50EEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push ecx 0x0000000e call 00007FCA18DB50E8h 0x00000013 pop ecx 0x00000014 mov dword ptr [esp+04h], ecx 0x00000018 add dword ptr [esp+04h], 00000015h 0x00000020 inc ecx 0x00000021 push ecx 0x00000022 ret 0x00000023 pop ecx 0x00000024 ret 0x00000025 push esi 0x00000026 movzx ebx, ax 0x00000029 pop edi 0x0000002a push 00000000h 0x0000002c push 00000000h 0x0000002e push edx 0x0000002f call 00007FCA18DB50E8h 0x00000034 pop edx 0x00000035 mov dword ptr [esp+04h], edx 0x00000039 add dword ptr [esp+04h], 0000001Ah 0x00000041 inc edx 0x00000042 push edx 0x00000043 ret 0x00000044 pop edx 0x00000045 ret 0x00000046 sub ebx, dword ptr [ebp+122D399Ah] 0x0000004c mov edi, eax 0x0000004e push 00000000h 0x00000050 mov ebx, dword ptr [ebp+124728F2h] 0x00000056 xchg eax, esi 0x00000057 jnc 00007FCA18DB50F1h 0x0000005d push eax 0x0000005e push eax 0x0000005f push edx 0x00000060 push ebx 0x00000061 push eax 0x00000062 push edx 0x00000063 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4C79F second address: E4C7BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCA18C4F6A7h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4E94C second address: E4E951 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4DAE8 second address: E4DAEC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4C7BA second address: E4C7E3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50F8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 js 00007FCA18DB50E6h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4E951 second address: E4E957 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4C7E3 second address: E4C7F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50F0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4E957 second address: E4E95B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4F86A second address: E4F874 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FCA18DB50E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4F874 second address: E4F8C8 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FCA18C4F69Ch 0x00000008 je 00007FCA18C4F696h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov dword ptr [esp], eax 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push ebp 0x00000018 call 00007FCA18C4F698h 0x0000001d pop ebp 0x0000001e mov dword ptr [esp+04h], ebp 0x00000022 add dword ptr [esp+04h], 0000001Dh 0x0000002a inc ebp 0x0000002b push ebp 0x0000002c ret 0x0000002d pop ebp 0x0000002e ret 0x0000002f and ebx, dword ptr [ebp+122D2F94h] 0x00000035 push 00000000h 0x00000037 mov bl, 99h 0x00000039 xchg eax, esi 0x0000003a jmp 00007FCA18C4F69Ah 0x0000003f push eax 0x00000040 pushad 0x00000041 push ecx 0x00000042 push eax 0x00000043 push edx 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4F8C8 second address: E4F8D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5098C second address: E50996 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007FCA18C4F696h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E518EA second address: E518EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E51A70 second address: E51A76 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E52A06 second address: E52A22 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50EDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edi 0x0000000b pushad 0x0000000c jns 00007FCA18DB50E6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E537F8 second address: E53823 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007FCA18C4F6A0h 0x00000012 push esi 0x00000013 pop esi 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E51A76 second address: E51A7A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E52A22 second address: E52AA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 nop 0x00000007 mov dword ptr [ebp+12452010h], edi 0x0000000d push dword ptr fs:[00000000h] 0x00000014 push 00000000h 0x00000016 push eax 0x00000017 call 00007FCA18C4F698h 0x0000001c pop eax 0x0000001d mov dword ptr [esp+04h], eax 0x00000021 add dword ptr [esp+04h], 0000001Ch 0x00000029 inc eax 0x0000002a push eax 0x0000002b ret 0x0000002c pop eax 0x0000002d ret 0x0000002e jmp 00007FCA18C4F6A6h 0x00000033 jmp 00007FCA18C4F69Ah 0x00000038 mov dword ptr fs:[00000000h], esp 0x0000003f mov di, si 0x00000042 mov eax, dword ptr [ebp+122D0F59h] 0x00000048 mov dword ptr [ebp+12451AE3h], esi 0x0000004e push FFFFFFFFh 0x00000050 mov di, cx 0x00000053 nop 0x00000054 push eax 0x00000055 push edx 0x00000056 jnp 00007FCA18C4F698h 0x0000005c pushad 0x0000005d popad 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E53823 second address: E538CA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50F6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push edx 0x0000000d call 00007FCA18DB50E8h 0x00000012 pop edx 0x00000013 mov dword ptr [esp+04h], edx 0x00000017 add dword ptr [esp+04h], 0000001Dh 0x0000001f inc edx 0x00000020 push edx 0x00000021 ret 0x00000022 pop edx 0x00000023 ret 0x00000024 cmc 0x00000025 push 00000000h 0x00000027 push 00000000h 0x00000029 push ecx 0x0000002a call 00007FCA18DB50E8h 0x0000002f pop ecx 0x00000030 mov dword ptr [esp+04h], ecx 0x00000034 add dword ptr [esp+04h], 00000014h 0x0000003c inc ecx 0x0000003d push ecx 0x0000003e ret 0x0000003f pop ecx 0x00000040 ret 0x00000041 mov dword ptr [ebp+12451961h], ebx 0x00000047 push 00000000h 0x00000049 push 00000000h 0x0000004b push eax 0x0000004c call 00007FCA18DB50E8h 0x00000051 pop eax 0x00000052 mov dword ptr [esp+04h], eax 0x00000056 add dword ptr [esp+04h], 0000001Ah 0x0000005e inc eax 0x0000005f push eax 0x00000060 ret 0x00000061 pop eax 0x00000062 ret 0x00000063 mov dword ptr [ebp+122D2CEAh], edx 0x00000069 jmp 00007FCA18DB50EEh 0x0000006e push eax 0x0000006f pushad 0x00000070 push eax 0x00000071 push edx 0x00000072 jbe 00007FCA18DB50E6h 0x00000078 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E51A7A second address: E51B16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push ebp 0x0000000c call 00007FCA18C4F698h 0x00000011 pop ebp 0x00000012 mov dword ptr [esp+04h], ebp 0x00000016 add dword ptr [esp+04h], 0000001Dh 0x0000001e inc ebp 0x0000001f push ebp 0x00000020 ret 0x00000021 pop ebp 0x00000022 ret 0x00000023 mov edi, 50439899h 0x00000028 push dword ptr fs:[00000000h] 0x0000002f movzx ebx, bx 0x00000032 jmp 00007FCA18C4F6A2h 0x00000037 mov dword ptr fs:[00000000h], esp 0x0000003e mov edi, dword ptr [ebp+122D2F94h] 0x00000044 mov eax, dword ptr [ebp+122D0A99h] 0x0000004a add ebx, dword ptr [ebp+12450836h] 0x00000050 push FFFFFFFFh 0x00000052 push 00000000h 0x00000054 push edx 0x00000055 call 00007FCA18C4F698h 0x0000005a pop edx 0x0000005b mov dword ptr [esp+04h], edx 0x0000005f add dword ptr [esp+04h], 00000019h 0x00000067 inc edx 0x00000068 push edx 0x00000069 ret 0x0000006a pop edx 0x0000006b ret 0x0000006c xor dword ptr [ebp+122D3657h], edx 0x00000072 mov ebx, 4B8DC713h 0x00000077 nop 0x00000078 pushad 0x00000079 push eax 0x0000007a push edx 0x0000007b push eax 0x0000007c pop eax 0x0000007d rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E538CA second address: E538CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E51B16 second address: E51B1A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E51B1A second address: E51B23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E548C5 second address: E548CA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E548CA second address: E54912 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FCA18DB50E6h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp], eax 0x00000010 mov ebx, edi 0x00000012 push 00000000h 0x00000014 mov bx, ax 0x00000017 mov di, cx 0x0000001a push 00000000h 0x0000001c push 00000000h 0x0000001e push esi 0x0000001f call 00007FCA18DB50E8h 0x00000024 pop esi 0x00000025 mov dword ptr [esp+04h], esi 0x00000029 add dword ptr [esp+04h], 0000001Ah 0x00000031 inc esi 0x00000032 push esi 0x00000033 ret 0x00000034 pop esi 0x00000035 ret 0x00000036 add di, 5011h 0x0000003b xchg eax, esi 0x0000003c pushad 0x0000003d push edi 0x0000003e push eax 0x0000003f push edx 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E53A51 second address: E53A56 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E53AF4 second address: E53AF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5591E second address: E55922 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E57A3E second address: E57A59 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50F7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E57A59 second address: E57A5F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E58A71 second address: E58A9E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 mov bh, 57h 0x0000000b push 00000000h 0x0000000d or edi, dword ptr [ebp+122D3816h] 0x00000013 push 00000000h 0x00000015 or ebx, 36E94D1Dh 0x0000001b mov dword ptr [ebp+124525A9h], eax 0x00000021 push eax 0x00000022 jbe 00007FCA18DB50F0h 0x00000028 pushad 0x00000029 pushad 0x0000002a popad 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5AB93 second address: E5AB9D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FCA18C4F696h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5AB9D second address: E5ABCA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50F6h 0x00000007 jmp 00007FCA18DB50ECh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push esi 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E032B9 second address: E032BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5B214 second address: E5B28C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FCA18DB50F5h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp], eax 0x00000010 cmc 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push edx 0x00000016 call 00007FCA18DB50E8h 0x0000001b pop edx 0x0000001c mov dword ptr [esp+04h], edx 0x00000020 add dword ptr [esp+04h], 0000001Ch 0x00000028 inc edx 0x00000029 push edx 0x0000002a ret 0x0000002b pop edx 0x0000002c ret 0x0000002d jmp 00007FCA18DB50F7h 0x00000032 jg 00007FCA18DB50ECh 0x00000038 push 00000000h 0x0000003a mov dword ptr [ebp+122D30FFh], ebx 0x00000040 push eax 0x00000041 push edi 0x00000042 push eax 0x00000043 push edx 0x00000044 push esi 0x00000045 pop esi 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E58BBF second address: E58BC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E56C61 second address: E56C66 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E55ADB second address: E55ADF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5C1BC second address: E5C1C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5B406 second address: E5B40B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5B40B second address: E5B410 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5B410 second address: E5B424 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jbe 00007FCA18C4F6A4h 0x00000010 push eax 0x00000011 push edx 0x00000012 push esi 0x00000013 pop esi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5B424 second address: E5B428 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5D1B3 second address: E5D1D6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d jl 00007FCA18C4F696h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5C2E5 second address: E5C2EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5C2EA second address: E5C308 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ecx 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5C308 second address: E5C30E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5C3E0 second address: E5C3E4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5E08B second address: E5E08F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5D430 second address: E5D44C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FCA18C4F6A3h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5D44C second address: E5D450 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E5E223 second address: E5E227 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E67621 second address: E67627 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E67627 second address: E6762B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E66DCE second address: E66DD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E66DD2 second address: E66E32 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jmp 00007FCA18C4F6A4h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jnl 00007FCA18C4F698h 0x00000011 pop esi 0x00000012 je 00007FCA18C4F6D3h 0x00000018 jnl 00007FCA18C4F6B1h 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007FCA18C4F6A4h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E670F2 second address: E670F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E670F6 second address: E67101 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E67101 second address: E6711D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCA18DB50F5h 0x00000009 push eax 0x0000000a pop eax 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E71360 second address: E7138A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCA18C4F69Fh 0x00000009 jmp 00007FCA18C4F6A6h 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E71A62 second address: E71A7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCA18DB50F7h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E71A7D second address: E71A9F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jp 00007FCA18C4F696h 0x0000000d push edx 0x0000000e pop edx 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 jmp 00007FCA18C4F69Dh 0x00000017 push esi 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E71C34 second address: E71C5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 jmp 00007FCA18DB50F8h 0x0000000b jnp 00007FCA18DB50E6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E71EDC second address: E71EE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E71EE2 second address: E71EEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 push edx 0x00000009 pop edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E71EEC second address: E71EF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E721E6 second address: E721EB instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E721EB second address: E721FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a jnl 00007FCA18C4F696h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E7237E second address: E7239B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FCA18DB50EAh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jp 00007FCA18DB50E6h 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E7239B second address: E7239F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E7239F second address: E723A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E724CA second address: E724D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCA18C4F69Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E724D8 second address: E724F8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50F5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push edx 0x0000000b pop edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E724F8 second address: E724FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E724FE second address: E72514 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FCA18DB50EDh 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E75213 second address: E7521D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E7521D second address: E75223 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E75223 second address: E75227 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E796F0 second address: E796F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E796F4 second address: E79709 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FCA18C4F696h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FCA18C4F69Bh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E79709 second address: E79710 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E79895 second address: E7989C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E7989C second address: E798A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E79E6E second address: E79E9E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 popad 0x00000008 jmp 00007FCA18C4F6A1h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FCA18C4F6A3h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E79E9E second address: E79EAA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 je 00007FCA18DB50E6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E7A187 second address: E7A1C0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a jng 00007FCA18C4F6A7h 0x00000010 push eax 0x00000011 push edx 0x00000012 jbe 00007FCA18C4F696h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E7A1C0 second address: E7A1C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E7A317 second address: E7A322 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jp 00007FCA18C4F696h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E82919 second address: E8291D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E8291D second address: E82937 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FCA18C4F6A4h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E82937 second address: E8293C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E82ACA second address: E82ACE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E82ACE second address: E82AD4 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E82424 second address: E82445 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A8h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E82445 second address: E8246A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop ebx 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a jne 00007FCA18DB50FBh 0x00000010 jmp 00007FCA18DB50EFh 0x00000015 ja 00007FCA18DB50E6h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E8246A second address: E8249C instructions: 0x00000000 rdtsc 0x00000002 jno 00007FCA18C4F6A2h 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b jmp 00007FCA18C4F6A9h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E831EC second address: E831FC instructions: 0x00000000 rdtsc 0x00000002 jp 00007FCA18DB50E6h 0x00000008 jnp 00007FCA18DB50E6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E831FC second address: E83213 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnl 00007FCA18C4F696h 0x00000009 je 00007FCA18C4F696h 0x0000000f jg 00007FCA18C4F696h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E83213 second address: E8321C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E834D8 second address: E834E2 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FCA18C4F6A2h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E834E2 second address: E834E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4424C second address: E44250 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E44250 second address: E44254 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E44796 second address: E4479A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4479A second address: E4479E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4479E second address: E447C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jnp 00007FCA18C4F6B5h 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FCA18C4F6A3h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E44D6A second address: E44DE1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50EEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push eax 0x00000010 call 00007FCA18DB50E8h 0x00000015 pop eax 0x00000016 mov dword ptr [esp+04h], eax 0x0000001a add dword ptr [esp+04h], 0000001Ch 0x00000022 inc eax 0x00000023 push eax 0x00000024 ret 0x00000025 pop eax 0x00000026 ret 0x00000027 mov dword ptr [ebp+122D3810h], esi 0x0000002d mov ch, 65h 0x0000002f push 0000001Eh 0x00000031 push 00000000h 0x00000033 push esi 0x00000034 call 00007FCA18DB50E8h 0x00000039 pop esi 0x0000003a mov dword ptr [esp+04h], esi 0x0000003e add dword ptr [esp+04h], 00000018h 0x00000046 inc esi 0x00000047 push esi 0x00000048 ret 0x00000049 pop esi 0x0000004a ret 0x0000004b jc 00007FCA18DB50ECh 0x00000051 and edx, 296EE0DAh 0x00000057 push eax 0x00000058 push eax 0x00000059 push edx 0x0000005a push edx 0x0000005b pushad 0x0000005c popad 0x0000005d pop edx 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E45076 second address: E4509E instructions: 0x00000000 rdtsc 0x00000002 jl 00007FCA18C4F696h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f jmp 00007FCA18C4F6A2h 0x00000014 mov eax, dword ptr [eax] 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4509E second address: E450A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E450A3 second address: E450A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E450A9 second address: E450AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4511D second address: E45122 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E45122 second address: E4512C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007FCA18DB50E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4512C second address: E451A5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F69Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d pushad 0x0000000e jg 00007FCA18C4F696h 0x00000014 jmp 00007FCA18C4F6A1h 0x00000019 popad 0x0000001a push ecx 0x0000001b jmp 00007FCA18C4F6A2h 0x00000020 pop ecx 0x00000021 popad 0x00000022 nop 0x00000023 mov dword ptr [ebp+122D1F3Ah], ecx 0x00000029 lea eax, dword ptr [ebp+1247EBE4h] 0x0000002f push 00000000h 0x00000031 push edi 0x00000032 call 00007FCA18C4F698h 0x00000037 pop edi 0x00000038 mov dword ptr [esp+04h], edi 0x0000003c add dword ptr [esp+04h], 00000015h 0x00000044 inc edi 0x00000045 push edi 0x00000046 ret 0x00000047 pop edi 0x00000048 ret 0x00000049 xor dword ptr [ebp+122D1DCCh], eax 0x0000004f nop 0x00000050 push ecx 0x00000051 push ebx 0x00000052 push eax 0x00000053 push edx 0x00000054 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E451A5 second address: E4522C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 pushad 0x00000008 jmp 00007FCA18DB50F4h 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 pop eax 0x00000012 popad 0x00000013 popad 0x00000014 nop 0x00000015 push 00000000h 0x00000017 push ecx 0x00000018 call 00007FCA18DB50E8h 0x0000001d pop ecx 0x0000001e mov dword ptr [esp+04h], ecx 0x00000022 add dword ptr [esp+04h], 0000001Bh 0x0000002a inc ecx 0x0000002b push ecx 0x0000002c ret 0x0000002d pop ecx 0x0000002e ret 0x0000002f mov dword ptr [ebp+122D1D81h], ecx 0x00000035 lea eax, dword ptr [ebp+1247EBA0h] 0x0000003b push 00000000h 0x0000003d push ebx 0x0000003e call 00007FCA18DB50E8h 0x00000043 pop ebx 0x00000044 mov dword ptr [esp+04h], ebx 0x00000048 add dword ptr [esp+04h], 0000001Bh 0x00000050 inc ebx 0x00000051 push ebx 0x00000052 ret 0x00000053 pop ebx 0x00000054 ret 0x00000055 mov edi, dword ptr [ebp+122D3B22h] 0x0000005b push eax 0x0000005c push eax 0x0000005d push edx 0x0000005e je 00007FCA18DB50E8h 0x00000064 push edi 0x00000065 pop edi 0x00000066 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E4522C second address: E45241 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FCA18C4F6A0h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E87196 second address: E871B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCA18DB50F9h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E876FC second address: E87700 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E87700 second address: E8770C instructions: 0x00000000 rdtsc 0x00000002 ja 00007FCA18DB50E6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E8770C second address: E87724 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FCA18C4F69Bh 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop ebx 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E8789F second address: E878A5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E8E59D second address: E8E5B0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F69Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E8E861 second address: E8E891 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FCA18DB50F8h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push esi 0x0000000c push edx 0x0000000d pop edx 0x0000000e ja 00007FCA18DB50E6h 0x00000014 pop esi 0x00000015 popad 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 push edi 0x0000001a pop edi 0x0000001b push ebx 0x0000001c pop ebx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E8E891 second address: E8E8AB instructions: 0x00000000 rdtsc 0x00000002 jp 00007FCA18C4F696h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FCA18C4F69Ch 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E8E8AB second address: E8E8AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E8EA17 second address: E8EA2C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A1h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E8EA2C second address: E8EA32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E8EA32 second address: E8EA37 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E8EA37 second address: E8EA67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FCA18DB50E6h 0x0000000a popad 0x0000000b js 00007FCA18DB50E8h 0x00000011 push eax 0x00000012 pop eax 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 jmp 00007FCA18DB50EDh 0x0000001d pushad 0x0000001e popad 0x0000001f push ebx 0x00000020 pop ebx 0x00000021 popad 0x00000022 pushad 0x00000023 push esi 0x00000024 pop esi 0x00000025 push esi 0x00000026 pop esi 0x00000027 popad 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E95465 second address: E95481 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A4h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E9408A second address: E940A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCA18DB50F4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E940A2 second address: E940BE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007FCA18C4F6A1h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E940BE second address: E940C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E9420E second address: E94213 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E94213 second address: E94219 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E94219 second address: E9422C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCA18C4F69Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E944CB second address: E944F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jc 00007FCA18DB5104h 0x0000000d jmp 00007FCA18DB50F8h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E944F2 second address: E944FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FCA18C4F698h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E944FE second address: E9450C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 jg 00007FCA18DB50ECh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E44B73 second address: E44B79 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E44B79 second address: E44B7F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E44B7F second address: E44B83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E44B83 second address: E44BDF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50F3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e pushad 0x0000000f mov dl, 9Bh 0x00000011 mov edi, dword ptr [ebp+122D1D5Eh] 0x00000017 popad 0x00000018 mov ebx, dword ptr [ebp+1247EBDFh] 0x0000001e mov edx, dword ptr [ebp+122D39E6h] 0x00000024 jmp 00007FCA18DB50EDh 0x00000029 add eax, ebx 0x0000002b mov cx, di 0x0000002e nop 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007FCA18DB50F5h 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E44BDF second address: E44C00 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E94640 second address: E94644 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E94644 second address: E9464A instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E9516D second address: E95175 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E9895A second address: E9897D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FCA18C4F696h 0x0000000a jmp 00007FCA18C4F6A9h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E9897D second address: E98988 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E98C62 second address: E98C6E instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FCA18C4F696h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E98C6E second address: E98C75 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E9C39D second address: E9C3B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCA18C4F6A2h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E9C3B3 second address: E9C3B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E9C3B7 second address: E9C3D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FCA18C4F6A0h 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E9C80C second address: E9C829 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCA18DB50F9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E9CC1D second address: E9CC21 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EA453A second address: EA453E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EA453E second address: EA4561 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 pushad 0x00000008 jmp 00007FCA18C4F6A7h 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EA308B second address: EA30A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push eax 0x00000007 pop eax 0x00000008 pop eax 0x00000009 push edx 0x0000000a jbe 00007FCA18DB50E6h 0x00000010 pop edx 0x00000011 popad 0x00000012 jng 00007FCA18DB50F6h 0x00000018 push eax 0x00000019 push edx 0x0000001a push edx 0x0000001b pop edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EA30A9 second address: EA30AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EA3649 second address: EA365C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCA18DB50EBh 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EA365C second address: EA3669 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FCA18C4F696h 0x0000000a push edx 0x0000000b pop edx 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EA3F5C second address: EA3F64 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EA3F64 second address: EA3F68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EA3F68 second address: EA3F71 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EA3F71 second address: EA3F7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EA3F7F second address: EA3F89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FCA18DB50E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EA4253 second address: EA4257 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EA4257 second address: EA425B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EA425B second address: EA4267 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FCA18C4F696h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EA4267 second address: EA426C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EAC987 second address: EAC99B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FCA18C4F696h 0x0000000a je 00007FCA18C4F696h 0x00000010 popad 0x00000011 push ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EACAF3 second address: EACAFC instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EACF06 second address: EACF1D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F69Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c pop eax 0x0000000d push edi 0x0000000e pop edi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EACF1D second address: EACF21 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EAD2C8 second address: EAD2EB instructions: 0x00000000 rdtsc 0x00000002 jc 00007FCA18C4F696h 0x00000008 jmp 00007FCA18C4F6A9h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EAD2EB second address: EAD311 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FCA18DB50EEh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d push edx 0x0000000e pop edx 0x0000000f jmp 00007FCA18DB50EFh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EAD311 second address: EAD31F instructions: 0x00000000 rdtsc 0x00000002 jne 00007FCA18C4F696h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EB4B5A second address: EB4B60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EB4B60 second address: EB4B6A instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FCA18C4F696h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EB4D29 second address: EB4D2E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EB4D2E second address: EB4D34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EB527A second address: EB5280 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EB5280 second address: EB5286 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EB5286 second address: EB52A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 jmp 00007FCA18DB50EFh 0x0000000d jc 00007FCA18DB50E6h 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EB52A4 second address: EB52A9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EB52A9 second address: EB52B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EB5463 second address: EB5469 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EB5898 second address: EB58B8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007FCA18DB50F5h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EB58B8 second address: EB58C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EB45FC second address: EB461D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jmp 00007FCA18DB50F8h 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EB461D second address: EB4623 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EB4623 second address: EB464D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50F7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 js 00007FCA18DB50E6h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EBA853 second address: EBA86B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EBA86B second address: EBA871 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EBA871 second address: EBA890 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 jmp 00007FCA18C4F69Ah 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 jmp 00007FCA18C4F69Ah 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EBA890 second address: EBA894 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EBA894 second address: EBA89A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EBA89A second address: EBA8A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EBA8A3 second address: EBA8B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jo 00007FCA18C4F696h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E0D625 second address: E0D636 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 js 00007FCA18DB50E6h 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EBD5EA second address: EBD61A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FCA18C4F696h 0x0000000a je 00007FCA18C4F696h 0x00000010 push edx 0x00000011 pop edx 0x00000012 popad 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 jmp 00007FCA18C4F6A9h 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EBD77E second address: EBD78A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EBD78A second address: EBD7AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnp 00007FCA18C4F6B0h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: ECA6FF second address: ECA704 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: ECE3A2 second address: ECE3B8 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FCA18C4F69Eh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: ECE0C1 second address: ECE0CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FCA18DB50E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: ED4E6B second address: ED4E7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 jmp 00007FCA18C4F69Ah 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E0833D second address: E08378 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50EDh 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FCA18DB50F3h 0x0000000e jmp 00007FCA18DB50F7h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: E08378 second address: E08393 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jo 00007FCA18C4F6BCh 0x0000000e jng 00007FCA18C4F698h 0x00000014 pushad 0x00000015 popad 0x00000016 pushad 0x00000017 push esi 0x00000018 pop esi 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EDD887 second address: EDD8A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCA18DB50EFh 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pushad 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EDD8A2 second address: EDD8A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EDD8A7 second address: EDD8B9 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FCA18DB50ECh 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EE14EC second address: EE14F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EE14F2 second address: EE14F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EE14F6 second address: EE14FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EE648B second address: EE648F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EE648F second address: EE6493 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EE6BD6 second address: EE6BF7 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FCA18DB50E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FCA18DB50F7h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EE6BF7 second address: EE6BFC instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EE6BFC second address: EE6C0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FCA18DB50E6h 0x0000000a pop ecx 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EEB176 second address: EEB182 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FCA18C4F696h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: EEB182 second address: EEB195 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop eax 0x00000008 ja 00007FCA18DB50F0h 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F08A12 second address: F08A1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FCA18C4F696h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F08A1C second address: F08A20 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F08A20 second address: F08A26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F08A26 second address: F08A2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F08A2F second address: F08A37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F08879 second address: F0887D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F0887D second address: F08883 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F08883 second address: F088A2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50F5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F088A2 second address: F088A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F088A6 second address: F088AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F088AA second address: F088BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jl 00007FCA18C4F698h 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F0A796 second address: F0A7AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FCA18DB50F1h 0x00000009 pop ebx 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F0A7AF second address: F0A7B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F0A7B8 second address: F0A7BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F0D8B7 second address: F0D8BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F0D8BB second address: F0D8C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F0D8C6 second address: F0D8D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FCA18C4F696h 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jnp 00007FCA18C4F696h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F0D8D9 second address: F0D8E3 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FCA18DB50E6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F21DA8 second address: F21DAE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F21DAE second address: F21DB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F21DB8 second address: F21DBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F20C3C second address: F20C44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F20C44 second address: F20C5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 pushad 0x00000008 jmp 00007FCA18C4F69Ah 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 push esi 0x00000012 pop esi 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F20C5C second address: F20C6B instructions: 0x00000000 rdtsc 0x00000002 ja 00007FCA18DB50E6h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F20DBC second address: F20DCE instructions: 0x00000000 rdtsc 0x00000002 jng 00007FCA18C4F698h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F20DCE second address: F20DD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F20DD2 second address: F20DD6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F20DD6 second address: F20DDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F21070 second address: F21078 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F21078 second address: F21098 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 ja 00007FCA18DB50E6h 0x0000000c popad 0x0000000d pop eax 0x0000000e push edi 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FCA18DB50EDh 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F2178D second address: F217A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jnl 00007FCA18C4F696h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push eax 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F217A1 second address: F217A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F218BA second address: F218C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F218C0 second address: F218C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F218C4 second address: F218E2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F69Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ecx 0x0000000a jne 00007FCA18C4F6B0h 0x00000010 push eax 0x00000011 push edx 0x00000012 push edx 0x00000013 pop edx 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F23513 second address: F23519 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F23519 second address: F2351D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F2351D second address: F23521 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F275F3 second address: F27609 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F276CB second address: F276F0 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FCA18DB50F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jl 00007FCA18DB50F0h 0x00000011 push eax 0x00000012 push edx 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F278A1 second address: F278ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 mov dword ptr [esp], eax 0x00000008 push 00000000h 0x0000000a push edi 0x0000000b call 00007FCA18C4F698h 0x00000010 pop edi 0x00000011 mov dword ptr [esp+04h], edi 0x00000015 add dword ptr [esp+04h], 00000018h 0x0000001d inc edi 0x0000001e push edi 0x0000001f ret 0x00000020 pop edi 0x00000021 ret 0x00000022 clc 0x00000023 push 00000004h 0x00000025 jl 00007FCA18C4F6A2h 0x0000002b js 00007FCA18C4F69Ch 0x00000031 sub edx, 474FCA12h 0x00000037 push E5288972h 0x0000003c push eax 0x0000003d push edx 0x0000003e jno 00007FCA18C4F698h 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F278ED second address: F278F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F278F3 second address: F278F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F29051 second address: F29057 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: F2B02F second address: F2B035 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54705FD second address: 5470641 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, ebp 0x00000008 jmp 00007FCA18DB50EEh 0x0000000d push eax 0x0000000e pushad 0x0000000f push ebx 0x00000010 mov al, 26h 0x00000012 pop edx 0x00000013 jmp 00007FCA18DB50F6h 0x00000018 popad 0x00000019 xchg eax, ebp 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d call 00007FCA18DB50ECh 0x00000022 pop eax 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470641 second address: 54706FB instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FCA18C4F69Bh 0x00000008 and si, 355Eh 0x0000000d jmp 00007FCA18C4F6A9h 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 jmp 00007FCA18C4F6A0h 0x0000001a popad 0x0000001b mov ebp, esp 0x0000001d pushad 0x0000001e mov dh, cl 0x00000020 push ebx 0x00000021 mov dh, ah 0x00000023 pop ebx 0x00000024 popad 0x00000025 xchg eax, ecx 0x00000026 pushad 0x00000027 call 00007FCA18C4F6A3h 0x0000002c movzx esi, bx 0x0000002f pop ebx 0x00000030 popad 0x00000031 push eax 0x00000032 pushad 0x00000033 mov edi, 021B8594h 0x00000038 pushfd 0x00000039 jmp 00007FCA18C4F69Dh 0x0000003e or cx, 9656h 0x00000043 jmp 00007FCA18C4F6A1h 0x00000048 popfd 0x00000049 popad 0x0000004a xchg eax, ecx 0x0000004b jmp 00007FCA18C4F69Eh 0x00000050 xchg eax, esi 0x00000051 pushad 0x00000052 jmp 00007FCA18C4F69Eh 0x00000057 mov ch, D2h 0x00000059 popad 0x0000005a push eax 0x0000005b push eax 0x0000005c push edx 0x0000005d push eax 0x0000005e push edx 0x0000005f push eax 0x00000060 push edx 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54706FB second address: 54706FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54706FF second address: 5470703 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470703 second address: 5470709 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470709 second address: 5470785 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FCA18C4F69Eh 0x00000009 jmp 00007FCA18C4F6A5h 0x0000000e popfd 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 xchg eax, esi 0x00000015 jmp 00007FCA18C4F69Ch 0x0000001a lea eax, dword ptr [ebp-04h] 0x0000001d pushad 0x0000001e jmp 00007FCA18C4F69Dh 0x00000023 popad 0x00000024 nop 0x00000025 jmp 00007FCA18C4F69Eh 0x0000002a push eax 0x0000002b jmp 00007FCA18C4F69Bh 0x00000030 nop 0x00000031 push eax 0x00000032 push edx 0x00000033 push eax 0x00000034 push edx 0x00000035 jmp 00007FCA18C4F6A0h 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470785 second address: 547078B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54707E3 second address: 54707E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 547084B second address: 5470851 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470851 second address: 5470855 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470855 second address: 54708A9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, esi 0x0000000a pushad 0x0000000b jmp 00007FCA18DB50EDh 0x00000010 pushfd 0x00000011 jmp 00007FCA18DB50F0h 0x00000016 adc esi, 6CD37298h 0x0000001c jmp 00007FCA18DB50EBh 0x00000021 popfd 0x00000022 popad 0x00000023 pop esi 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007FCA18DB50F5h 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54708A9 second address: 546016B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, 91C2h 0x00000007 mov dx, 080Eh 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e leave 0x0000000f jmp 00007FCA18C4F6A5h 0x00000014 retn 0004h 0x00000017 nop 0x00000018 sub esp, 04h 0x0000001b xor ebx, ebx 0x0000001d cmp eax, 00000000h 0x00000020 je 00007FCA18C4F7FAh 0x00000026 mov dword ptr [esp], 0000000Dh 0x0000002d call 00007FCA1D43B989h 0x00000032 mov edi, edi 0x00000034 pushad 0x00000035 mov eax, edx 0x00000037 mov dx, 1C0Ch 0x0000003b popad 0x0000003c push ebp 0x0000003d push eax 0x0000003e push edx 0x0000003f pushad 0x00000040 pushad 0x00000041 popad 0x00000042 mov eax, edx 0x00000044 popad 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 546016B second address: 5460195 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx eax, dx 0x00000006 call 00007FCA18DB50F7h 0x0000000b pop eax 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov dword ptr [esp], ebp 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 mov ebx, ecx 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460195 second address: 54601CE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007FCA18C4F6A0h 0x00000010 sub esp, 2Ch 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 push ebx 0x00000017 pop eax 0x00000018 mov cl, bl 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54601CE second address: 54601F5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FCA18DB50F5h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54601F5 second address: 546023C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop esi 0x00000005 pushfd 0x00000006 jmp 00007FCA18C4F6A3h 0x0000000b jmp 00007FCA18C4F6A3h 0x00000010 popfd 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push eax 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FCA18C4F6A4h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 546023C second address: 5460286 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 55ECDD14h 0x00000008 mov ch, dh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebx 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007FCA18DB50F2h 0x00000015 and ch, FFFFFFC8h 0x00000018 jmp 00007FCA18DB50EBh 0x0000001d popfd 0x0000001e mov bh, ah 0x00000020 popad 0x00000021 push edx 0x00000022 pushad 0x00000023 movsx edi, ax 0x00000026 popad 0x00000027 mov dword ptr [esp], edi 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007FCA18DB50EBh 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460286 second address: 546028C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 546028C second address: 5460290 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54602FB second address: 546034A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 inc ebx 0x0000000a pushad 0x0000000b movzx eax, di 0x0000000e pushfd 0x0000000f jmp 00007FCA18C4F6A1h 0x00000014 or esi, 51D8BA16h 0x0000001a jmp 00007FCA18C4F6A1h 0x0000001f popfd 0x00000020 popad 0x00000021 test al, al 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 popad 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 546034A second address: 5460350 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460350 second address: 5460385 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FCA18C4F85Ah 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FCA18C4F6A7h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54603C1 second address: 5460404 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 pushfd 0x0000000a jmp 00007FCA18DB50EBh 0x0000000f jmp 00007FCA18DB50F3h 0x00000014 popfd 0x00000015 call 00007FCA18DB50F8h 0x0000001a pop esi 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460404 second address: 5460425 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, 46ADh 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 call 00007FCA18C4F69Bh 0x00000017 pop ecx 0x00000018 mov ah, dl 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460573 second address: 5460577 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460577 second address: 546057D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 546057D second address: 5460583 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460583 second address: 54605A6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FCA18C4F6A8h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54605A6 second address: 54605D2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a pushad 0x0000000b mov di, ax 0x0000000e mov di, si 0x00000011 popad 0x00000012 nop 0x00000013 pushad 0x00000014 movzx esi, dx 0x00000017 mov ecx, edx 0x00000019 popad 0x0000001a push eax 0x0000001b pushad 0x0000001c mov bh, B1h 0x0000001e popad 0x0000001f nop 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54605D2 second address: 54605D6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54605D6 second address: 54605DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54605DC second address: 5460627 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d movsx edx, si 0x00000010 pushfd 0x00000011 jmp 00007FCA18C4F6A6h 0x00000016 adc eax, 41869358h 0x0000001c jmp 00007FCA18C4F69Bh 0x00000021 popfd 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460627 second address: 546062D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 546062D second address: 5460631 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460631 second address: 5460671 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FCA18DB50F3h 0x00000012 sub ah, FFFFFFCEh 0x00000015 jmp 00007FCA18DB50F9h 0x0000001a popfd 0x0000001b mov ch, 10h 0x0000001d popad 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460671 second address: 546068E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F69Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FCA18C4F69Ah 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 546068E second address: 5460692 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460692 second address: 5460698 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460698 second address: 546069F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54606B2 second address: 54606B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54606B6 second address: 54606BC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54606BC second address: 54606C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54606C2 second address: 54606F5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esi, eax 0x0000000a jmp 00007FCA18DB50EEh 0x0000000f test esi, esi 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FCA18DB50F7h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54606F5 second address: 5460025 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FCA8928D5D9h 0x0000000f xor eax, eax 0x00000011 jmp 00007FCA18C28DCAh 0x00000016 pop esi 0x00000017 pop edi 0x00000018 pop ebx 0x00000019 leave 0x0000001a retn 0004h 0x0000001d nop 0x0000001e sub esp, 04h 0x00000021 mov esi, eax 0x00000023 xor ebx, ebx 0x00000025 cmp esi, 00000000h 0x00000028 je 00007FCA18C4F7D5h 0x0000002e call 00007FCA1D43B6DCh 0x00000033 mov edi, edi 0x00000035 jmp 00007FCA18C4F69Dh 0x0000003a xchg eax, ebp 0x0000003b jmp 00007FCA18C4F69Eh 0x00000040 push eax 0x00000041 push eax 0x00000042 push edx 0x00000043 push eax 0x00000044 push edx 0x00000045 pushad 0x00000046 popad 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460025 second address: 5460041 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50F8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460041 second address: 5460068 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F69Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FCA18C4F6A5h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460068 second address: 5460078 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCA18DB50ECh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460078 second address: 546007C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 546007C second address: 5460092 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FCA18DB50EAh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54600E6 second address: 54600EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54600EA second address: 5460107 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460107 second address: 5460145 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bl, 01h 0x00000005 pushfd 0x00000006 jmp 00007FCA18C4F6A8h 0x0000000b add cx, 2F68h 0x00000010 jmp 00007FCA18C4F69Bh 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 leave 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d mov edx, 34F0D6D6h 0x00000022 mov dl, 8Ah 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460145 second address: 546014B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 546014B second address: 546014F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460A10 second address: 5460A2C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50F8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460B18 second address: 5460B1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460B1C second address: 5460B2F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50EFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460B56 second address: 5460B5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460B5A second address: 5460B5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460B5E second address: 5460B64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460B64 second address: 5460B6A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460B6A second address: 5460B6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460B6E second address: 5460B8D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007FCA893D8EF5h 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FCA18DB50EFh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460B8D second address: 5460BA5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCA18C4F6A4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5460BA5 second address: 5460BA9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 547090B second address: 547090F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 547090F second address: 547092A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50F7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 547092A second address: 547092F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 547092F second address: 5470991 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop esi 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FCA18DB50EEh 0x0000000f xchg eax, ebp 0x00000010 jmp 00007FCA18DB50F0h 0x00000015 mov ebp, esp 0x00000017 jmp 00007FCA18DB50F0h 0x0000001c xchg eax, esi 0x0000001d jmp 00007FCA18DB50F0h 0x00000022 push eax 0x00000023 pushad 0x00000024 mov si, bx 0x00000027 mov dl, D8h 0x00000029 popad 0x0000002a xchg eax, esi 0x0000002b push eax 0x0000002c push edx 0x0000002d jmp 00007FCA18DB50EBh 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470991 second address: 54709D6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esi, dword ptr [ebp+0Ch] 0x0000000c pushad 0x0000000d mov dh, ch 0x0000000f call 00007FCA18C4F6A9h 0x00000014 pop ebx 0x00000015 popad 0x00000016 test esi, esi 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 54709D6 second address: 5470A26 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18DB50F4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, 665467B1h 0x0000000e popad 0x0000000f je 00007FCA893D2AA9h 0x00000015 jmp 00007FCA18DB50ECh 0x0000001a cmp dword ptr [75AF459Ch], 05h 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007FCA18DB50F7h 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470A26 second address: 5470A2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470A2C second address: 5470A30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470A30 second address: 5470A44 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007FCA892850F5h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470A44 second address: 5470A48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470A48 second address: 5470A4E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470A4E second address: 5470A6C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, bx 0x00000006 mov dl, 69h 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FCA18DB50EEh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470A6C second address: 5470A70 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470A70 second address: 5470A76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470A76 second address: 5470A87 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FCA18C4F69Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470A87 second address: 5470A8B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470A8B second address: 5470AA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a mov esi, 42D43DF9h 0x0000000f push eax 0x00000010 push edx 0x00000011 mov eax, 609B02BBh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470AA1 second address: 5470AC4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, esi 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FCA18DB50F9h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470B21 second address: 5470B8D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FCA18C4F6A1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007FCA18C4F6A7h 0x00000011 sbb esi, 05291C1Eh 0x00000017 jmp 00007FCA18C4F6A9h 0x0000001c popfd 0x0000001d movzx eax, di 0x00000020 popad 0x00000021 xchg eax, esi 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007FCA18C4F6A6h 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\YKri2nEBWE.exe | RDTSC instruction interceptor: First address: 5470B8D second address: 5470B92 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |