Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000002.1768443837.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754626317.0000000000D2A000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1767142790.0000000000D2A000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754596470.0000000000D31000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754596470.0000000000D31000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754596470.0000000000D31000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754521867.0000000000D8D000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap& |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754596470.0000000000D31000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D8E000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754521867.0000000000D8D000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000002.1768443837.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754626317.0000000000D2A000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1767142790.0000000000D2A000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754596470.0000000000D31000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754521867.0000000000D8D000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754596470.0000000000D31000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754521867.0000000000D8D000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754596470.0000000000D31000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754521867.0000000000D8D000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=FRRi |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=oOCAGrkRfpQ6&l=e |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754596470.0000000000D31000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000002.1768457885.0000000000D32000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1767116865.0000000000D32000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754596470.0000000000D31000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/E |
Source: Y4svWfRK1L.exe, 00000000.00000003.1767116865.0000000000D32000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api |
Source: Y4svWfRK1L.exe, 00000000.00000002.1768457885.0000000000D32000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1767116865.0000000000D32000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apiJ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754596470.0000000000D31000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/pi |
Source: Y4svWfRK1L.exe, 00000000.00000002.1768308675.0000000000D02000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/piD |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754596470.0000000000D31000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/piE |
Source: Y4svWfRK1L.exe, 00000000.00000002.1768308675.0000000000D02000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/piL |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754596470.0000000000D31000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754596470.0000000000D31000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000002.1768457885.0000000000D32000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D8E000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1767116865.0000000000D32000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754521867.0000000000D8D000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000002.1768443837.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754626317.0000000000D2A000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1767142790.0000000000D2A000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754596470.0000000000D31000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: Y4svWfRK1L.exe, 00000000.00000003.1754536689.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, Y4svWfRK1L.exe, 00000000.00000003.1754566576.0000000000D7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0049B100 | 0_2_0049B100 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00498600 | 0_2_00498600 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00517051 | 0_2_00517051 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00509057 | 0_2_00509057 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0052B076 | 0_2_0052B076 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00538015 | 0_2_00538015 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004AD003 | 0_2_004AD003 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00516007 | 0_2_00516007 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0049D021 | 0_2_0049D021 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050C024 | 0_2_0050C024 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004FC030 | 0_2_004FC030 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051502E | 0_2_0051502E |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004BA0CA | 0_2_004BA0CA |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004A60E9 | 0_2_004A60E9 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005270FE | 0_2_005270FE |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004BC0E6 | 0_2_004BC0E6 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004BC09E | 0_2_004BC09E |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00536086 | 0_2_00536086 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005070BA | 0_2_005070BA |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005310B8 | 0_2_005310B8 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F30BF | 0_2_004F30BF |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004E70BB | 0_2_004E70BB |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004BC09E | 0_2_004BC09E |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004FD157 | 0_2_004FD157 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004A8169 | 0_2_004A8169 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00496160 | 0_2_00496160 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0053817D | 0_2_0053817D |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00501119 | 0_2_00501119 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051F13D | 0_2_0051F13D |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B81CC | 0_2_004B81CC |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0053A1C6 | 0_2_0053A1C6 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0052C1F6 | 0_2_0052C1F6 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005061F5 | 0_2_005061F5 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F81FB | 0_2_004F81FB |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004CF18B | 0_2_004CF18B |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004BE180 | 0_2_004BE180 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B91AE | 0_2_004B91AE |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005371BB | 0_2_005371BB |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005391B9 | 0_2_005391B9 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050F1A2 | 0_2_0050F1A2 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005041AE | 0_2_005041AE |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0052F253 | 0_2_0052F253 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0052D27C | 0_2_0052D27C |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00494270 | 0_2_00494270 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00518207 | 0_2_00518207 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0052420E | 0_2_0052420E |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004AE220 | 0_2_004AE220 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004A1227 | 0_2_004A1227 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0066E218 | 0_2_0066E218 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005202DA | 0_2_005202DA |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_006732E8 | 0_2_006732E8 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B42D0 | 0_2_004B42D0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051D2F7 | 0_2_0051D2F7 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005012F7 | 0_2_005012F7 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005252F8 | 0_2_005252F8 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004C9280 | 0_2_004C9280 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004BD34A | 0_2_004BD34A |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B1340 | 0_2_004B1340 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051637A | 0_2_0051637A |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004BF377 | 0_2_004BF377 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00499310 | 0_2_00499310 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050E332 | 0_2_0050E332 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00505334 | 0_2_00505334 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0049F3C0 | 0_2_0049F3C0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F33C5 | 0_2_004F33C5 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050D3DD | 0_2_0050D3DD |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B83D8 | 0_2_004B83D8 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004FB3DC | 0_2_004FB3DC |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004973D0 | 0_2_004973D0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005083F2 | 0_2_005083F2 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005033F9 | 0_2_005033F9 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005023E7 | 0_2_005023E7 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005233E5 | 0_2_005233E5 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005A3391 | 0_2_005A3391 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0053038F | 0_2_0053038F |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051738C | 0_2_0051738C |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005353B2 | 0_2_005353B2 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0066938E | 0_2_0066938E |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B7440 | 0_2_004B7440 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004CA440 | 0_2_004CA440 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004D0460 | 0_2_004D0460 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0053247D | 0_2_0053247D |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004A747D | 0_2_004A747D |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051041C | 0_2_0051041C |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F9401 | 0_2_004F9401 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050C433 | 0_2_0050C433 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051E436 | 0_2_0051E436 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00678408 | 0_2_00678408 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B04C6 | 0_2_004B04C6 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B24E0 | 0_2_004B24E0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005264FD | 0_2_005264FD |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0049D4F3 | 0_2_0049D4F3 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004FC49F | 0_2_004FC49F |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00537557 | 0_2_00537557 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00504540 | 0_2_00504540 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004FE55A | 0_2_004FE55A |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00538577 | 0_2_00538577 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B4560 | 0_2_004B4560 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00515561 | 0_2_00515561 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051251B | 0_2_0051251B |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00533518 | 0_2_00533518 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0052B503 | 0_2_0052B503 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F8513 | 0_2_004F8513 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0066250F | 0_2_0066250F |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004BC53C | 0_2_004BC53C |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050B527 | 0_2_0050B527 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005395C1 | 0_2_005395C1 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004CA5D4 | 0_2_004CA5D4 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004FD5E0 | 0_2_004FD5E0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005345E5 | 0_2_005345E5 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004965F0 | 0_2_004965F0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00503580 | 0_2_00503580 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00500589 | 0_2_00500589 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004CC5A0 | 0_2_004CC5A0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004C8650 | 0_2_004C8650 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00531679 | 0_2_00531679 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0052C67E | 0_2_0052C67E |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0066764B | 0_2_0066764B |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0049F60D | 0_2_0049F60D |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0052261A | 0_2_0052261A |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004A961B | 0_2_004A961B |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0052F63D | 0_2_0052F63D |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004AE630 | 0_2_004AE630 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F16C8 | 0_2_004F16C8 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005006C1 | 0_2_005006C1 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050D6C7 | 0_2_0050D6C7 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B46D0 | 0_2_004B46D0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005306F5 | 0_2_005306F5 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005196E5 | 0_2_005196E5 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004D06F0 | 0_2_004D06F0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00537693 | 0_2_00537693 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0049E687 | 0_2_0049E687 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051F683 | 0_2_0051F683 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0052A685 | 0_2_0052A685 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051868C | 0_2_0051868C |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005016BE | 0_2_005016BE |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B7740 | 0_2_004B7740 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00516741 | 0_2_00516741 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004A2750 | 0_2_004A2750 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050E711 | 0_2_0050E711 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F6700 | 0_2_004F6700 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051B738 | 0_2_0051B738 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B9739 | 0_2_004B9739 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004A57C0 | 0_2_004A57C0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005327CF | 0_2_005327CF |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0052F7FA | 0_2_0052F7FA |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005087FF | 0_2_005087FF |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00499780 | 0_2_00499780 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F27AF | 0_2_004F27AF |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0049C840 | 0_2_0049C840 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051A85B | 0_2_0051A85B |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0066C821 | 0_2_0066C821 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004FA808 | 0_2_004FA808 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050181F | 0_2_0050181F |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F3817 | 0_2_004F3817 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050280C | 0_2_0050280C |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0049D83C | 0_2_0049D83C |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0053582F | 0_2_0053582F |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004938C0 | 0_2_004938C0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004C38D0 | 0_2_004C38D0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0053B8FE | 0_2_0053B8FE |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004AB8F6 | 0_2_004AB8F6 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004FF88C | 0_2_004FF88C |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_006768A3 | 0_2_006768A3 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050C89D | 0_2_0050C89D |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004AC8A0 | 0_2_004AC8A0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005158BA | 0_2_005158BA |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004C88B0 | 0_2_004C88B0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00538949 | 0_2_00538949 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F5954 | 0_2_004F5954 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0053694D | 0_2_0053694D |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00509976 | 0_2_00509976 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004AE960 | 0_2_004AE960 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F797F | 0_2_004F797F |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00495900 | 0_2_00495900 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00529919 | 0_2_00529919 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00517903 | 0_2_00517903 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00512904 | 0_2_00512904 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B6910 | 0_2_004B6910 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0052690F | 0_2_0052690F |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00513924 | 0_2_00513924 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051092B | 0_2_0051092B |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004BC9EB | 0_2_004BC9EB |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_006469CC | 0_2_006469CC |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004D09E0 | 0_2_004D09E0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0053399C | 0_2_0053399C |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004FE99C | 0_2_004FE99C |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004FD9BE | 0_2_004FD9BE |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B39B9 | 0_2_004B39B9 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004CDA4D | 0_2_004CDA4D |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004C5A4F | 0_2_004C5A4F |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004CCA40 | 0_2_004CCA40 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004FFA64 | 0_2_004FFA64 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00539A60 | 0_2_00539A60 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051DA1C | 0_2_0051DA1C |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004CFA20 | 0_2_004CFA20 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0052DA3E | 0_2_0052DA3E |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00503A24 | 0_2_00503A24 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051FAD2 | 0_2_0051FAD2 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050AAD5 | 0_2_0050AAD5 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00525ADC | 0_2_00525ADC |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004A9AD0 | 0_2_004A9AD0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00519ACA | 0_2_00519ACA |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00504ACC | 0_2_00504ACC |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F6AF2 | 0_2_004F6AF2 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004C9A80 | 0_2_004C9A80 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F9A9F | 0_2_004F9A9F |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B8ABC | 0_2_004B8ABC |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0049AB40 | 0_2_0049AB40 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0053AB48 | 0_2_0053AB48 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00534B65 | 0_2_00534B65 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050DB6D | 0_2_0050DB6D |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00511B6C | 0_2_00511B6C |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0052AB6D | 0_2_0052AB6D |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004CFB10 | 0_2_004CFB10 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051BB27 | 0_2_0051BB27 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00507BC8 | 0_2_00507BC8 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0066ABC2 | 0_2_0066ABC2 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004FBBE8 | 0_2_004FBBE8 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00520BF9 | 0_2_00520BF9 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004AEB80 | 0_2_004AEB80 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00501BB8 | 0_2_00501BB8 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00494BA0 | 0_2_00494BA0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004FEBB7 | 0_2_004FEBB7 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00518BAD | 0_2_00518BAD |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F3C48 | 0_2_004F3C48 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00530C7B | 0_2_00530C7B |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050EC66 | 0_2_0050EC66 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051EC14 | 0_2_0051EC14 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00537C01 | 0_2_00537C01 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004C3C10 | 0_2_004C3C10 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00514CF7 | 0_2_00514CF7 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004C1CF0 | 0_2_004C1CF0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F2C8B | 0_2_004F2C8B |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00515C9A | 0_2_00515C9A |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00516C86 | 0_2_00516C86 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00502C8E | 0_2_00502C8E |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F7CAE | 0_2_004F7CAE |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004A4CA0 | 0_2_004A4CA0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00526CBE | 0_2_00526CBE |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004FCD4D | 0_2_004FCD4D |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004BCD4C | 0_2_004BCD4C |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004BCD5E | 0_2_004BCD5E |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050CD4F | 0_2_0050CD4F |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F5D6E | 0_2_004F5D6E |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004CFD70 | 0_2_004CFD70 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B1D00 | 0_2_004B1D00 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004A1D2B | 0_2_004A1D2B |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B6D2E | 0_2_004B6D2E |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004D0D20 | 0_2_004D0D20 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0066FD13 | 0_2_0066FD13 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004C9D30 | 0_2_004C9D30 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00511DDB | 0_2_00511DDB |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00674DF4 | 0_2_00674DF4 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050FDC4 | 0_2_0050FDC4 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00536DC6 | 0_2_00536DC6 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00520DFB | 0_2_00520DFB |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00503DE8 | 0_2_00503DE8 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004CCDF0 | 0_2_004CCDF0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050CD82 | 0_2_0050CD82 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004C7DA9 | 0_2_004C7DA9 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00505DB6 | 0_2_00505DB6 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0052DDB9 | 0_2_0052DDB9 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051CDA7 | 0_2_0051CDA7 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00529E50 | 0_2_00529E50 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004FCE5F | 0_2_004FCE5F |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00517E43 | 0_2_00517E43 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B2E6D | 0_2_004B2E6D |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B0E6C | 0_2_004B0E6C |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004BEE63 | 0_2_004BEE63 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004FFE7D | 0_2_004FFE7D |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051AE63 | 0_2_0051AE63 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F1E79 | 0_2_004F1E79 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00523E69 | 0_2_00523E69 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_005E9E63 | 0_2_005E9E63 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004BFE74 | 0_2_004BFE74 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004CFE00 | 0_2_004CFE00 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0052CE1E | 0_2_0052CE1E |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00524E21 | 0_2_00524E21 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004FDE39 | 0_2_004FDE39 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00533EDB | 0_2_00533EDB |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F5EEA | 0_2_004F5EEA |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00508EFA | 0_2_00508EFA |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00520EE3 | 0_2_00520EE3 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00534EEC | 0_2_00534EEC |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004C8EA0 | 0_2_004C8EA0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00492EB0 | 0_2_00492EB0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004AAEB0 | 0_2_004AAEB0 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004A6F52 | 0_2_004A6F52 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004ADF50 | 0_2_004ADF50 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051CF4E | 0_2_0051CF4E |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00679F43 | 0_2_00679F43 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0052FF74 | 0_2_0052FF74 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00528F7B | 0_2_00528F7B |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00501F61 | 0_2_00501F61 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050AF61 | 0_2_0050AF61 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00502F6A | 0_2_00502F6A |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004B5F1B | 0_2_004B5F1B |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00539F06 | 0_2_00539F06 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_006D5F0D | 0_2_006D5F0D |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050FF31 | 0_2_0050FF31 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00522F3E | 0_2_00522F3E |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0051DF3F | 0_2_0051DF3F |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0053AF25 | 0_2_0053AF25 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00507F2D | 0_2_00507F2D |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0052BFD1 | 0_2_0052BFD1 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_0050CFF4 | 0_2_0050CFF4 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_004F4FF5 | 0_2_004F4FF5 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | Code function: 0_2_00527FA5 | 0_2_00527FA5 |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 67FC4E second address: 67FC59 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6656E1 second address: 6656E6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6656E6 second address: 6656EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6656EC second address: 6656F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 67EBA8 second address: 67EBAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 67EBAC second address: 67EBB2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 67EBB2 second address: 67EBBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FD9C0F4F5F6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 67ECFF second address: 67ED1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 jnl 00007FD9C0C55406h 0x0000000f jmp 00007FD9C0C5540Eh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 67ED1C second address: 67ED38 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 jne 00007FD9C0F4F60Ch 0x0000000d jnc 00007FD9C0F4F5FCh 0x00000013 push ecx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 67EE69 second address: 67EE6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 67EE6D second address: 67EE71 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 67EE71 second address: 67EE79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 67EE79 second address: 67EEC7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0F4F5FAh 0x00000007 push ebx 0x00000008 jbe 00007FD9C0F4F5F6h 0x0000000e pop ebx 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pushad 0x00000012 jmp 00007FD9C0F4F603h 0x00000017 jmp 00007FD9C0F4F607h 0x0000001c jmp 00007FD9C0F4F5FAh 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 67F026 second address: 67F030 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FD9C0C55406h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6822E2 second address: 68235F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0F4F5FCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jng 00007FD9C0F4F5FCh 0x00000011 jno 00007FD9C0F4F5FCh 0x00000017 popad 0x00000018 nop 0x00000019 push 00000000h 0x0000001b push ebp 0x0000001c call 00007FD9C0F4F5F8h 0x00000021 pop ebp 0x00000022 mov dword ptr [esp+04h], ebp 0x00000026 add dword ptr [esp+04h], 0000001Ch 0x0000002e inc ebp 0x0000002f push ebp 0x00000030 ret 0x00000031 pop ebp 0x00000032 ret 0x00000033 mov dword ptr [ebp+122D1EBFh], edx 0x00000039 push 00000000h 0x0000003b and esi, 6CDA480Eh 0x00000041 push 6A2A236Eh 0x00000046 push eax 0x00000047 push edx 0x00000048 jmp 00007FD9C0F4F608h 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 68235F second address: 682413 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FD9C0C55408h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xor dword ptr [esp], 6A2A23EEh 0x00000011 jmp 00007FD9C0C55413h 0x00000016 push 00000003h 0x00000018 jp 00007FD9C0C5540Bh 0x0000001e xor dx, AD75h 0x00000023 push 00000000h 0x00000025 and edx, dword ptr [ebp+122D2199h] 0x0000002b push 00000003h 0x0000002d mov cx, 29F2h 0x00000031 push C3C052A0h 0x00000036 jmp 00007FD9C0C5540Ah 0x0000003b xor dword ptr [esp], 03C052A0h 0x00000042 push 00000000h 0x00000044 push edx 0x00000045 call 00007FD9C0C55408h 0x0000004a pop edx 0x0000004b mov dword ptr [esp+04h], edx 0x0000004f add dword ptr [esp+04h], 0000001Dh 0x00000057 inc edx 0x00000058 push edx 0x00000059 ret 0x0000005a pop edx 0x0000005b ret 0x0000005c jnp 00007FD9C0C5540Ch 0x00000062 lea ebx, dword ptr [ebp+1246D093h] 0x00000068 jp 00007FD9C0C5541Fh 0x0000006e jmp 00007FD9C0C55419h 0x00000073 push eax 0x00000074 push eax 0x00000075 push edx 0x00000076 push eax 0x00000077 push esi 0x00000078 pop esi 0x00000079 pop eax 0x0000007a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 682545 second address: 682564 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FD9C0F4F608h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 682564 second address: 682568 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 693074 second address: 69307A instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 69307A second address: 693084 instructions: 0x00000000 rdtsc 0x00000002 js 00007FD9C0C5540Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 693084 second address: 69309B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 jmp 00007FD9C0F4F5FBh 0x0000000d push eax 0x0000000e push edx 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 69309B second address: 69309F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6A2686 second address: 6A26AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FD9C0F4F5F6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jg 00007FD9C0F4F5FAh 0x00000013 jmp 00007FD9C0F4F601h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6A0809 second address: 6A0836 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0C55417h 0x00000007 jne 00007FD9C0C55406h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FD9C0C5540Ah 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6A0DE2 second address: 6A0DE8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6A0DE8 second address: 6A0DEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6A0DEC second address: 6A0DF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6A0F41 second address: 6A0F49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6A0F49 second address: 6A0F4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6A10BC second address: 6A10C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6A10C0 second address: 6A10E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FD9C0F4F607h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6A10E0 second address: 6A1113 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD9C0C55416h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007FD9C0C55414h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6A1113 second address: 6A1129 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FD9C0F4F5F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b jng 00007FD9C0F4F616h 0x00000011 pushad 0x00000012 push edi 0x00000013 pop edi 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6A1129 second address: 6A112F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6A22B5 second address: 6A22C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FD9C0F4F5F6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6A4B93 second address: 6A4B9A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6A6056 second address: 6A6060 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007FD9C0F4F5F6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6A6060 second address: 6A6066 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 671204 second address: 67122C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD9C0F4F601h 0x00000009 push eax 0x0000000a pop eax 0x0000000b push edx 0x0000000c pop edx 0x0000000d popad 0x0000000e jns 00007FD9C0F4F5FEh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 67122C second address: 671231 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 671231 second address: 67124F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD9C0F4F602h 0x00000009 jo 00007FD9C0F4F5F6h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 67124F second address: 67125A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 67125A second address: 67125E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 67125E second address: 671286 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jno 00007FD9C0C55410h 0x00000010 jl 00007FD9C0C5540Eh 0x00000016 pushad 0x00000017 popad 0x00000018 js 00007FD9C0C55406h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 671286 second address: 6712A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FD9C0F4F606h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6712A1 second address: 6712B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD9C0C5540Bh 0x00000009 popad 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6712B4 second address: 6712BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AC677 second address: 6AC67F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AC67F second address: 6AC69B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FD9C0F4F603h 0x0000000c push esi 0x0000000d pop esi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6ACA4B second address: 6ACA4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6ACA4F second address: 6ACA55 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6ACA55 second address: 6ACA6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FD9C0C5540Ah 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6ACA6A second address: 6ACA8C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0F4F5FCh 0x00000007 push eax 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jnl 00007FD9C0F4F5F6h 0x00000012 js 00007FD9C0F4F5F6h 0x00000018 pushad 0x00000019 popad 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6ACA8C second address: 6ACAB8 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FD9C0C55410h 0x00000008 jmp 00007FD9C0C55415h 0x0000000d pop ecx 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6ACD72 second address: 6ACD7E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007FD9C0F4F5F6h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AFC29 second address: 6AFC34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push edi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6B00AF second address: 6B00B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6B00B4 second address: 6B00B9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6B08B8 second address: 6B08BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6B08BC second address: 6B08C1 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6B0936 second address: 6B093C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6B093C second address: 6B095E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FD9C0C55417h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6B0CE5 second address: 6B0CEA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6B0CEA second address: 6B0CF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6B0DAF second address: 6B0DB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6B1C93 second address: 6B1C9D instructions: 0x00000000 rdtsc 0x00000002 jns 00007FD9C0C55406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6B3A8F second address: 6B3AA2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0F4F5FFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6B4574 second address: 6B45BB instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FD9C0C5540Dh 0x0000000e nop 0x0000000f mov esi, edi 0x00000011 push 00000000h 0x00000013 xor si, 589Ah 0x00000018 push 00000000h 0x0000001a push 00000000h 0x0000001c push eax 0x0000001d call 00007FD9C0C55408h 0x00000022 pop eax 0x00000023 mov dword ptr [esp+04h], eax 0x00000027 add dword ptr [esp+04h], 00000015h 0x0000002f inc eax 0x00000030 push eax 0x00000031 ret 0x00000032 pop eax 0x00000033 ret 0x00000034 mov edi, eax 0x00000036 push eax 0x00000037 pushad 0x00000038 push eax 0x00000039 push edx 0x0000003a push eax 0x0000003b push edx 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6B4327 second address: 6B432B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6B45BB second address: 6B45BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6B45BF second address: 6B45C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6B45C3 second address: 6B45D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FD9C0C5540Eh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6B5079 second address: 6B50AA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FD9C0F4F5FBh 0x00000008 ja 00007FD9C0F4F5F6h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FD9C0F4F607h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6B50AA second address: 6B50B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6BD999 second address: 6BD99E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6BBC95 second address: 6BBC9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6BD99E second address: 6BD9A3 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C0E82 second address: 6C0E86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6BF10D second address: 6BF112 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6BF112 second address: 6BF128 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD9C0C55412h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6BF128 second address: 6BF166 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b mov bx, 1365h 0x0000000f push dword ptr fs:[00000000h] 0x00000016 mov dword ptr fs:[00000000h], esp 0x0000001d sub dword ptr [ebp+124665C6h], ecx 0x00000023 mov eax, dword ptr [ebp+122D0F1Dh] 0x00000029 movzx edi, si 0x0000002c push FFFFFFFFh 0x0000002e or edi, dword ptr [ebp+122D2EC7h] 0x00000034 nop 0x00000035 push ebx 0x00000036 push eax 0x00000037 push edx 0x00000038 jnc 00007FD9C0F4F5F6h 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C13B4 second address: 6C13B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C13B8 second address: 6C13C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C1576 second address: 6C1580 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007FD9C0C55406h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C2527 second address: 6C2534 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FD9C0F4F5F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C1580 second address: 6C1584 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C33A1 second address: 6C33B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0F4F604h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C2534 second address: 6C2550 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD9C0C5540Fh 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f push edx 0x00000010 pop edx 0x00000011 pop ecx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C33B9 second address: 6C33C0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C2550 second address: 6C2555 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C1646 second address: 6C1665 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FD9C0F4F608h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C1665 second address: 6C1672 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C1672 second address: 6C1676 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C42E7 second address: 6C42EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C358D second address: 6C3597 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C42EB second address: 6C42F1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C42F1 second address: 6C42F6 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C42F6 second address: 6C4312 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b jmp 00007FD9C0C5540Eh 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C7435 second address: 6C74AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FD9C0F4F605h 0x0000000e pop edx 0x0000000f nop 0x00000010 adc bx, F5E1h 0x00000015 push 00000000h 0x00000017 push 00000000h 0x00000019 push eax 0x0000001a call 00007FD9C0F4F5F8h 0x0000001f pop eax 0x00000020 mov dword ptr [esp+04h], eax 0x00000024 add dword ptr [esp+04h], 0000001Ch 0x0000002c inc eax 0x0000002d push eax 0x0000002e ret 0x0000002f pop eax 0x00000030 ret 0x00000031 mov bh, 83h 0x00000033 push 00000000h 0x00000035 push 00000000h 0x00000037 push edx 0x00000038 call 00007FD9C0F4F5F8h 0x0000003d pop edx 0x0000003e mov dword ptr [esp+04h], edx 0x00000042 add dword ptr [esp+04h], 00000017h 0x0000004a inc edx 0x0000004b push edx 0x0000004c ret 0x0000004d pop edx 0x0000004e ret 0x0000004f xchg eax, esi 0x00000050 push eax 0x00000051 push edx 0x00000052 jo 00007FD9C0F4F5FCh 0x00000058 push eax 0x00000059 push edx 0x0000005a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C74AE second address: 6C74B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C6738 second address: 6C6746 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD9C0F4F5FAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C5570 second address: 6C5617 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FD9C0C55408h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push ecx 0x00000010 call 00007FD9C0C55408h 0x00000015 pop ecx 0x00000016 mov dword ptr [esp+04h], ecx 0x0000001a add dword ptr [esp+04h], 00000017h 0x00000022 inc ecx 0x00000023 push ecx 0x00000024 ret 0x00000025 pop ecx 0x00000026 ret 0x00000027 adc bx, 657Dh 0x0000002c jmp 00007FD9C0C55419h 0x00000031 push dword ptr fs:[00000000h] 0x00000038 or di, 6D86h 0x0000003d mov dword ptr fs:[00000000h], esp 0x00000044 mov edi, ebx 0x00000046 mov eax, dword ptr [ebp+122D07B1h] 0x0000004c js 00007FD9C0C55406h 0x00000052 push FFFFFFFFh 0x00000054 push 00000000h 0x00000056 push esi 0x00000057 call 00007FD9C0C55408h 0x0000005c pop esi 0x0000005d mov dword ptr [esp+04h], esi 0x00000061 add dword ptr [esp+04h], 0000001Bh 0x00000069 inc esi 0x0000006a push esi 0x0000006b ret 0x0000006c pop esi 0x0000006d ret 0x0000006e mov ebx, dword ptr [ebp+122D3072h] 0x00000074 push eax 0x00000075 push eax 0x00000076 push edx 0x00000077 jmp 00007FD9C0C5540Eh 0x0000007c rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C84E2 second address: 6C84F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 jng 00007FD9C0F4F604h 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C84F2 second address: 6C84F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C7668 second address: 6C7684 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD9C0F4F608h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C946D second address: 6C9473 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C9473 second address: 6C94BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 nop 0x00000007 mov ebx, 50635C83h 0x0000000c push 00000000h 0x0000000e push 00000000h 0x00000010 push edx 0x00000011 call 00007FD9C0F4F5F8h 0x00000016 pop edx 0x00000017 mov dword ptr [esp+04h], edx 0x0000001b add dword ptr [esp+04h], 0000001Dh 0x00000023 inc edx 0x00000024 push edx 0x00000025 ret 0x00000026 pop edx 0x00000027 ret 0x00000028 mov dword ptr [ebp+122D2859h], edx 0x0000002e push 00000000h 0x00000030 or dword ptr [ebp+122D1CDFh], ecx 0x00000036 push eax 0x00000037 push esi 0x00000038 pushad 0x00000039 jnc 00007FD9C0F4F5F6h 0x0000003f push eax 0x00000040 push edx 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6C871D second address: 6C8721 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6CB60A second address: 6CB651 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push 00000000h 0x0000000c push ebx 0x0000000d call 00007FD9C0F4F5F8h 0x00000012 pop ebx 0x00000013 mov dword ptr [esp+04h], ebx 0x00000017 add dword ptr [esp+04h], 00000014h 0x0000001f inc ebx 0x00000020 push ebx 0x00000021 ret 0x00000022 pop ebx 0x00000023 ret 0x00000024 jmp 00007FD9C0F4F5FEh 0x00000029 push 00000000h 0x0000002b mov edi, dword ptr [ebp+122D22E8h] 0x00000031 xchg eax, esi 0x00000032 push eax 0x00000033 push edx 0x00000034 jne 00007FD9C0F4F5F8h 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6CB651 second address: 6CB67D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0C55414h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d jmp 00007FD9C0C5540Fh 0x00000012 pop edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6CC601 second address: 6CC605 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6CC605 second address: 6CC61F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FD9C0C55412h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6CC61F second address: 6CC623 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6CC7B0 second address: 6CC83A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push eax 0x0000000c call 00007FD9C0C55408h 0x00000011 pop eax 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 add dword ptr [esp+04h], 0000001Ch 0x0000001e inc eax 0x0000001f push eax 0x00000020 ret 0x00000021 pop eax 0x00000022 ret 0x00000023 movzx edi, bx 0x00000026 push dword ptr fs:[00000000h] 0x0000002d jmp 00007FD9C0C5540Ch 0x00000032 mov dword ptr fs:[00000000h], esp 0x00000039 or edi, dword ptr [ebp+122D39E7h] 0x0000003f mov eax, dword ptr [ebp+122D12B5h] 0x00000045 add ebx, dword ptr [ebp+122D2E6Fh] 0x0000004b push FFFFFFFFh 0x0000004d push 00000000h 0x0000004f push ebp 0x00000050 call 00007FD9C0C55408h 0x00000055 pop ebp 0x00000056 mov dword ptr [esp+04h], ebp 0x0000005a add dword ptr [esp+04h], 0000001Bh 0x00000062 inc ebp 0x00000063 push ebp 0x00000064 ret 0x00000065 pop ebp 0x00000066 ret 0x00000067 nop 0x00000068 push eax 0x00000069 push edx 0x0000006a pushad 0x0000006b pushad 0x0000006c popad 0x0000006d pushad 0x0000006e popad 0x0000006f popad 0x00000070 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6CE77A second address: 6CE77F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6D45E9 second address: 6D45F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push edi 0x00000006 pop edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6D3EAE second address: 6D3EB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6D3EB2 second address: 6D3EB8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6D4008 second address: 6D4020 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push edx 0x00000004 pop edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FD9C0F4F5FEh 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 677F28 second address: 677F2D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DA041 second address: 6DA08E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0F4F5FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b jmp 00007FD9C0F4F607h 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 jmp 00007FD9C0F4F609h 0x00000019 mov eax, dword ptr [eax] 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f push edx 0x00000020 pop edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DA08E second address: 6DA094 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DA094 second address: 6DA0C1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnp 00007FD9C0F4F5F6h 0x00000009 jmp 00007FD9C0F4F607h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DA0C1 second address: 6DA0C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DA0C5 second address: 6DA0CB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DF903 second address: 6DF90C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DF90C second address: 6DF92A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0F4F604h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DF92A second address: 6DF955 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0C55412h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jno 00007FD9C0C55408h 0x00000014 jnl 00007FD9C0C55408h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DF955 second address: 6DF965 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FD9C0F4F602h 0x00000008 jg 00007FD9C0F4F5F6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DEC21 second address: 6DEC30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jmp 00007FD9C0C5540Ah 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DEDA0 second address: 6DEDA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DEDA5 second address: 6DEDDB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FD9C0C55419h 0x00000008 jmp 00007FD9C0C5540Ah 0x0000000d jp 00007FD9C0C55406h 0x00000013 popad 0x00000014 pop edx 0x00000015 pop eax 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DEDDB second address: 6DEDFA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FD9C0F4F607h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DEDFA second address: 6DEE2B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0C55414h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FD9C0C55415h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DEF38 second address: 6DEF66 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FD9C0F4F5FAh 0x00000010 jmp 00007FD9C0F4F609h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DF267 second address: 6DF26B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DF26B second address: 6DF271 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DF3FD second address: 6DF40D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD9C0C5540Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6DF54B second address: 6DF54F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E4881 second address: 6E48A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007FD9C0C55418h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E48A2 second address: 6E48A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AE4E3 second address: 6AE4E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AE4E7 second address: 6AE4F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AE4F2 second address: 6AE506 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FD9C0C5540Dh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AE506 second address: 6AE50A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AE66B second address: 6AE670 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AE788 second address: 6AE78D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AE78D second address: 6AE793 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AE9F3 second address: 6AE9F8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AEB03 second address: 6AEB1F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0C55418h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AEB1F second address: 6AEB25 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AEC2D second address: 6AEC32 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AEC32 second address: 6AEC42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AEC42 second address: 6AEC49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AEC49 second address: 6AEC67 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0F4F5FAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d pushad 0x0000000e je 00007FD9C0F4F5F8h 0x00000014 push esi 0x00000015 pop esi 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AEC67 second address: 6AECBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD9C0C55418h 0x00000009 popad 0x0000000a popad 0x0000000b pop eax 0x0000000c push 00000000h 0x0000000e push ebp 0x0000000f call 00007FD9C0C55408h 0x00000014 pop ebp 0x00000015 mov dword ptr [esp+04h], ebp 0x00000019 add dword ptr [esp+04h], 0000001Bh 0x00000021 inc ebp 0x00000022 push ebp 0x00000023 ret 0x00000024 pop ebp 0x00000025 ret 0x00000026 mov edi, dword ptr [ebp+122D2CCBh] 0x0000002c push 9881B845h 0x00000031 push eax 0x00000032 push edx 0x00000033 push edi 0x00000034 push esi 0x00000035 pop esi 0x00000036 pop edi 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AF0BB second address: 6AF0BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AF55B second address: 6AF58D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007FD9C0C5540Ch 0x0000000e popad 0x0000000f popad 0x00000010 push eax 0x00000011 push esi 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FD9C0C55417h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AF58D second address: 6AF591 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AF6F6 second address: 6AF6FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E3A42 second address: 6E3A48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E3BBB second address: 6E3BBF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E3BBF second address: 6E3BD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD9C0F4F5FBh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E3BD0 second address: 6E3BD5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E3BD5 second address: 6E3BDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E3BDB second address: 6E3C04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FD9C0C55406h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jng 00007FD9C0C55408h 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FD9C0C55410h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E3C04 second address: 6E3C21 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0F4F609h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E3C21 second address: 6E3C26 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E3C26 second address: 6E3C43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD9C0F4F607h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E4123 second address: 6E412F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 popad 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E412F second address: 6E413A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FD9C0F4F5F6h 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E413A second address: 6E413F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E42A4 second address: 6E42B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD9C0F4F5FFh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E8E4E second address: 6E8E6C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007FD9C0C55416h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E9566 second address: 6E956C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E97E7 second address: 6E97ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E97ED second address: 6E9801 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 ja 00007FD9C0F4F5FAh 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d push esi 0x0000000e pop esi 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E9801 second address: 6E9811 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jnp 00007FD9C0C55406h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E9811 second address: 6E9815 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E9959 second address: 6E996B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 jl 00007FD9C0C5540Eh 0x0000000f push edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E9D36 second address: 6E9D43 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jnl 00007FD9C0F4F5F6h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6E87AA second address: 6E87C5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0C5540Ah 0x00000007 pushad 0x00000008 jns 00007FD9C0C55406h 0x0000000e jp 00007FD9C0C55406h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6EDDD0 second address: 6EDDD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6F6246 second address: 6F6268 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0C55416h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jno 00007FD9C0C55406h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6F6268 second address: 6F6298 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0F4F5FAh 0x00000007 jg 00007FD9C0F4F5F6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 jmp 00007FD9C0F4F601h 0x00000015 jnp 00007FD9C0F4F5F6h 0x0000001b popad 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 667159 second address: 667177 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD9C0C55414h 0x00000009 jg 00007FD9C0C55406h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 667177 second address: 66717B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6F5163 second address: 6F51A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FD9C0C55406h 0x0000000a pop eax 0x0000000b jns 00007FD9C0C5541Ah 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 jns 00007FD9C0C5540Eh 0x0000001a jmp 00007FD9C0C5540Bh 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6F51A4 second address: 6F51DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FD9C0F4F605h 0x00000008 jmp 00007FD9C0F4F608h 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6F52FB second address: 6F5305 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FD9C0C55406h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6F5305 second address: 6F5309 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6F5309 second address: 6F5323 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007FD9C0C5540Eh 0x0000000d push eax 0x0000000e push edx 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6F5323 second address: 6F5327 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6F573E second address: 6F5749 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6F5749 second address: 6F574D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6F5B4F second address: 6F5B61 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FD9C0C55408h 0x00000008 push eax 0x00000009 push edx 0x0000000a jno 00007FD9C0C55406h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6F5CBB second address: 6F5CC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edi 0x00000007 pop edi 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6F5CC4 second address: 6F5CC9 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6F82F0 second address: 6F82F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6FB43C second address: 6FB46C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jng 00007FD9C0C55406h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 pop edx 0x00000012 push ecx 0x00000013 push eax 0x00000014 pop eax 0x00000015 pop ecx 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FD9C0C55417h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6FB46C second address: 6FB472 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6FB472 second address: 6FB476 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 66F82B second address: 66F834 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6FB02C second address: 6FB030 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6FB030 second address: 6FB034 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6FCA35 second address: 6FCA3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edi 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 663B54 second address: 663B5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 663B5A second address: 663B71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FD9C0C55411h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 700970 second address: 70098C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FD9C0F4F603h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 700AE1 second address: 700AE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 700AE7 second address: 700B3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FD9C0F4F5F6h 0x0000000a popad 0x0000000b pushad 0x0000000c jmp 00007FD9C0F4F5FDh 0x00000011 pushad 0x00000012 popad 0x00000013 push esi 0x00000014 pop esi 0x00000015 push ebx 0x00000016 pop ebx 0x00000017 popad 0x00000018 jl 00007FD9C0F4F60Ah 0x0000001e jmp 00007FD9C0F4F604h 0x00000023 popad 0x00000024 push eax 0x00000025 push edx 0x00000026 jc 00007FD9C0F4F5FCh 0x0000002c ja 00007FD9C0F4F5F6h 0x00000032 jmp 00007FD9C0F4F5FFh 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 700B3F second address: 700B56 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007FD9C0C55412h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 700B56 second address: 700B61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push edx 0x0000000a pop edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 700DE9 second address: 700E27 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0C5540Ah 0x00000007 jg 00007FD9C0C55406h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 jmp 00007FD9C0C5540Ah 0x00000015 pop eax 0x00000016 jmp 00007FD9C0C55418h 0x0000001b popad 0x0000001c push eax 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 700E27 second address: 700E31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FD9C0F4F5F6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 700E31 second address: 700E35 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 707D9D second address: 707DA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 707DA1 second address: 707DA5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 707DA5 second address: 707DAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 70674B second address: 706754 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edx 0x00000007 pop edx 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 706754 second address: 706759 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 706759 second address: 706784 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jc 00007FD9C0C5542Eh 0x0000000f push eax 0x00000010 push edx 0x00000011 jp 00007FD9C0C55406h 0x00000017 jmp 00007FD9C0C55414h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 706A7E second address: 706A96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FD9C0F4F603h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AF2FE second address: 6AF303 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AF303 second address: 6AF361 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FD9C0F4F608h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e mov ecx, eax 0x00000010 push 00000004h 0x00000012 push 00000000h 0x00000014 push edx 0x00000015 call 00007FD9C0F4F5F8h 0x0000001a pop edx 0x0000001b mov dword ptr [esp+04h], edx 0x0000001f add dword ptr [esp+04h], 00000016h 0x00000027 inc edx 0x00000028 push edx 0x00000029 ret 0x0000002a pop edx 0x0000002b ret 0x0000002c xor dword ptr [ebp+122D2BD6h], ecx 0x00000032 nop 0x00000033 push eax 0x00000034 push edx 0x00000035 jmp 00007FD9C0F4F602h 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 6AF361 second address: 6AF37D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0C5540Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d jc 00007FD9C0C55406h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 706F1D second address: 706F26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 706F26 second address: 706F36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 70A625 second address: 70A629 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 70A629 second address: 70A645 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FD9C0C5540Eh 0x0000000d je 00007FD9C0C55406h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 70A645 second address: 70A64F instructions: 0x00000000 rdtsc 0x00000002 jp 00007FD9C0F4F5F6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 70A64F second address: 70A655 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 70A655 second address: 70A667 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0F4F5FCh 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 70A667 second address: 70A66D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 71226E second address: 712279 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 712279 second address: 71227D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 71227D second address: 712281 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 712281 second address: 712287 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7102B9 second address: 7102E6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0F4F604h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FD9C0F4F601h 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 710462 second address: 710466 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 710466 second address: 71046A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 71046A second address: 710474 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7108F4 second address: 7108FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7108FA second address: 710900 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 710900 second address: 71090A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 710EAA second address: 710EB1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 710EB1 second address: 710ED0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push edi 0x00000008 jmp 00007FD9C0F4F605h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7111ED second address: 7111F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7111F3 second address: 7111F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7111F7 second address: 7111FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 71175A second address: 71175E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 71175E second address: 711764 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 716FE0 second address: 716FF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD9C0F4F602h 0x00000009 pop edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 716FF7 second address: 716FFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 716FFD second address: 717016 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD9C0F4F605h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7161B9 second address: 7161C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 716305 second address: 71631D instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FD9C0F4F5FEh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 71631D second address: 716321 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 716321 second address: 716327 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 716497 second address: 7164AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FD9C0C55406h 0x0000000a jnp 00007FD9C0C55406h 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 push esi 0x00000014 pop esi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7164AC second address: 7164C3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 js 00007FD9C0F4F5F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 jc 00007FD9C0F4F5F6h 0x00000016 pop edi 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 716910 second address: 716916 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 716A33 second address: 716A39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 716D04 second address: 716D0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 716D0A second address: 716D0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 716D0E second address: 716D12 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 716D12 second address: 716D1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 716D1E second address: 716D22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 716D22 second address: 716D26 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 71B669 second address: 71B675 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FD9C0C55406h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 72484E second address: 724853 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 724853 second address: 72485F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FD9C0C55406h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 722E17 second address: 722E1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 722E1D second address: 722E2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 jnp 00007FD9C0C55406h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 722E2B second address: 722E30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7232EC second address: 723306 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FD9C0C55406h 0x0000000a popad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007FD9C0C5540Ah 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 723306 second address: 72330B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7235FB second address: 723600 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 723600 second address: 723607 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 729D80 second address: 729D86 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 736DD5 second address: 736DE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push edi 0x00000006 pop edi 0x00000007 pop eax 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 739B7D second address: 739B88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 739B88 second address: 739B8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 73CC2D second address: 73CC31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 66A6C2 second address: 66A6C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 66A6C8 second address: 66A6CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 66A6CE second address: 66A6D4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 66A6D4 second address: 66A6E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jl 00007FD9C0C55406h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 66A6E4 second address: 66A6FC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0F4F5FAh 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 66A6FC second address: 66A70A instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007FD9C0C55408h 0x0000000c push edx 0x0000000d pop edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 66A70A second address: 66A712 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 66A712 second address: 66A716 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 66A716 second address: 66A72A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jp 00007FD9C0F4F5F6h 0x0000000e js 00007FD9C0F4F5F6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 66A72A second address: 66A72E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 749AC5 second address: 749AC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 749AC9 second address: 749ACD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 749ACD second address: 749AEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD9C0F4F608h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 749AEB second address: 749B37 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jp 00007FD9C0C55406h 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d jmp 00007FD9C0C5540Eh 0x00000012 popad 0x00000013 jmp 00007FD9C0C55415h 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d jmp 00007FD9C0C5540Ch 0x00000022 pushad 0x00000023 popad 0x00000024 pushad 0x00000025 popad 0x00000026 push ebx 0x00000027 pop ebx 0x00000028 popad 0x00000029 push ebx 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 749B37 second address: 749B3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 749B3C second address: 749B43 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 751048 second address: 751060 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 pushad 0x00000008 jmp 00007FD9C0F4F5FEh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 74FAB9 second address: 74FAC7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jc 00007FD9C0C5540Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 74FAC7 second address: 74FACE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 74FACE second address: 74FAD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 74FC4C second address: 74FC60 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD9C0F4F5FEh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 74FC60 second address: 74FC64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 74FDB1 second address: 74FDC2 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jmp 00007FD9C0F4F5FBh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 74FF29 second address: 74FF39 instructions: 0x00000000 rdtsc 0x00000002 je 00007FD9C0C55406h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop esi 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 74FF39 second address: 74FF3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 750346 second address: 75034C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 75034C second address: 750358 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jg 00007FD9C0F4F5F6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 750358 second address: 75037C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0C55418h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jns 00007FD9C0C5540Ch 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 754A26 second address: 754A31 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7561F1 second address: 756211 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jnl 00007FD9C0C55406h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FD9C0C55410h 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 756211 second address: 756217 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 756217 second address: 756229 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FD9C0C55406h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 756229 second address: 75622F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 75622F second address: 75623E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 js 00007FD9C0C55406h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 75623E second address: 756244 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7560A4 second address: 7560A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7560A9 second address: 7560B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7560B1 second address: 7560B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7604A1 second address: 7604D0 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FD9C0F4F609h 0x00000008 jbe 00007FD9C0F4F5F8h 0x0000000e pushad 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 ja 00007FD9C0F4F5F8h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 765E4F second address: 765E6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD9C0C55410h 0x00000009 pushad 0x0000000a push esi 0x0000000b pop esi 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 765E6A second address: 765E9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FD9C0F4F5FFh 0x0000000b pushad 0x0000000c jmp 00007FD9C0F4F604h 0x00000011 jg 00007FD9C0F4F5F6h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 765E9C second address: 765EB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FD9C0C5540Dh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 765EB1 second address: 765EB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7743B5 second address: 7743BB instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7743BB second address: 7743CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a jc 00007FD9C0F4F5F6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7743CB second address: 7743EB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0C5540Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jc 00007FD9C0C5540Eh 0x0000000f jl 00007FD9C0C55406h 0x00000015 push edi 0x00000016 pop edi 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7743EB second address: 7743F0 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 774276 second address: 77427A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 77616C second address: 7761B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0F4F604h 0x00000007 jng 00007FD9C0F4F5F6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jmp 00007FD9C0F4F5FFh 0x00000014 push eax 0x00000015 push edx 0x00000016 push ebx 0x00000017 pop ebx 0x00000018 jmp 00007FD9C0F4F606h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7761B3 second address: 7761BD instructions: 0x00000000 rdtsc 0x00000002 jng 00007FD9C0C55406h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 78AEFD second address: 78AF16 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FD9C0F4F603h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 78AF16 second address: 78AF1B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 78AF1B second address: 78AF21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 78B076 second address: 78B07A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 78B337 second address: 78B352 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD9C0F4F607h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 78B352 second address: 78B358 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 78B358 second address: 78B361 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 78B361 second address: 78B389 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FD9C0C55406h 0x0000000a push edi 0x0000000b pop edi 0x0000000c popad 0x0000000d push edx 0x0000000e jno 00007FD9C0C55406h 0x00000014 pop edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FD9C0C55411h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 78B638 second address: 78B63D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 78B63D second address: 78B643 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 78B643 second address: 78B64D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FD9C0F4F5F6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 78B93F second address: 78B944 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 78B944 second address: 78B955 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FD9C0F4F5F8h 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 78BAC6 second address: 78BADA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD9C0C5540Fh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 78BADA second address: 78BAE8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jnp 00007FD9C0F4F5F6h 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push esi 0x0000000d pop esi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 78BAE8 second address: 78BAEE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 78BC28 second address: 78BC51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 jmp 00007FD9C0F4F609h 0x0000000a pop ecx 0x0000000b pop ecx 0x0000000c jnp 00007FD9C0F4F616h 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 790211 second address: 790217 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 7904FD second address: 790503 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 790503 second address: 790507 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 790507 second address: 790567 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0F4F608h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f js 00007FD9C0F4F603h 0x00000015 push edx 0x00000016 jmp 00007FD9C0F4F5FBh 0x0000001b pop edx 0x0000001c mov eax, dword ptr [eax] 0x0000001e pushad 0x0000001f jmp 00007FD9C0F4F5FCh 0x00000024 jo 00007FD9C0F4F601h 0x0000002a jmp 00007FD9C0F4F5FBh 0x0000002f popad 0x00000030 mov dword ptr [esp+04h], eax 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push ebx 0x00000038 pop ebx 0x00000039 pop eax 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 791D23 second address: 791D35 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD9C0C5540Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 791D35 second address: 791D43 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b pop edi 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 791D43 second address: 791D5A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD9C0C55413h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 791D5A second address: 791D7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FD9C0F4F608h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 791D7E second address: 791D82 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 791D82 second address: 791D8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\Y4svWfRK1L.exe | RDTSC instruction interceptor: First address: 791D8A second address: 791DA7 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FD9C0C55415h 0x00000008 pop ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d rdtsc |