Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2181742814.00000000057D7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2181742814.00000000057D7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: MaZjv5XeQi.exe, 00000000.00000003.2181742814.00000000057D7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2181742814.00000000057D7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2181742814.00000000057D7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: MaZjv5XeQi.exe, 00000000.00000003.2181742814.00000000057D7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2181742814.00000000057D7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: MaZjv5XeQi.exe, 00000000.00000003.2181742814.00000000057D7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2181742814.00000000057D7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133421540.0000000000FF3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133421540.0000000000FF3000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F5C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133421540.0000000000FF3000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F5C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: MaZjv5XeQi.exe, 00000000.00000003.2181742814.00000000057D7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2181742814.00000000057D7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2134675716.000000000575B000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2134560297.000000000575B000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2134507540.000000000575E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F5D000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F5C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg |
Source: MaZjv5XeQi.exe, 00000000.00000003.2183906163.00000000057AB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743. |
Source: MaZjv5XeQi.exe, 00000000.00000003.2183906163.00000000057AB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta |
Source: MaZjv5XeQi.exe, 00000000.00000003.2134675716.000000000575B000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2134560297.000000000575B000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2134507540.000000000575E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.fastly.( |
Source: MaZjv5XeQi.exe, 00000000.00000003.2134675716.000000000575B000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2134560297.000000000575B000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2134507540.000000000575E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: MaZjv5XeQi.exe, 00000000.00000003.2134675716.000000000575B000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2134560297.000000000575B000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2134507540.000000000575E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampow |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2209761021.0000000000FCB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.f |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F5C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap& |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F5C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133421540.0000000000FF3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F5C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F5C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F5C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=FRRi |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=oOCAGrkRfpQ6&l=e |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: MaZjv5XeQi.exe, 00000000.00000003.2183906163.00000000057AB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: MaZjv5XeQi.exe, 00000000.00000003.2183906163.00000000057AB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg |
Source: MaZjv5XeQi.exe, 00000000.00000003.2134675716.000000000575B000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2134560297.000000000575B000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2134507540.000000000575E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: MaZjv5XeQi.exe, 00000000.00000003.2134675716.000000000575B000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2134560297.000000000575B000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2134507540.000000000575E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: MaZjv5XeQi.exe, 00000000.00000003.2134675716.000000000575B000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2134560297.000000000575B000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2134507540.000000000575E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2209761021.0000000000FCB000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.sth |
Source: MaZjv5XeQi.exe, 00000000.00000003.2183906163.00000000057AB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi |
Source: MaZjv5XeQi.exe, 00000000.00000003.2240279376.0000000000FEE000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2286634992.0000000000FEE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/ |
Source: MaZjv5XeQi.exe, 00000000.00000002.2288722438.0000000000FF0000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2256416712.0000000000FE1000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2286575761.0000000000FE3000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2286634992.0000000000FEE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/5 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2233252191.00000000057B0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/MSWznTY69wwRW38B95 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2183906163.00000000057AF000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2182870338.00000000057AF000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2207101478.00000000057AF000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2181402365.00000000057AF000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2206927029.00000000057AC000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2206818863.00000000057AC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/MSWznTY69wwRW38B95- |
Source: MaZjv5XeQi.exe, 00000000.00000003.2180876019.00000000057AC000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2180972685.00000000057AC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/MSWznTY69wwRW38B95y2 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2209596373.0000000000F8E000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000002.2288412972.0000000000F8E000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2209761021.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2233422671.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/PPL |
Source: MaZjv5XeQi.exe, 00000000.00000002.2288722438.0000000000FF0000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2256416712.0000000000FE1000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2286575761.0000000000FE3000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2286634992.0000000000FEE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/U |
Source: MaZjv5XeQi.exe, 00000000.00000002.2288412972.0000000000F8E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/V4 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2207101478.00000000057AF000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2206927029.00000000057AC000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2206818863.00000000057AC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/WC |
Source: MaZjv5XeQi.exe, 00000000.00000003.2256416712.0000000000FFE000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000002.2288722438.0000000000FFE000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2158093066.000000000579D000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2158038574.000000000579B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api |
Source: MaZjv5XeQi.exe, 00000000.00000003.2180876019.00000000057AC000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2180972685.00000000057AC000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2181402365.00000000057AF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api0GUP |
Source: MaZjv5XeQi.exe, 00000000.00000002.2288412972.0000000000F8E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apia3 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F7A000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F7A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apih3 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2286706213.0000000000FFE000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000002.2288722438.0000000000FFE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apis |
Source: MaZjv5XeQi.exe, 00000000.00000003.2233712383.0000000000FFE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apita |
Source: MaZjv5XeQi.exe, 00000000.00000003.2233712383.0000000000FFE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apixI |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F62000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/pi |
Source: MaZjv5XeQi.exe, 00000000.00000003.2256416712.0000000000FE1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/piy7 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2233422671.0000000000FE9000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2240279376.0000000000FEE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/sy7 |
Source: MaZjv5XeQi.exe, 00000000.00000002.2288722438.0000000000FF0000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2286575761.0000000000FE3000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2286634992.0000000000FEE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/u |
Source: MaZjv5XeQi.exe, 00000000.00000003.2256416712.0000000000FCF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com:443/api |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2209761021.0000000000FCB000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steamp |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2209761021.0000000000FCB000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2209761021.0000000000FCB000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2209761021.0000000000FCB000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaizedH |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: MaZjv5XeQi.exe, 00000000.00000003.2209761021.0000000000FCB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamai |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2209761021.0000000000FCB000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133421540.0000000000FF3000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F5C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F5D000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F5C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133421540.0000000000FF3000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F5C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2182887020.0000000005A4B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: MaZjv5XeQi.exe, 00000000.00000003.2182887020.0000000005A4B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: MaZjv5XeQi.exe, 00000000.00000003.2183906163.00000000057AB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2183906163.00000000057AB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref |
Source: MaZjv5XeQi.exe, 00000000.00000003.2134675716.000000000575B000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2134560297.000000000575B000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2134507540.000000000575E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: MaZjv5XeQi.exe, 00000000.00000003.2134675716.000000000575B000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2134560297.000000000575B000.00000004.00000800.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2134507540.000000000575E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptc8 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: MaZjv5XeQi.exe, 00000000.00000003.2182887020.0000000005A4B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc |
Source: MaZjv5XeQi.exe, 00000000.00000003.2182887020.0000000005A4B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6 |
Source: MaZjv5XeQi.exe, 00000000.00000003.2182887020.0000000005A4B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: MaZjv5XeQi.exe, 00000000.00000003.2182887020.0000000005A4B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: MaZjv5XeQi.exe, 00000000.00000003.2182887020.0000000005A4B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg |
Source: MaZjv5XeQi.exe, 00000000.00000003.2182887020.0000000005A4B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: MaZjv5XeQi.exe, 00000000.00000003.2109950925.0000000000FE5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133467310.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2133542183.0000000000F91000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: MaZjv5XeQi.exe, 00000000.00000003.2110141184.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, MaZjv5XeQi.exe, 00000000.00000003.2110007130.0000000000F8F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B6E0E7 second address: B6E0EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B6E36C second address: B6E372 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B6E372 second address: B6E382 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 js 00007FEB1C7EA9D6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B6E382 second address: B6E388 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B6E388 second address: B6E38C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B6E646 second address: B6E663 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FEB1CC19F7Ah 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FEB1CC19F7Dh 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B6E663 second address: B6E66D instructions: 0x00000000 rdtsc 0x00000002 jl 00007FEB1C7EA9D6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B6E7A0 second address: B6E7A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B70FEF second address: B71089 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FEB1C7EA9EDh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xor dword ptr [esp], 05984120h 0x00000011 mov dword ptr [ebp+122D2DEFh], ecx 0x00000017 push 00000003h 0x00000019 push 00000000h 0x0000001b push esi 0x0000001c call 00007FEB1C7EA9D8h 0x00000021 pop esi 0x00000022 mov dword ptr [esp+04h], esi 0x00000026 add dword ptr [esp+04h], 00000016h 0x0000002e inc esi 0x0000002f push esi 0x00000030 ret 0x00000031 pop esi 0x00000032 ret 0x00000033 push 00000000h 0x00000035 push ebx 0x00000036 jnl 00007FEB1C7EA9DAh 0x0000003c pop edi 0x0000003d push 00000003h 0x0000003f push 00000000h 0x00000041 push ecx 0x00000042 call 00007FEB1C7EA9D8h 0x00000047 pop ecx 0x00000048 mov dword ptr [esp+04h], ecx 0x0000004c add dword ptr [esp+04h], 00000018h 0x00000054 inc ecx 0x00000055 push ecx 0x00000056 ret 0x00000057 pop ecx 0x00000058 ret 0x00000059 mov dword ptr [ebp+122D30DFh], edi 0x0000005f jnl 00007FEB1C7EA9D7h 0x00000065 push DCF89795h 0x0000006a pushad 0x0000006b pushad 0x0000006c ja 00007FEB1C7EA9D6h 0x00000072 push eax 0x00000073 push edx 0x00000074 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B71224 second address: B71228 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B71228 second address: B71236 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B71236 second address: B7123C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B7123C second address: B712BE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9E3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push eax 0x0000000d call 00007FEB1C7EA9D8h 0x00000012 pop eax 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 add dword ptr [esp+04h], 0000001Bh 0x0000001f inc eax 0x00000020 push eax 0x00000021 ret 0x00000022 pop eax 0x00000023 ret 0x00000024 mov dword ptr [ebp+122D2BFBh], ebx 0x0000002a mov esi, dword ptr [ebp+122D363Ch] 0x00000030 push 00000000h 0x00000032 push 00000000h 0x00000034 push edx 0x00000035 call 00007FEB1C7EA9D8h 0x0000003a pop edx 0x0000003b mov dword ptr [esp+04h], edx 0x0000003f add dword ptr [esp+04h], 00000015h 0x00000047 inc edx 0x00000048 push edx 0x00000049 ret 0x0000004a pop edx 0x0000004b ret 0x0000004c mov ecx, 653FFDE1h 0x00000051 push F249E4FCh 0x00000056 push eax 0x00000057 push edx 0x00000058 jmp 00007FEB1C7EA9E0h 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B712BE second address: B712C3 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B712C3 second address: B71355 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 add dword ptr [esp], 0DB61B84h 0x0000000e mov dword ptr [ebp+122D3004h], edi 0x00000014 push 00000003h 0x00000016 push ebx 0x00000017 pop ecx 0x00000018 push 00000000h 0x0000001a push edi 0x0000001b jno 00007FEB1C7EA9DCh 0x00000021 pop esi 0x00000022 push 00000003h 0x00000024 push 00000000h 0x00000026 push ebp 0x00000027 call 00007FEB1C7EA9D8h 0x0000002c pop ebp 0x0000002d mov dword ptr [esp+04h], ebp 0x00000031 add dword ptr [esp+04h], 0000001Bh 0x00000039 inc ebp 0x0000003a push ebp 0x0000003b ret 0x0000003c pop ebp 0x0000003d ret 0x0000003e push BA5BAF72h 0x00000043 jmp 00007FEB1C7EA9E9h 0x00000048 add dword ptr [esp], 05A4508Eh 0x0000004f mov dword ptr [ebp+122D32E6h], edi 0x00000055 mov esi, ebx 0x00000057 lea ebx, dword ptr [ebp+1244BEC0h] 0x0000005d movzx edx, si 0x00000060 xchg eax, ebx 0x00000061 push eax 0x00000062 push edx 0x00000063 jnp 00007FEB1C7EA9DCh 0x00000069 jnp 00007FEB1C7EA9D6h 0x0000006f rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B906B9 second address: B906D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEB1CC19F80h 0x00000009 jl 00007FEB1CC19F76h 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B906D4 second address: B9071D instructions: 0x00000000 rdtsc 0x00000002 js 00007FEB1C7EA9F4h 0x00000008 jmp 00007FEB1C7EA9DEh 0x0000000d jmp 00007FEB1C7EA9E0h 0x00000012 jmp 00007FEB1C7EA9E5h 0x00000017 pop edx 0x00000018 pop eax 0x00000019 pushad 0x0000001a pushad 0x0000001b jo 00007FEB1C7EA9D6h 0x00000021 pushad 0x00000022 popad 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B9071D second address: B90747 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FEB1CC19F86h 0x0000000a pushad 0x0000000b jp 00007FEB1CC19F76h 0x00000011 jnc 00007FEB1CC19F76h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B90C90 second address: B90C98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B90C98 second address: B90CA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnl 00007FEB1CC19F78h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B90CA5 second address: B90CAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B90CAB second address: B90CC0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1CC19F81h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B88584 second address: B88588 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B88588 second address: B885AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jo 00007FEB1CC19F76h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007FEB1CC19F85h 0x00000012 push edi 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B915CF second address: B915D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B91B87 second address: B91B8D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B91B8D second address: B91B9C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnl 00007FEB1C7EA9D6h 0x00000009 push edx 0x0000000a pop edx 0x0000000b popad 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B91B9C second address: B91BB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 jmp 00007FEB1CC19F81h 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B91BB9 second address: B91BC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FEB1C7EA9D6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B91BC3 second address: B91BC7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B91D06 second address: B91D2B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FEB1C7EA9DAh 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FEB1C7EA9E3h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B94537 second address: B9453D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B9453D second address: B94541 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B95FB9 second address: B95FBF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B95FBF second address: B95FFA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9E3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f pushad 0x00000010 jbe 00007FEB1C7EA9E0h 0x00000016 jmp 00007FEB1C7EA9DAh 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007FEB1C7EA9DBh 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B9937F second address: B99384 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B5EC03 second address: B5EC09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B9C7E4 second address: B9C809 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FEB1CC19F85h 0x00000008 push edx 0x00000009 jmp 00007FEB1CC19F7Bh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B9C947 second address: B9C959 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 jbe 00007FEB1C7EA9D6h 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B9C959 second address: B9C967 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 jno 00007FEB1CC19F76h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B9C967 second address: B9C97C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FEB1C7EA9DEh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B9C97C second address: B9C980 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B9CD3D second address: B9CD43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B9CEA1 second address: B9CEA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B9CEA7 second address: B9CEAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B9CEAC second address: B9CEB1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B9ECC5 second address: B9ECD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pushad 0x0000000a popad 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B9F3CF second address: B9F3D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA0598 second address: BA059C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA046E second address: BA0474 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA059C second address: BA0623 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 js 00007FEB1C7EA9E9h 0x0000000e nop 0x0000000f push 00000000h 0x00000011 push ecx 0x00000012 call 00007FEB1C7EA9D8h 0x00000017 pop ecx 0x00000018 mov dword ptr [esp+04h], ecx 0x0000001c add dword ptr [esp+04h], 00000016h 0x00000024 inc ecx 0x00000025 push ecx 0x00000026 ret 0x00000027 pop ecx 0x00000028 ret 0x00000029 sub dword ptr [ebp+122D208Bh], eax 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 push ebx 0x00000034 call 00007FEB1C7EA9D8h 0x00000039 pop ebx 0x0000003a mov dword ptr [esp+04h], ebx 0x0000003e add dword ptr [esp+04h], 00000015h 0x00000046 inc ebx 0x00000047 push ebx 0x00000048 ret 0x00000049 pop ebx 0x0000004a ret 0x0000004b push 00000000h 0x0000004d jmp 00007FEB1C7EA9E6h 0x00000052 xchg eax, ebx 0x00000053 pushad 0x00000054 push eax 0x00000055 push edx 0x00000056 jnp 00007FEB1C7EA9D6h 0x0000005c rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA0623 second address: BA062D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA062D second address: BA0631 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA0DB0 second address: BA0DB6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA2131 second address: BA2144 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FEB1C7EA9DFh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA0DB6 second address: BA0DBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA2144 second address: BA2148 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA2148 second address: BA2156 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA4C1D second address: BA4CA0 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FEB1C7EA9D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edi 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push ebx 0x0000000f call 00007FEB1C7EA9D8h 0x00000014 pop ebx 0x00000015 mov dword ptr [esp+04h], ebx 0x00000019 add dword ptr [esp+04h], 0000001Ah 0x00000021 inc ebx 0x00000022 push ebx 0x00000023 ret 0x00000024 pop ebx 0x00000025 ret 0x00000026 mov esi, 5729860Fh 0x0000002b push 00000000h 0x0000002d push 00000000h 0x0000002f push esi 0x00000030 call 00007FEB1C7EA9D8h 0x00000035 pop esi 0x00000036 mov dword ptr [esp+04h], esi 0x0000003a add dword ptr [esp+04h], 0000001Dh 0x00000042 inc esi 0x00000043 push esi 0x00000044 ret 0x00000045 pop esi 0x00000046 ret 0x00000047 push 00000000h 0x00000049 push 00000000h 0x0000004b push ebx 0x0000004c call 00007FEB1C7EA9D8h 0x00000051 pop ebx 0x00000052 mov dword ptr [esp+04h], ebx 0x00000056 add dword ptr [esp+04h], 00000014h 0x0000005e inc ebx 0x0000005f push ebx 0x00000060 ret 0x00000061 pop ebx 0x00000062 ret 0x00000063 and si, E914h 0x00000068 push eax 0x00000069 push eax 0x0000006a push edx 0x0000006b push eax 0x0000006c push eax 0x0000006d push edx 0x0000006e rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA4CA0 second address: BA4CA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BAE659 second address: BAE66B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9DEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BAE66B second address: BAE671 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BAE671 second address: BAE675 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BAE675 second address: BAE694 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jnc 00007FEB1CC19F7Ch 0x00000010 pushad 0x00000011 jno 00007FEB1CC19F76h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BAE694 second address: BAE6FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 nop 0x00000007 or bx, 8D4Fh 0x0000000c push 00000000h 0x0000000e push 00000000h 0x00000010 push ecx 0x00000011 call 00007FEB1C7EA9D8h 0x00000016 pop ecx 0x00000017 mov dword ptr [esp+04h], ecx 0x0000001b add dword ptr [esp+04h], 00000017h 0x00000023 inc ecx 0x00000024 push ecx 0x00000025 ret 0x00000026 pop ecx 0x00000027 ret 0x00000028 push ebx 0x00000029 pop edi 0x0000002a push 00000000h 0x0000002c push 00000000h 0x0000002e push eax 0x0000002f call 00007FEB1C7EA9D8h 0x00000034 pop eax 0x00000035 mov dword ptr [esp+04h], eax 0x00000039 add dword ptr [esp+04h], 00000014h 0x00000041 inc eax 0x00000042 push eax 0x00000043 ret 0x00000044 pop eax 0x00000045 ret 0x00000046 push eax 0x00000047 push eax 0x00000048 push edx 0x00000049 pushad 0x0000004a jmp 00007FEB1C7EA9E2h 0x0000004f pushad 0x00000050 popad 0x00000051 popad 0x00000052 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA3EAE second address: BA3EEE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1CC19F7Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push edi 0x0000000c jmp 00007FEB1CC19F89h 0x00000011 pop edi 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FEB1CC19F83h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA49E2 second address: BA49E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB254F second address: BB2553 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB3599 second address: BB35A7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jno 00007FEB1C7EA9D6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BAA7C8 second address: BAA7E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a jnl 00007FEB1CC19F76h 0x00000010 popad 0x00000011 popad 0x00000012 push eax 0x00000013 push eax 0x00000014 push edx 0x00000015 push edx 0x00000016 jno 00007FEB1CC19F76h 0x0000001c pop edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BAC8B6 second address: BAC8BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BAD935 second address: BAD944 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BAF822 second address: BAF831 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 pushad 0x00000007 jng 00007FEB1C7EA9DCh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BAC8BC second address: BAC8C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BAD944 second address: BAD948 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB4585 second address: BB458B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB078F second address: BB084E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 js 00007FEB1C7EA9D6h 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f push 00000000h 0x00000011 push edi 0x00000012 call 00007FEB1C7EA9D8h 0x00000017 pop edi 0x00000018 mov dword ptr [esp+04h], edi 0x0000001c add dword ptr [esp+04h], 0000001Ah 0x00000024 inc edi 0x00000025 push edi 0x00000026 ret 0x00000027 pop edi 0x00000028 ret 0x00000029 jno 00007FEB1C7EA9DCh 0x0000002f push dword ptr fs:[00000000h] 0x00000036 sub edi, dword ptr [ebp+122D203Bh] 0x0000003c mov dword ptr fs:[00000000h], esp 0x00000043 jmp 00007FEB1C7EA9DCh 0x00000048 mov eax, dword ptr [ebp+122D0AFDh] 0x0000004e call 00007FEB1C7EA9DEh 0x00000053 push ecx 0x00000054 xor bx, 3400h 0x00000059 pop ebx 0x0000005a pop ebx 0x0000005b jmp 00007FEB1C7EA9DFh 0x00000060 push FFFFFFFFh 0x00000062 push 00000000h 0x00000064 push esi 0x00000065 call 00007FEB1C7EA9D8h 0x0000006a pop esi 0x0000006b mov dword ptr [esp+04h], esi 0x0000006f add dword ptr [esp+04h], 00000018h 0x00000077 inc esi 0x00000078 push esi 0x00000079 ret 0x0000007a pop esi 0x0000007b ret 0x0000007c jmp 00007FEB1C7EA9E0h 0x00000081 push eax 0x00000082 pushad 0x00000083 pushad 0x00000084 push eax 0x00000085 push edx 0x00000086 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BAF831 second address: BAF83D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jnl 00007FEB1CC19F76h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BAC8C0 second address: BAC8E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9E8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BAD948 second address: BAD94E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB084E second address: BB0861 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEB1C7EA9DBh 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BAC8E5 second address: BAC8E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BAF83D second address: BAF8D1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 or dword ptr [ebp+1244FA5Eh], edx 0x0000000e push dword ptr fs:[00000000h] 0x00000015 mov di, ax 0x00000018 mov dword ptr fs:[00000000h], esp 0x0000001f push 00000000h 0x00000021 push edx 0x00000022 call 00007FEB1C7EA9D8h 0x00000027 pop edx 0x00000028 mov dword ptr [esp+04h], edx 0x0000002c add dword ptr [esp+04h], 00000018h 0x00000034 inc edx 0x00000035 push edx 0x00000036 ret 0x00000037 pop edx 0x00000038 ret 0x00000039 mov dword ptr [ebp+12458033h], ecx 0x0000003f mov eax, dword ptr [ebp+122D0B09h] 0x00000045 push 00000000h 0x00000047 push edx 0x00000048 call 00007FEB1C7EA9D8h 0x0000004d pop edx 0x0000004e mov dword ptr [esp+04h], edx 0x00000052 add dword ptr [esp+04h], 00000019h 0x0000005a inc edx 0x0000005b push edx 0x0000005c ret 0x0000005d pop edx 0x0000005e ret 0x0000005f jmp 00007FEB1C7EA9DCh 0x00000064 push FFFFFFFFh 0x00000066 jnc 00007FEB1C7EA9DAh 0x0000006c nop 0x0000006d pushad 0x0000006e pushad 0x0000006f pushad 0x00000070 popad 0x00000071 jng 00007FEB1C7EA9D6h 0x00000077 popad 0x00000078 push eax 0x00000079 push edx 0x0000007a push eax 0x0000007b pop eax 0x0000007c rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB3747 second address: BB374C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BAC8E9 second address: BAC8EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB1881 second address: BB1888 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB55DF second address: BB567F instructions: 0x00000000 rdtsc 0x00000002 jno 00007FEB1C7EA9D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d mov di, F36Ch 0x00000011 push dword ptr fs:[00000000h] 0x00000018 mov di, dx 0x0000001b mov dword ptr fs:[00000000h], esp 0x00000022 push 00000000h 0x00000024 push edi 0x00000025 call 00007FEB1C7EA9D8h 0x0000002a pop edi 0x0000002b mov dword ptr [esp+04h], edi 0x0000002f add dword ptr [esp+04h], 00000016h 0x00000037 inc edi 0x00000038 push edi 0x00000039 ret 0x0000003a pop edi 0x0000003b ret 0x0000003c jc 00007FEB1C7EA9DCh 0x00000042 xor dword ptr [ebp+122D1954h], eax 0x00000048 mov ebx, dword ptr [ebp+12445D6Ah] 0x0000004e mov eax, dword ptr [ebp+122D0629h] 0x00000054 sub ebx, 787403E4h 0x0000005a add edi, dword ptr [ebp+122D37BCh] 0x00000060 push FFFFFFFFh 0x00000062 push 00000000h 0x00000064 push ebx 0x00000065 call 00007FEB1C7EA9D8h 0x0000006a pop ebx 0x0000006b mov dword ptr [esp+04h], ebx 0x0000006f add dword ptr [esp+04h], 00000019h 0x00000077 inc ebx 0x00000078 push ebx 0x00000079 ret 0x0000007a pop ebx 0x0000007b ret 0x0000007c nop 0x0000007d jmp 00007FEB1C7EA9E1h 0x00000082 push eax 0x00000083 push eax 0x00000084 push edx 0x00000085 push eax 0x00000086 push edx 0x00000087 push eax 0x00000088 push edx 0x00000089 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB567F second address: BB5683 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB5683 second address: BB5687 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB7503 second address: BB7507 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB5687 second address: BB568D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB7507 second address: BB750D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB750D second address: BB7513 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB7513 second address: BB7566 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a js 00007FEB1CC19F78h 0x00000010 pushad 0x00000011 popad 0x00000012 jno 00007FEB1CC19F7Ch 0x00000018 popad 0x00000019 nop 0x0000001a cmc 0x0000001b mov dword ptr [ebp+122D2372h], edx 0x00000021 push 00000000h 0x00000023 push 00000000h 0x00000025 push ebp 0x00000026 call 00007FEB1CC19F78h 0x0000002b pop ebp 0x0000002c mov dword ptr [esp+04h], ebp 0x00000030 add dword ptr [esp+04h], 00000017h 0x00000038 inc ebp 0x00000039 push ebp 0x0000003a ret 0x0000003b pop ebp 0x0000003c ret 0x0000003d push 00000000h 0x0000003f movzx ebx, dx 0x00000042 push eax 0x00000043 push ebx 0x00000044 push eax 0x00000045 push edx 0x00000046 push eax 0x00000047 push edx 0x00000048 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB7566 second address: BB756A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB756A second address: BB756E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB76E1 second address: BB76E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BB76E5 second address: BB76F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 jns 00007FEB1CC19F76h 0x0000000f pop eax 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BBBE95 second address: BBBE99 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BBBE99 second address: BBBE9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BBBE9F second address: BBBEAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007FEB1C7EA9DEh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BBED7E second address: BBED84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B5D13C second address: B5D140 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BC2542 second address: BC2550 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1CC19F7Ah 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BC2550 second address: BC256D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 ja 00007FEB1C7EA9D6h 0x0000000e jmp 00007FEB1C7EA9DFh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BC256D second address: BC257B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jg 00007FEB1CC19F76h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BC26E4 second address: BC26F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push ecx 0x00000008 jc 00007FEB1C7EA9D6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BC2986 second address: BC298A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BC298A second address: BC29A6 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FEB1C7EA9D6h 0x00000008 jnp 00007FEB1C7EA9D6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 js 00007FEB1C7EA9DCh 0x00000016 jno 00007FEB1C7EA9D6h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BC29A6 second address: BC29AD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BC29AD second address: BC29ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FEB1C7EA9E7h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jbe 00007FEB1C7EA9DCh 0x00000014 pushad 0x00000015 jg 00007FEB1C7EA9D6h 0x0000001b jl 00007FEB1C7EA9D6h 0x00000021 jno 00007FEB1C7EA9D6h 0x00000027 popad 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BC5EDE second address: BC5EF9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1CC19F7Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b ja 00007FEB1CC19F76h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BC5EF9 second address: BC5EFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BCC13C second address: BCC154 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1CC19F7Eh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BCC2C3 second address: BCC2C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BCC2C7 second address: BCC2CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BCC2CD second address: BCC2D2 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BCC59F second address: BCC5AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push ecx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BCC717 second address: BCC74B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEB1C7EA9E2h 0x00000009 pop edi 0x0000000a pushad 0x0000000b push edi 0x0000000c pop edi 0x0000000d jmp 00007FEB1C7EA9E8h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BCC74B second address: BCC752 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BCCBBE second address: BCCBDD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FEB1C7EA9E9h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD0791 second address: BD0797 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD5AA1 second address: BD5AA9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD5AA9 second address: BD5AAD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD5AAD second address: BD5ABE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 pushad 0x00000008 popad 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD5ABE second address: BD5AC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD5C3D second address: BD5C41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD5C41 second address: BD5C4B instructions: 0x00000000 rdtsc 0x00000002 jc 00007FEB1CC19F76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD60AA second address: BD60BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop esi 0x00000006 ja 00007FEB1C7EA9F6h 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD60BA second address: BD60CC instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FEB1CC19F76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jnp 00007FEB1CC19F76h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD60CC second address: BD60D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD6236 second address: BD6244 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FEB1CC19F76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD5788 second address: BD5795 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push edi 0x0000000c pop edi 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD5795 second address: BD57B2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1CC19F82h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d push esi 0x0000000e pop esi 0x0000000f pop edi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD57B2 second address: BD57B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD57B8 second address: BD57BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD57BC second address: BD57CB instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 ja 00007FEB1C7EA9D6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD64E1 second address: BD64E6 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD6A52 second address: BD6A70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEB1C7EA9E8h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD6A70 second address: BD6A76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD6A76 second address: BD6A87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FEB1C7EA9DCh 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD6A87 second address: BD6ABB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FEB1CC19F7Dh 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007FEB1CC19F84h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 jne 00007FEB1CC19F86h 0x00000018 pushad 0x00000019 pushad 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BD6ABB second address: BD6AC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDC68D second address: BDC693 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDC693 second address: BDC697 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDB344 second address: BDB35E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FEB1CC19F82h 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDB35E second address: BDB39C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEB1C7EA9E1h 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FEB1C7EA9E8h 0x00000011 jmp 00007FEB1C7EA9DEh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDB4F9 second address: BDB4FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDB8EF second address: BDB91D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop ecx 0x00000007 jmp 00007FEB1C7EA9E1h 0x0000000c jmp 00007FEB1C7EA9DEh 0x00000011 popad 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 push esi 0x00000018 pop esi 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDBBD9 second address: BDBBF3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007FEB1CC19F7Eh 0x0000000c jno 00007FEB1CC19F76h 0x00000012 push edx 0x00000013 pop edx 0x00000014 push eax 0x00000015 push edx 0x00000016 push edi 0x00000017 pop edi 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDBBF3 second address: BDBC4F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9E7h 0x00000007 ja 00007FEB1C7EA9D6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 jmp 00007FEB1C7EA9E4h 0x00000017 jmp 00007FEB1C7EA9E9h 0x0000001c popad 0x0000001d popad 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 jnl 00007FEB1C7EA9D6h 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDBEF3 second address: BDBEF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDBEF7 second address: BDBF04 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDC024 second address: BDC036 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1CC19F7Ch 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDC036 second address: BDC03E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDC03E second address: BDC042 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDC042 second address: BDC046 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDC046 second address: BDC05A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jc 00007FEB1CC19F82h 0x0000000c jl 00007FEB1CC19F76h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B891B1 second address: B891B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: B891B7 second address: B891CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEB1CC19F7Dh 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDC4EB second address: BDC4FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FEB1C7EA9D6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push edx 0x0000000e pop edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDC4FA second address: BDC4FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDC4FE second address: BDC50E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FEB1C7EA9D6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDC50E second address: BDC514 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BDAE54 second address: BDAE64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FEB1C7EA9D6h 0x0000000a pop edx 0x0000000b pushad 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BE00D2 second address: BE00F9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1CC19F7Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FEB1CC19F86h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BE00F9 second address: BE011F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jc 00007FEB1C7EA9D6h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jg 00007FEB1C7EA9EDh 0x00000013 jmp 00007FEB1C7EA9E1h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA7530 second address: BA755B instructions: 0x00000000 rdtsc 0x00000002 jns 00007FEB1CC19F78h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d mov edi, dword ptr [ebp+122D2284h] 0x00000013 lea eax, dword ptr [ebp+124822C2h] 0x00000019 sub dword ptr [ebp+122D310Fh], esi 0x0000001f nop 0x00000020 push esi 0x00000021 push esi 0x00000022 push ebx 0x00000023 pop ebx 0x00000024 pop esi 0x00000025 pop esi 0x00000026 push eax 0x00000027 pushad 0x00000028 push edi 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA755B second address: BA757A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FEB1C7EA9E8h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA757A second address: B885AD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ecx 0x0000000b call 00007FEB1CC19F78h 0x00000010 pop ecx 0x00000011 mov dword ptr [esp+04h], ecx 0x00000015 add dword ptr [esp+04h], 00000015h 0x0000001d inc ecx 0x0000001e push ecx 0x0000001f ret 0x00000020 pop ecx 0x00000021 ret 0x00000022 call 00007FEB1CC19F86h 0x00000027 adc di, A3C1h 0x0000002c pop edi 0x0000002d call dword ptr [ebp+124484DEh] 0x00000033 jbe 00007FEB1CC19F90h 0x00000039 pushad 0x0000003a jmp 00007FEB1CC19F85h 0x0000003f push edi 0x00000040 push eax 0x00000041 push edx 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA7993 second address: 9F88B1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9E9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FEB1C7EA9E4h 0x0000000f nop 0x00000010 jmp 00007FEB1C7EA9E0h 0x00000015 push dword ptr [ebp+122D1251h] 0x0000001b mov dx, 81BBh 0x0000001f call dword ptr [ebp+122D2844h] 0x00000025 pushad 0x00000026 stc 0x00000027 xor eax, eax 0x00000029 pushad 0x0000002a movzx edx, cx 0x0000002d mov ebx, 26BB5576h 0x00000032 popad 0x00000033 mov edx, dword ptr [esp+28h] 0x00000037 mov dword ptr [ebp+122D3035h], edi 0x0000003d mov dword ptr [ebp+122D36C8h], eax 0x00000043 stc 0x00000044 jmp 00007FEB1C7EA9DCh 0x00000049 mov esi, 0000003Ch 0x0000004e jmp 00007FEB1C7EA9E7h 0x00000053 add esi, dword ptr [esp+24h] 0x00000057 jmp 00007FEB1C7EA9DFh 0x0000005c lodsw 0x0000005e xor dword ptr [ebp+122D3035h], ebx 0x00000064 add eax, dword ptr [esp+24h] 0x00000068 jmp 00007FEB1C7EA9E2h 0x0000006d jmp 00007FEB1C7EA9E9h 0x00000072 mov ebx, dword ptr [esp+24h] 0x00000076 or dword ptr [ebp+122D3035h], edi 0x0000007c push eax 0x0000007d jo 00007FEB1C7EA9E2h 0x00000083 jbe 00007FEB1C7EA9DCh 0x00000089 push eax 0x0000008a push edx 0x0000008b rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA7EFF second address: BA7F11 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1CC19F7Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA8411 second address: BA841F instructions: 0x00000000 rdtsc 0x00000002 jl 00007FEB1C7EA9D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA841F second address: BA8423 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA87D4 second address: BA87E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA87E1 second address: BA87E7 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BE03E5 second address: BE0400 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEB1C7EA9DAh 0x00000009 popad 0x0000000a pop edx 0x0000000b pushad 0x0000000c jc 00007FEB1C7EA9DEh 0x00000012 push edx 0x00000013 pop edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BE0C9D second address: BE0CA3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BE0CA3 second address: BE0CA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BE0CA9 second address: BE0CAD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BE0E13 second address: BE0E1F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 push esi 0x00000006 pop esi 0x00000007 pop esi 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BE67FC second address: BE6841 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FEB1CC19F7Ch 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e jmp 00007FEB1CC19F7Fh 0x00000013 popad 0x00000014 jl 00007FEB1CC19F95h 0x0000001a jng 00007FEB1CC19F87h 0x00000020 jmp 00007FEB1CC19F81h 0x00000025 push eax 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BE638F second address: BE6394 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BE6394 second address: BE63AF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FEB1CC19F86h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BE9309 second address: BE930F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BEAF86 second address: BEAF8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BF25F0 second address: BF2608 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9E4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BF2608 second address: BF2626 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FEB1CC19F89h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BF2A11 second address: BF2A19 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push edx 0x00000007 pop edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BF2A19 second address: BF2A4C instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 jmp 00007FEB1CC19F7Fh 0x0000000c jmp 00007FEB1CC19F81h 0x00000011 pop edi 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push ebx 0x00000015 push eax 0x00000016 push edx 0x00000017 jg 00007FEB1CC19F76h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BF6D66 second address: BF6D91 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FEB1C7EA9DDh 0x00000008 jo 00007FEB1C7EA9D6h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 js 00007FEB1C7EA9D8h 0x00000019 pushad 0x0000001a popad 0x0000001b jp 00007FEB1C7EA9D8h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BF6D91 second address: BF6D97 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BF6D97 second address: BF6DC1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9DEh 0x00000007 jmp 00007FEB1C7EA9E5h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BF672C second address: BF6730 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BF6730 second address: BF6734 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BF69CE second address: BF69DE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jp 00007FEB1CC19F7Ah 0x0000000c push esi 0x0000000d pop esi 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BF69DE second address: BF69E3 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BF69E3 second address: BF69ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BFADD8 second address: BFADEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FEB1C7EA9DBh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BFA45B second address: BFA496 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jmp 00007FEB1CC19F7Eh 0x0000000a jg 00007FEB1CC19F82h 0x00000010 popad 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 push edi 0x00000015 pop edi 0x00000016 jmp 00007FEB1CC19F80h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BFA64E second address: BFA66F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jnp 00007FEB1C7EA9DAh 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 pushad 0x00000017 popad 0x00000018 jnp 00007FEB1C7EA9D6h 0x0000001e push esi 0x0000001f pop esi 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BFA66F second address: BFA679 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FEB1CC19F7Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BFA7AD second address: BFA7B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C01336 second address: C0133C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C0133C second address: C01342 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C01342 second address: C0134C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007FEB1CC19F76h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C0134C second address: C01350 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C02089 second address: C0208D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C0208D second address: C02095 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C0265A second address: C0266F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007FEB1CC19F7Fh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C0630E second address: C06316 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C06316 second address: C06320 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FEB1CC19F76h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C06320 second address: C0632F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9DBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C064B2 second address: C064BE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 js 00007FEB1CC19F76h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C064BE second address: C064DB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FEB1C7EA9E6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C064DB second address: C064F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FEB1CC19F87h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C067EC second address: C067F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C0B9A9 second address: C0B9AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C11A09 second address: C11A0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C11E2A second address: C11E2F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C12405 second address: C12419 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a jmp 00007FEB1C7EA9DAh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C12419 second address: C12439 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FEB1CC19F87h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C12725 second address: C1272A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C12E55 second address: C12E59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C12E59 second address: C12E5D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C11395 second address: C11399 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C11399 second address: C113BD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9DFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jnp 00007FEB1C7EA9DCh 0x0000000f jnp 00007FEB1C7EA9D6h 0x00000015 pop eax 0x00000016 pushad 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C113BD second address: C113CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FEB1CC19F76h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C113CC second address: C113D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C113D0 second address: C113ED instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1CC19F80h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jbe 00007FEB1CC19F76h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C1AA60 second address: C1AA64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C1A78E second address: C1A798 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FEB1CC19F76h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C1A798 second address: C1A7DB instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FEB1C7EA9D6h 0x00000008 jmp 00007FEB1C7EA9E4h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jmp 00007FEB1C7EA9DFh 0x00000014 pushad 0x00000015 push ebx 0x00000016 pop ebx 0x00000017 jp 00007FEB1C7EA9D6h 0x0000001d jmp 00007FEB1C7EA9DBh 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C289CD second address: C289F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FEB1CC19F76h 0x0000000a jmp 00007FEB1CC19F88h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C2AC1A second address: C2AC1E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C2AC1E second address: C2AC3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jnc 00007FEB1CC19F7Ch 0x0000000e pop edi 0x0000000f push edx 0x00000010 pushad 0x00000011 push eax 0x00000012 pop eax 0x00000013 jno 00007FEB1CC19F76h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C3448B second address: C34495 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FEB1C7EA9D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C34495 second address: C344A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007FEB1CC19F76h 0x0000000a jo 00007FEB1CC19F76h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C344A5 second address: C344A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C344A9 second address: C344FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEB1CC19F81h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FEB1CC19F7Dh 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FEB1CC19F82h 0x00000019 pushad 0x0000001a jmp 00007FEB1CC19F83h 0x0000001f push ebx 0x00000020 pop ebx 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C344FB second address: C34501 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C34501 second address: C34506 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C34506 second address: C3450E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C3450E second address: C34512 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C3BDD1 second address: C3BE0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jp 00007FEB1C7EA9D6h 0x0000000c popad 0x0000000d pushad 0x0000000e push eax 0x0000000f pop eax 0x00000010 jmp 00007FEB1C7EA9E7h 0x00000015 jnc 00007FEB1C7EA9D6h 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e push esi 0x0000001f push edi 0x00000020 pop edi 0x00000021 pop esi 0x00000022 push eax 0x00000023 push edx 0x00000024 jnp 00007FEB1C7EA9D6h 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C3BE0D second address: C3BE21 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1CC19F7Eh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C3F2B3 second address: C3F2DA instructions: 0x00000000 rdtsc 0x00000002 jl 00007FEB1C7EA9D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b jbe 00007FEB1C7EA9FEh 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 jmp 00007FEB1C7EA9E2h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C3F2DA second address: C3F2E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C45C4F second address: C45C9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push ecx 0x00000007 jmp 00007FEB1C7EA9E0h 0x0000000c pushad 0x0000000d popad 0x0000000e pop ecx 0x0000000f pushad 0x00000010 jmp 00007FEB1C7EA9E6h 0x00000015 push ecx 0x00000016 pop ecx 0x00000017 jmp 00007FEB1C7EA9E4h 0x0000001c popad 0x0000001d push esi 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C443AF second address: C443D7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1CC19F88h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FEB1CC19F7Ah 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C443D7 second address: C443F4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jnc 00007FEB1C7EA9D6h 0x0000000d jmp 00007FEB1C7EA9DCh 0x00000012 pop edx 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C443F4 second address: C44423 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 push edx 0x00000009 push ebx 0x0000000a pushad 0x0000000b popad 0x0000000c pop ebx 0x0000000d pushad 0x0000000e jmp 00007FEB1CC19F89h 0x00000013 jns 00007FEB1CC19F76h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C44582 second address: C44586 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C44860 second address: C4486D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 jnp 00007FEB1CC19F76h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C4486D second address: C44891 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 jmp 00007FEB1C7EA9E6h 0x0000000b jno 00007FEB1C7EA9D6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C44B41 second address: C44B47 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C44B47 second address: C44B53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C44B53 second address: C44B57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C44B57 second address: C44B85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 pushad 0x00000009 push esi 0x0000000a pop esi 0x0000000b js 00007FEB1C7EA9D6h 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FEB1C7EA9E4h 0x0000001d push edx 0x0000001e pop edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C44B85 second address: C44B95 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1CC19F7Ch 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C44B95 second address: C44BB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FEB1C7EA9E7h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C44E54 second address: C44E58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C48FB3 second address: C48FB7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C490E4 second address: C490F0 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a push edx 0x0000000b pop edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C490F0 second address: C490FA instructions: 0x00000000 rdtsc 0x00000002 jl 00007FEB1C7EA9D6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C490FA second address: C49103 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C49103 second address: C4912A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FEB1C7EA9E9h 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C5ABB5 second address: C5ABC6 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FEB1CC19F7Ch 0x00000008 je 00007FEB1CC19F76h 0x0000000e push edi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C53B69 second address: C53B71 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C53B71 second address: C53B76 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C53B76 second address: C53BBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FEB1C7EA9E3h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jo 00007FEB1C7EAA0Ah 0x00000012 pushad 0x00000013 jmp 00007FEB1C7EA9E6h 0x00000018 push edx 0x00000019 pop edx 0x0000001a push ebx 0x0000001b pop ebx 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f jnp 00007FEB1C7EA9D6h 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C53BBC second address: C53BC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C6A3D4 second address: C6A3F7 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FEB1C7EA9D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FEB1C7EA9E9h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C6A3F7 second address: C6A41B instructions: 0x00000000 rdtsc 0x00000002 jo 00007FEB1CC19F8Ah 0x00000008 jmp 00007FEB1CC19F84h 0x0000000d jbe 00007FEB1CC19F82h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C80C5C second address: C80C71 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FEB1C7EA9DEh 0x00000008 pushad 0x00000009 push edx 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C7FB45 second address: C7FB49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C7FF6E second address: C7FF92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FEB1C7EA9E5h 0x0000000b popad 0x0000000c jl 00007FEB1C7EA9DCh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C800D7 second address: C80104 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 je 00007FEB1CC19F76h 0x0000000f pushad 0x00000010 popad 0x00000011 pop ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FEB1CC19F87h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C80104 second address: C80108 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C8365C second address: C83660 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C83B5B second address: C83C23 instructions: 0x00000000 rdtsc 0x00000002 js 00007FEB1C7EA9E4h 0x00000008 jmp 00007FEB1C7EA9DEh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f nop 0x00000010 call 00007FEB1C7EA9DEh 0x00000015 mov edx, dword ptr [ebp+122D3588h] 0x0000001b pop edx 0x0000001c mov dx, 512Ch 0x00000020 push dword ptr [ebp+1244BD7Dh] 0x00000026 push 00000000h 0x00000028 push eax 0x00000029 call 00007FEB1C7EA9D8h 0x0000002e pop eax 0x0000002f mov dword ptr [esp+04h], eax 0x00000033 add dword ptr [esp+04h], 00000018h 0x0000003b inc eax 0x0000003c push eax 0x0000003d ret 0x0000003e pop eax 0x0000003f ret 0x00000040 mov dword ptr [ebp+122D3119h], edi 0x00000046 call 00007FEB1C7EA9D9h 0x0000004b jg 00007FEB1C7EA9DAh 0x00000051 push eax 0x00000052 jng 00007FEB1C7EA9EFh 0x00000058 pushad 0x00000059 pushad 0x0000005a popad 0x0000005b jmp 00007FEB1C7EA9E5h 0x00000060 popad 0x00000061 mov eax, dword ptr [esp+04h] 0x00000065 jmp 00007FEB1C7EA9E1h 0x0000006a mov eax, dword ptr [eax] 0x0000006c jmp 00007FEB1C7EA9E6h 0x00000071 mov dword ptr [esp+04h], eax 0x00000075 push eax 0x00000076 push edx 0x00000077 push eax 0x00000078 push edx 0x00000079 push eax 0x0000007a push edx 0x0000007b rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C83C23 second address: C83C27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C83C27 second address: C83C31 instructions: 0x00000000 rdtsc 0x00000002 je 00007FEB1C7EA9D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C84DD0 second address: C84E0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jl 00007FEB1CC19F76h 0x00000009 push esi 0x0000000a pop esi 0x0000000b pop eax 0x0000000c js 00007FEB1CC19F87h 0x00000012 jmp 00007FEB1CC19F81h 0x00000017 pop edx 0x00000018 pop eax 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c jbe 00007FEB1CC19F76h 0x00000022 je 00007FEB1CC19F76h 0x00000028 pop eax 0x00000029 push esi 0x0000002a jg 00007FEB1CC19F76h 0x00000030 pop esi 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: C86B3E second address: C86B44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: BA13B7 second address: BA13CD instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 jng 00007FEB1CC19F82h 0x0000000e js 00007FEB1CC19F7Ch 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0787 second address: 4DF078D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF078D second address: 4DF0791 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0791 second address: 4DF07D8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9DDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007FEB1C7EA9DEh 0x00000011 mov ebp, esp 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 pushfd 0x00000017 jmp 00007FEB1C7EA9DDh 0x0000001c jmp 00007FEB1C7EA9DBh 0x00000021 popfd 0x00000022 mov ecx, 536CC86Fh 0x00000027 popad 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF07D8 second address: 4DF07E0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edx, ax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF07E0 second address: 4DF0860 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ecx 0x00000008 jmp 00007FEB1C7EA9E8h 0x0000000d push eax 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007FEB1C7EA9E1h 0x00000015 jmp 00007FEB1C7EA9DBh 0x0000001a popfd 0x0000001b mov di, cx 0x0000001e popad 0x0000001f xchg eax, ecx 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 pushfd 0x00000024 jmp 00007FEB1C7EA9E7h 0x00000029 or ah, 0000006Eh 0x0000002c jmp 00007FEB1C7EA9E9h 0x00000031 popfd 0x00000032 mov ah, D8h 0x00000034 popad 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0860 second address: 4DF0874 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, EFEFh 0x00000007 mov bx, ax 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, esi 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 movzx esi, di 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0874 second address: 4DF08B5 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FEB1C7EA9DFh 0x00000008 sbb ecx, 13E3B22Eh 0x0000000e jmp 00007FEB1C7EA9E9h 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 movzx esi, dx 0x00000019 popad 0x0000001a push eax 0x0000001b pushad 0x0000001c movzx ecx, dx 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF08B5 second address: 4DF08B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF08B9 second address: 4DF0924 instructions: 0x00000000 rdtsc 0x00000002 mov bx, 3E54h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 xchg eax, esi 0x0000000a jmp 00007FEB1C7EA9E3h 0x0000000f lea eax, dword ptr [ebp-04h] 0x00000012 jmp 00007FEB1C7EA9E6h 0x00000017 nop 0x00000018 jmp 00007FEB1C7EA9E0h 0x0000001d push eax 0x0000001e jmp 00007FEB1C7EA9DBh 0x00000023 nop 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007FEB1C7EA9E5h 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0A4B second address: 4DF0A73 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1CC19F7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, esi 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FEB1CC19F85h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0A73 second address: 4DF0A78 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0A78 second address: 4DE000A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 movsx edx, si 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop esi 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FEB1CC19F82h 0x00000012 adc ax, 4F58h 0x00000017 jmp 00007FEB1CC19F7Bh 0x0000001c popfd 0x0000001d movzx esi, bx 0x00000020 popad 0x00000021 leave 0x00000022 pushad 0x00000023 mov cx, bx 0x00000026 mov ebx, 5AE656A0h 0x0000002b popad 0x0000002c retn 0004h 0x0000002f nop 0x00000030 sub esp, 04h 0x00000033 xor ebx, ebx 0x00000035 cmp eax, 00000000h 0x00000038 je 00007FEB1CC1A0DAh 0x0000003e mov dword ptr [esp], 0000000Dh 0x00000045 call 00007FEB21026111h 0x0000004a mov edi, edi 0x0000004c push eax 0x0000004d push edx 0x0000004e pushad 0x0000004f push ecx 0x00000050 pop edx 0x00000051 pushad 0x00000052 popad 0x00000053 popad 0x00000054 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE000A second address: 4DE0010 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0010 second address: 4DE0014 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0014 second address: 4DE0029 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 pushad 0x0000000a pushad 0x0000000b mov edi, esi 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 mov ebx, 1AA481F6h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0029 second address: 4DE0071 instructions: 0x00000000 rdtsc 0x00000002 call 00007FEB1CC19F87h 0x00000007 pop esi 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov dword ptr [esp], ebp 0x0000000e jmp 00007FEB1CC19F7Fh 0x00000013 mov ebp, esp 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FEB1CC19F85h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0071 second address: 4DE0078 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0078 second address: 4DE00A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 sub esp, 2Ch 0x0000000a pushad 0x0000000b mov esi, 31083AA7h 0x00000010 popad 0x00000011 xchg eax, ebx 0x00000012 jmp 00007FEB1CC19F7Ah 0x00000017 push eax 0x00000018 jmp 00007FEB1CC19F7Bh 0x0000001d xchg eax, ebx 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 pushad 0x00000022 popad 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE00A8 second address: 4DE00AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE00AD second address: 4DE00D0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ch, D8h 0x00000005 call 00007FEB1CC19F7Fh 0x0000000a pop eax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push ecx 0x0000000f pushad 0x00000010 mov eax, 00025981h 0x00000015 push eax 0x00000016 push edx 0x00000017 mov dh, ah 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE00D0 second address: 4DE0112 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FEB1C7EA9E9h 0x00000008 sbb ax, 2386h 0x0000000d jmp 00007FEB1C7EA9E1h 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 mov dword ptr [esp], edi 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c mov si, dx 0x0000001f mov ecx, edx 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE013C second address: 4DE0175 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push edi 0x00000006 jmp 00007FEB1CC19F7Ch 0x0000000b pop esi 0x0000000c popad 0x0000000d mov ebx, 00000000h 0x00000012 pushad 0x00000013 call 00007FEB1CC19F7Ch 0x00000018 movzx eax, dx 0x0000001b pop edx 0x0000001c movzx eax, di 0x0000001f popad 0x00000020 mov edi, 00000000h 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a popad 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0175 second address: 4DE0186 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9DDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0186 second address: 4DE01D0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1CC19F81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 inc ebx 0x0000000a jmp 00007FEB1CC19F7Eh 0x0000000f test al, al 0x00000011 jmp 00007FEB1CC19F80h 0x00000016 je 00007FEB1CC1A14Dh 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007FEB1CC19F7Ah 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE01D0 second address: 4DE01D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE01D4 second address: 4DE01DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE01DA second address: 4DE01E0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE01E0 second address: 4DE022B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 lea ecx, dword ptr [ebp-14h] 0x0000000b pushad 0x0000000c mov edx, ecx 0x0000000e mov ecx, 192D7D4Dh 0x00000013 popad 0x00000014 mov dword ptr [ebp-14h], edi 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a pushfd 0x0000001b jmp 00007FEB1CC19F85h 0x00000020 xor cx, 23D6h 0x00000025 jmp 00007FEB1CC19F81h 0x0000002a popfd 0x0000002b mov di, ax 0x0000002e popad 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE02A8 second address: 4DE02D7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9E0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FEB1C7EA9E2h 0x0000000e popad 0x0000000f test eax, eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE02D7 second address: 4DE02DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE02DB second address: 4DE02F8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9E9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE02F8 second address: 4DE02FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE02FE second address: 4DE0302 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0302 second address: 4DE0306 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0306 second address: 4DE0319 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jg 00007FEB8D4A8B54h 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 mov ecx, ebx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0319 second address: 4DE03C5 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FEB1CC19F87h 0x00000008 or ch, 0000004Eh 0x0000000b jmp 00007FEB1CC19F89h 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 mov ch, 95h 0x00000015 popad 0x00000016 js 00007FEB1CC19FB4h 0x0000001c jmp 00007FEB1CC19F83h 0x00000021 cmp dword ptr [ebp-14h], edi 0x00000024 jmp 00007FEB1CC19F86h 0x00000029 jne 00007FEB8D8D808Ah 0x0000002f pushad 0x00000030 jmp 00007FEB1CC19F7Ah 0x00000035 popad 0x00000036 mov ebx, dword ptr [ebp+08h] 0x00000039 push eax 0x0000003a push edx 0x0000003b pushad 0x0000003c pushfd 0x0000003d jmp 00007FEB1CC19F7Dh 0x00000042 xor ch, 00000046h 0x00000045 jmp 00007FEB1CC19F81h 0x0000004a popfd 0x0000004b mov ebx, ecx 0x0000004d popad 0x0000004e rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE04CA second address: 4DE0506 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushfd 0x00000007 jmp 00007FEB1C7EA9E0h 0x0000000c xor al, FFFFFFE8h 0x0000000f jmp 00007FEB1C7EA9DBh 0x00000014 popfd 0x00000015 popad 0x00000016 xchg eax, ebx 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FEB1C7EA9E0h 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0506 second address: 4DE050C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DD07A8 second address: 4DD083A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 jmp 00007FEB1C7EA9E6h 0x0000000e mov dword ptr [esp], ebp 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007FEB1C7EA9DEh 0x00000018 sbb al, FFFFFFF8h 0x0000001b jmp 00007FEB1C7EA9DBh 0x00000020 popfd 0x00000021 push esi 0x00000022 pushfd 0x00000023 jmp 00007FEB1C7EA9DFh 0x00000028 add ax, CCBEh 0x0000002d jmp 00007FEB1C7EA9E9h 0x00000032 popfd 0x00000033 pop esi 0x00000034 popad 0x00000035 mov ebp, esp 0x00000037 push eax 0x00000038 push edx 0x00000039 push eax 0x0000003a push edx 0x0000003b jmp 00007FEB1C7EA9E9h 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DD083A second address: 4DD083E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DD083E second address: 4DD0844 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DD0844 second address: 4DD0859 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dh, ah 0x00000005 mov bl, 7Dh 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov si, bx 0x00000011 mov si, bx 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DD0859 second address: 4DD0898 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9E0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FEB1C7EA9DBh 0x0000000f xchg eax, ecx 0x00000010 pushad 0x00000011 mov edx, esi 0x00000013 popad 0x00000014 mov dword ptr [ebp-04h], 55534552h 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007FEB1C7EA9DFh 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DD0898 second address: 4DD089C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DD089C second address: 4DD08A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0A14 second address: 4DE0A2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FEB1CC19F84h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0A74 second address: 4DE0A7A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0A7A second address: 4DE0A7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0A7E second address: 4DE0AC0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9DEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007FEB1C7EA9DBh 0x00000011 mov eax, dword ptr [esp+04h] 0x00000015 jmp 00007FEB1C7EA9E9h 0x0000001a mov eax, dword ptr [eax] 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0AC0 second address: 4DE0B30 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FEB1CC19F84h 0x00000008 adc eax, 501D9BB8h 0x0000000e jmp 00007FEB1CC19F7Bh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 popad 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b pushad 0x0000001c call 00007FEB1CC19F7Bh 0x00000021 pushfd 0x00000022 jmp 00007FEB1CC19F88h 0x00000027 sub si, 7548h 0x0000002c jmp 00007FEB1CC19F7Bh 0x00000031 popfd 0x00000032 pop esi 0x00000033 popad 0x00000034 pop eax 0x00000035 pushad 0x00000036 movsx edx, cx 0x00000039 pushad 0x0000003a push eax 0x0000003b push edx 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0B30 second address: 4DE0B5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov ah, 7Bh 0x00000006 popad 0x00000007 popad 0x00000008 call 00007FEB8D49FA10h 0x0000000d push 75A92B70h 0x00000012 push dword ptr fs:[00000000h] 0x00000019 mov eax, dword ptr [esp+10h] 0x0000001d mov dword ptr [esp+10h], ebp 0x00000021 lea ebp, dword ptr [esp+10h] 0x00000025 sub esp, eax 0x00000027 push ebx 0x00000028 push esi 0x00000029 push edi 0x0000002a mov eax, dword ptr [75AF4538h] 0x0000002f xor dword ptr [ebp-04h], eax 0x00000032 xor eax, ebp 0x00000034 push eax 0x00000035 mov dword ptr [ebp-18h], esp 0x00000038 push dword ptr [ebp-08h] 0x0000003b mov eax, dword ptr [ebp-04h] 0x0000003e mov dword ptr [ebp-04h], FFFFFFFEh 0x00000045 mov dword ptr [ebp-08h], eax 0x00000048 lea eax, dword ptr [ebp-10h] 0x0000004b mov dword ptr fs:[00000000h], eax 0x00000051 ret 0x00000052 push eax 0x00000053 push edx 0x00000054 pushad 0x00000055 mov edx, ecx 0x00000057 pushfd 0x00000058 jmp 00007FEB1C7EA9DAh 0x0000005d or cl, FFFFFFD8h 0x00000060 jmp 00007FEB1C7EA9DBh 0x00000065 popfd 0x00000066 popad 0x00000067 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0B5D second address: 4DE0B65 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, bx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0BB6 second address: 4DE0C03 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FEB1C7EA9E8h 0x00000008 sub cl, FFFFFFF8h 0x0000000b jmp 00007FEB1C7EA9DBh 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 jmp 00007FEB1C7EA9E8h 0x00000018 popad 0x00000019 test al, al 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0C03 second address: 4DE0C20 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1CC19F89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0C20 second address: 4DE0C30 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FEB1C7EA9DCh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0C30 second address: 4DE0C34 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DE0C34 second address: 4DE0C4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007FEB8D48E71Fh 0x0000000e pushad 0x0000000f movsx edx, ax 0x00000012 push eax 0x00000013 push edx 0x00000014 mov ax, A4FBh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0AFD second address: 4DF0B03 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0B03 second address: 4DF0B09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0B09 second address: 4DF0B0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0B0D second address: 4DF0B46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FEB1C7EA9E1h 0x00000013 and esi, 5ECEB716h 0x00000019 jmp 00007FEB1C7EA9E1h 0x0000001e popfd 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0B46 second address: 4DF0B4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0B4B second address: 4DF0BA5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9E7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov cx, bx 0x00000010 pushfd 0x00000011 jmp 00007FEB1C7EA9E7h 0x00000016 add cx, DDAEh 0x0000001b jmp 00007FEB1C7EA9E9h 0x00000020 popfd 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0BA5 second address: 4DF0C46 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FEB1CC19F87h 0x00000009 or eax, 1C2213BEh 0x0000000f jmp 00007FEB1CC19F89h 0x00000014 popfd 0x00000015 call 00007FEB1CC19F80h 0x0000001a pop ecx 0x0000001b popad 0x0000001c pop edx 0x0000001d pop eax 0x0000001e push eax 0x0000001f jmp 00007FEB1CC19F80h 0x00000024 xchg eax, esi 0x00000025 pushad 0x00000026 mov bh, cl 0x00000028 pushfd 0x00000029 jmp 00007FEB1CC19F83h 0x0000002e or si, B32Eh 0x00000033 jmp 00007FEB1CC19F89h 0x00000038 popfd 0x00000039 popad 0x0000003a mov esi, dword ptr [ebp+0Ch] 0x0000003d push eax 0x0000003e push edx 0x0000003f push eax 0x00000040 push edx 0x00000041 pushad 0x00000042 popad 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0C46 second address: 4DF0C59 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9DFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0C59 second address: 4DF0C5F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0C5F second address: 4DF0C63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0C63 second address: 4DF0C7C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1CC19F7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b test esi, esi 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0C7C second address: 4DF0C97 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9E7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0C97 second address: 4DF0CE0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, dx 0x00000006 pushfd 0x00000007 jmp 00007FEB1CC19F7Bh 0x0000000c or ax, 23FEh 0x00000011 jmp 00007FEB1CC19F89h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a je 00007FEB8D8B7662h 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007FEB1CC19F7Dh 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0CE0 second address: 4DF0D02 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9E1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [75AF459Ch], 05h 0x00000010 pushad 0x00000011 movzx esi, dx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0D02 second address: 4DF0D2D instructions: 0x00000000 rdtsc 0x00000002 movzx esi, bx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 je 00007FEB8D8CF703h 0x0000000e jmp 00007FEB1CC19F7Dh 0x00000013 xchg eax, esi 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FEB1CC19F7Dh 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0D2D second address: 4DF0D64 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9E1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007FEB1C7EA9DAh 0x00000012 call 00007FEB1C7EA9E2h 0x00000017 pop ecx 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0D64 second address: 4DF0D7F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FEB1CC19F87h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | RDTSC instruction interceptor: First address: 4DF0D7F second address: 4DF0DBE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FEB1C7EA9E9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushfd 0x00000010 jmp 00007FEB1C7EA9DAh 0x00000015 or si, 8E08h 0x0000001a jmp 00007FEB1C7EA9DBh 0x0000001f popfd 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.db | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnf | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpak | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddfffla | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifd | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.json | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.db | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf | Jump to behavior |
Source: C:\Users\user\Desktop\MaZjv5XeQi.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao | Jump to behavior |