Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111410301.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121283206.0000000001282000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121056235.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111410301.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121283206.0000000001282000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121056235.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111410301.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121283206.0000000001282000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121056235.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://broadcast.st.dl.eccdnx.com |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/ |
Source: lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111410301.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121283206.0000000001282000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121056235.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001286000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001286000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/fatalerror.css?v=OFUqlcDNiD6y&l=engli |
Source: lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001286000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111410301.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121283206.0000000001282000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121056235.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111410301.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121283206.0000000001282000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121056235.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111410301.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121283206.0000000001282000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121056235.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111410301.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121283206.0000000001282000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121056235.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=FRRi |
Source: lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001286000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001286000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001286000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001286000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001286000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001286000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001286000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001286000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001286000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001286000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001286000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://player.vimeo.com |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111410301.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121283206.0000000001282000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121056235.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.00000000011EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111410301.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121283206.0000000001282000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121056235.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001222000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111410301.0000000001222000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111410301.00000000011F2000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121091389.00000000011F2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900 |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111410301.0000000001233000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/; |
Source: lJEIftsml0.exe, 00000000.00000003.2111410301.0000000001233000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111410301.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121283206.0000000001282000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121056235.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: lJEIftsml0.exe, 00000000.00000003.2111947747.0000000001280000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111410301.00000000011E7000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000002.2121283206.0000000001282000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.0000000001251000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111391708.0000000001287000.00000004.00000020.00020000.00000000.sdmp, lJEIftsml0.exe, 00000000.00000003.2111759331.00000000011EC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: lJEIftsml0.exe, 00000000.00000002.2121091389.0000000001233000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007AB100 | 0_2_007AB100 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007A8600 | 0_2_007A8600 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007AD021 | 0_2_007AD021 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007BD003 | 0_2_007BD003 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007B60E9 | 0_2_007B60E9 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007CC0E6 | 0_2_007CC0E6 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007CA0CA | 0_2_007CA0CA |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007CC09E | 0_2_007CC09E |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007A6160 | 0_2_007A6160 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007CC09E | 0_2_007CC09E |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007C81CC | 0_2_007C81CC |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007C91AE | 0_2_007C91AE |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_0084D16B | 0_2_0084D16B |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007DF18B | 0_2_007DF18B |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007CE180 | 0_2_007CE180 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007A4270 | 0_2_007A4270 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007BE220 | 0_2_007BE220 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007B1227 | 0_2_007B1227 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_0095A235 | 0_2_0095A235 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007C42D0 | 0_2_007C42D0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007D9280 | 0_2_007D9280 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007CF377 | 0_2_007CF377 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007CD34A | 0_2_007CD34A |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007C1340 | 0_2_007C1340 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007A9310 | 0_2_007A9310 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007C83D8 | 0_2_007C83D8 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007A73D0 | 0_2_007A73D0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007AF3C0 | 0_2_007AF3C0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007B747D | 0_2_007B747D |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007E0460 | 0_2_007E0460 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007C7440 | 0_2_007C7440 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007DA440 | 0_2_007DA440 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007AD4F3 | 0_2_007AD4F3 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_00969403 | 0_2_00969403 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007C24E0 | 0_2_007C24E0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007C04C6 | 0_2_007C04C6 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007C4560 | 0_2_007C4560 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007CC53C | 0_2_007CC53C |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007A65F0 | 0_2_007A65F0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007DA5D4 | 0_2_007DA5D4 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007DC5A0 | 0_2_007DC5A0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_0095357E | 0_2_0095357E |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007D8650 | 0_2_007D8650 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007BE630 | 0_2_007BE630 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007B961B | 0_2_007B961B |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007AF60D | 0_2_007AF60D |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007E06F0 | 0_2_007E06F0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007C46D0 | 0_2_007C46D0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007F8778 | 0_2_007F8778 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007B2750 | 0_2_007B2750 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007C7740 | 0_2_007C7740 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007C9739 | 0_2_007C9739 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007B57C0 | 0_2_007B57C0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007F87A1 | 0_2_007F87A1 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_0092676A | 0_2_0092676A |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007AC840 | 0_2_007AC840 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007AD83C | 0_2_007AD83C |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_008128FA | 0_2_008128FA |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007BB8F6 | 0_2_007BB8F6 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007D38D0 | 0_2_007D38D0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007A38C0 | 0_2_007A38C0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007D88B0 | 0_2_007D88B0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007BC8A0 | 0_2_007BC8A0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007BE960 | 0_2_007BE960 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007C6910 | 0_2_007C6910 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007A5900 | 0_2_007A5900 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007CC9EB | 0_2_007CC9EB |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007E09E0 | 0_2_007E09E0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007DDA4D | 0_2_007DDA4D |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007D5A4F | 0_2_007D5A4F |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007DCA40 | 0_2_007DCA40 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_00845AC3 | 0_2_00845AC3 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007DFA20 | 0_2_007DFA20 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007B9AD0 | 0_2_007B9AD0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_00962A3B | 0_2_00962A3B |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007C8ABC | 0_2_007C8ABC |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007D9A80 | 0_2_007D9A80 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007AAB40 | 0_2_007AAB40 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007DFB10 | 0_2_007DFB10 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007A4BA0 | 0_2_007A4BA0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007BEB80 | 0_2_007BEB80 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007D3C10 | 0_2_007D3C10 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007D1CF0 | 0_2_007D1CF0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007B4CA0 | 0_2_007B4CA0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007DFD70 | 0_2_007DFD70 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007CCD5E | 0_2_007CCD5E |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007CCD4C | 0_2_007CCD4C |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007D9D30 | 0_2_007D9D30 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007B1D2B | 0_2_007B1D2B |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007C6D2E | 0_2_007C6D2E |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007E0D20 | 0_2_007E0D20 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007C1D00 | 0_2_007C1D00 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007DCDF0 | 0_2_007DCDF0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007A5DC0 | 0_2_007A5DC0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007D7DA9 | 0_2_007D7DA9 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_0095BD67 | 0_2_0095BD67 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007CFE74 | 0_2_007CFE74 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007C0E6C | 0_2_007C0E6C |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007CEE63 | 0_2_007CEE63 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_00958EDF | 0_2_00958EDF |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007DFE00 | 0_2_007DFE00 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007C2EF4 | 0_2_007C2EF4 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007A2EB0 | 0_2_007A2EB0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007BAEB0 | 0_2_007BAEB0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007D8EA0 | 0_2_007D8EA0 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007B6F52 | 0_2_007B6F52 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_007BDF50 | 0_2_007BDF50 |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | Code function: 0_2_00960F1E | 0_2_00960F1E |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9689BA second address: 9689E4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A0F60144h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007F46A0F6013Eh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9689E4 second address: 9689E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9689E8 second address: 9689EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9689EE second address: 9689FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007F46A06E91AEh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 96AF2D second address: 96AF33 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 96B0AB second address: 96B0C9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A06E91AAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b jbe 00007F46A06E91B8h 0x00000011 push eax 0x00000012 push edx 0x00000013 jl 00007F46A06E91A6h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 96B0C9 second address: 96B0CD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 96B0CD second address: 96B0DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push esi 0x0000000e pop esi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 96B0DC second address: 96B139 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push 00000000h 0x0000000a push esi 0x0000000b call 00007F46A0F60138h 0x00000010 pop esi 0x00000011 mov dword ptr [esp+04h], esi 0x00000015 add dword ptr [esp+04h], 00000014h 0x0000001d inc esi 0x0000001e push esi 0x0000001f ret 0x00000020 pop esi 0x00000021 ret 0x00000022 push ebx 0x00000023 mov dword ptr [ebp+122D338Ah], ecx 0x00000029 pop esi 0x0000002a mov dword ptr [ebp+122D2F73h], ebx 0x00000030 lea ebx, dword ptr [ebp+12445E00h] 0x00000036 push 00000000h 0x00000038 push esi 0x00000039 call 00007F46A0F60138h 0x0000003e pop esi 0x0000003f mov dword ptr [esp+04h], esi 0x00000043 add dword ptr [esp+04h], 00000016h 0x0000004b inc esi 0x0000004c push esi 0x0000004d ret 0x0000004e pop esi 0x0000004f ret 0x00000050 mov dl, 16h 0x00000052 xchg eax, ebx 0x00000053 pushad 0x00000054 push edi 0x00000055 push eax 0x00000056 push edx 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 96B139 second address: 96B15E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jmp 00007F46A06E91B4h 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d pushad 0x0000000e jns 00007F46A06E91A6h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 96B202 second address: 96B268 instructions: 0x00000000 rdtsc 0x00000002 js 00007F46A0F60136h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F46A0F60147h 0x00000012 pop edx 0x00000013 nop 0x00000014 push 00000000h 0x00000016 push edx 0x00000017 call 00007F46A0F60138h 0x0000001c pop edx 0x0000001d mov dword ptr [esp+04h], edx 0x00000021 add dword ptr [esp+04h], 0000001Ch 0x00000029 inc edx 0x0000002a push edx 0x0000002b ret 0x0000002c pop edx 0x0000002d ret 0x0000002e mov ch, 7Ch 0x00000030 push 00000000h 0x00000032 jns 00007F46A0F60139h 0x00000038 push 9DC5F8B9h 0x0000003d push eax 0x0000003e push edx 0x0000003f jne 00007F46A0F60138h 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 96B268 second address: 96B2B3 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 add dword ptr [esp], 623A07C7h 0x0000000f jnl 00007F46A06E91A8h 0x00000015 push 00000003h 0x00000017 add dword ptr [ebp+122D2E29h], edi 0x0000001d push 00000000h 0x0000001f push edx 0x00000020 jmp 00007F46A06E91B7h 0x00000025 pop edx 0x00000026 push 00000003h 0x00000028 mov dword ptr [ebp+122D20E8h], edx 0x0000002e push BED52A74h 0x00000033 pushad 0x00000034 pushad 0x00000035 push eax 0x00000036 push edx 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 96B2B3 second address: 96B32F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F46A0F60136h 0x0000000a popad 0x0000000b jmp 00007F46A0F6013Eh 0x00000010 popad 0x00000011 xor dword ptr [esp], 7ED52A74h 0x00000018 pushad 0x00000019 mov ebx, eax 0x0000001b call 00007F46A0F6013Ch 0x00000020 movsx eax, si 0x00000023 pop ecx 0x00000024 popad 0x00000025 lea ebx, dword ptr [ebp+12445E09h] 0x0000002b push ebx 0x0000002c push ebx 0x0000002d jmp 00007F46A0F60146h 0x00000032 pop ecx 0x00000033 pop edi 0x00000034 je 00007F46A0F60139h 0x0000003a sbb dl, FFFFFFB6h 0x0000003d xchg eax, ebx 0x0000003e jbe 00007F46A0F6013Eh 0x00000044 js 00007F46A0F60138h 0x0000004a pushad 0x0000004b popad 0x0000004c push eax 0x0000004d jbe 00007F46A0F60142h 0x00000053 jo 00007F46A0F6013Ch 0x00000059 push eax 0x0000005a push edx 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 97CF49 second address: 97CF62 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A06E91AFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 97CF62 second address: 97CF67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 97CF67 second address: 97CF6D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 989F77 second address: 989F7C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 989F7C second address: 989F82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 989F82 second address: 989F91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 je 00007F46A0F6013Ch 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 989F91 second address: 989F9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 98A237 second address: 98A23B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 98A23B second address: 98A25B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A06E91B8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 98A25B second address: 98A25F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 98A3B9 second address: 98A3BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 98A518 second address: 98A534 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007F46A0F6013Ah 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebx 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f je 00007F46A0F60136h 0x00000015 push esi 0x00000016 pop esi 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 98A534 second address: 98A55B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A06E91B5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jnp 00007F46A06E91A6h 0x00000011 jno 00007F46A06E91A6h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 98A6EE second address: 98A6F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 98A972 second address: 98A97A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 98A97A second address: 98A980 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 98AB0F second address: 98AB13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 98B1D5 second address: 98B1D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 98BA55 second address: 98BA5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F46A06E91A6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 98BA5F second address: 98BA6E instructions: 0x00000000 rdtsc 0x00000002 jc 00007F46A0F60136h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 98BA6E second address: 98BA76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 98BA76 second address: 98BA81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 98BA81 second address: 98BA85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 98FF58 second address: 98FF5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 991CCB second address: 991CE1 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F46A06E91ACh 0x00000008 jbe 00007F46A06E91A6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 push esi 0x00000015 pop esi 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 995C8E second address: 995C93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 995F81 second address: 995F85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 995F85 second address: 995F8B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 995F8B second address: 995F8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 995F8F second address: 995F93 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 996129 second address: 99612F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9963BB second address: 9963D1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A0F60140h 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9963D1 second address: 9963E5 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F46A06E91A8h 0x00000008 jng 00007F46A06E91AEh 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 997E6D second address: 997E71 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 999134 second address: 99913A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9991F2 second address: 9991F8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9991F8 second address: 999210 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F46A06E91B3h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 999210 second address: 999252 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xor dword ptr [esp], 35083697h 0x0000000e call 00007F46A0F60139h 0x00000013 jmp 00007F46A0F6013Eh 0x00000018 push eax 0x00000019 push eax 0x0000001a push edx 0x0000001b jo 00007F46A0F6014Ah 0x00000021 jmp 00007F46A0F60144h 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 999252 second address: 999276 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F46A06E91A8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e pushad 0x0000000f push ecx 0x00000010 pushad 0x00000011 popad 0x00000012 pop ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F46A06E91ADh 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 999276 second address: 99929A instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F46A0F60136h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov eax, dword ptr [eax] 0x0000000d push esi 0x0000000e push eax 0x0000000f pushad 0x00000010 popad 0x00000011 pop eax 0x00000012 pop esi 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007F46A0F6013Bh 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9997A9 second address: 9997C2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A06E91ACh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c pushad 0x0000000d popad 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 999D65 second address: 999DB7 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007F46A0F6013Ch 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], ebx 0x0000000e push 00000000h 0x00000010 push edx 0x00000011 call 00007F46A0F60138h 0x00000016 pop edx 0x00000017 mov dword ptr [esp+04h], edx 0x0000001b add dword ptr [esp+04h], 0000001Bh 0x00000023 inc edx 0x00000024 push edx 0x00000025 ret 0x00000026 pop edx 0x00000027 ret 0x00000028 mov dword ptr [ebp+122D2FB0h], edx 0x0000002e push eax 0x0000002f push eax 0x00000030 push edx 0x00000031 push eax 0x00000032 push edx 0x00000033 jmp 00007F46A0F6013Fh 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 999DB7 second address: 999DBB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 999DBB second address: 999DC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 99C2DF second address: 99C2E3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 99C2E3 second address: 99C358 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push ecx 0x0000000a call 00007F46A0F60138h 0x0000000f pop ecx 0x00000010 mov dword ptr [esp+04h], ecx 0x00000014 add dword ptr [esp+04h], 00000018h 0x0000001c inc ecx 0x0000001d push ecx 0x0000001e ret 0x0000001f pop ecx 0x00000020 ret 0x00000021 mov si, cx 0x00000024 push 00000000h 0x00000026 push 00000000h 0x00000028 push ebp 0x00000029 call 00007F46A0F60138h 0x0000002e pop ebp 0x0000002f mov dword ptr [esp+04h], ebp 0x00000033 add dword ptr [esp+04h], 00000018h 0x0000003b inc ebp 0x0000003c push ebp 0x0000003d ret 0x0000003e pop ebp 0x0000003f ret 0x00000040 movzx edi, cx 0x00000043 push 00000000h 0x00000045 mov esi, dword ptr [ebp+122D3142h] 0x0000004b xchg eax, ebx 0x0000004c jmp 00007F46A0F60147h 0x00000051 push eax 0x00000052 push edx 0x00000053 push eax 0x00000054 push edx 0x00000055 pushad 0x00000056 popad 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 99D6C2 second address: 99D6C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 99E1FE second address: 99E268 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 ja 00007F46A0F60136h 0x0000000c jbe 00007F46A0F60136h 0x00000012 popad 0x00000013 popad 0x00000014 nop 0x00000015 mov edi, dword ptr [ebp+122D33B1h] 0x0000001b push 00000000h 0x0000001d mov dword ptr [ebp+122D340Eh], ebx 0x00000023 mov edi, eax 0x00000025 push 00000000h 0x00000027 push 00000000h 0x00000029 push esi 0x0000002a call 00007F46A0F60138h 0x0000002f pop esi 0x00000030 mov dword ptr [esp+04h], esi 0x00000034 add dword ptr [esp+04h], 0000001Ah 0x0000003c inc esi 0x0000003d push esi 0x0000003e ret 0x0000003f pop esi 0x00000040 ret 0x00000041 xchg eax, ebx 0x00000042 pushad 0x00000043 jp 00007F46A0F6013Ch 0x00000049 pushad 0x0000004a jmp 00007F46A0F60140h 0x0000004f push eax 0x00000050 push edx 0x00000051 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 99EE19 second address: 99EE2B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F46A06E91AEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 99F8DE second address: 99F8E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 99F8E3 second address: 99F927 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F46A06E91A8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push 00000000h 0x00000011 push esi 0x00000012 call 00007F46A06E91A8h 0x00000017 pop esi 0x00000018 mov dword ptr [esp+04h], esi 0x0000001c add dword ptr [esp+04h], 00000017h 0x00000024 inc esi 0x00000025 push esi 0x00000026 ret 0x00000027 pop esi 0x00000028 ret 0x00000029 mov edi, dword ptr [ebp+122D2E77h] 0x0000002f push 00000000h 0x00000031 mov di, ax 0x00000034 push eax 0x00000035 push eax 0x00000036 push edx 0x00000037 pushad 0x00000038 push esi 0x00000039 pop esi 0x0000003a pushad 0x0000003b popad 0x0000003c popad 0x0000003d rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A2C3A second address: 9A2C3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A2C3E second address: 9A2C42 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A4B50 second address: 9A4BD0 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F46A0F60136h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b mov ebx, dword ptr [ebp+122D233Bh] 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push ecx 0x00000016 call 00007F46A0F60138h 0x0000001b pop ecx 0x0000001c mov dword ptr [esp+04h], ecx 0x00000020 add dword ptr [esp+04h], 0000001Ah 0x00000028 inc ecx 0x00000029 push ecx 0x0000002a ret 0x0000002b pop ecx 0x0000002c ret 0x0000002d call 00007F46A0F60149h 0x00000032 mov ebx, 7B085A00h 0x00000037 pop edi 0x00000038 push 00000000h 0x0000003a and ebx, dword ptr [ebp+122D2A4Eh] 0x00000040 push eax 0x00000041 pushad 0x00000042 pushad 0x00000043 jmp 00007F46A0F60146h 0x00000048 jp 00007F46A0F60136h 0x0000004e popad 0x0000004f push eax 0x00000050 push edx 0x00000051 pushad 0x00000052 popad 0x00000053 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A4BD0 second address: 9A4BD4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A5C07 second address: 9A5C0C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A6B75 second address: 9A6B79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A7B95 second address: 9A7B99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A9BEE second address: 9A9BFF instructions: 0x00000000 rdtsc 0x00000002 jne 00007F46A06E91A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A9BFF second address: 9A9C04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 99DFA6 second address: 99DFC3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A06E91B9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9ABB13 second address: 9ABB4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F46A0F60148h 0x00000009 push esi 0x0000000a jns 00007F46A0F60136h 0x00000010 jmp 00007F46A0F60140h 0x00000015 pop esi 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 96406D second address: 964072 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9B0E19 second address: 9B0E23 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F46A0F60136h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9B1E61 second address: 9B1E66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9B1E66 second address: 9B1E6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A4D63 second address: 9A4D67 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A5DD6 second address: 9A5E03 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A0F60149h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F46A0F6013Bh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A7D2D second address: 9A7D32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A8E15 second address: 9A8E1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A9E29 second address: 9A9E3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jc 00007F46A06E91ACh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9AFFDB second address: 9AFFDF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9B20C1 second address: 9B213B instructions: 0x00000000 rdtsc 0x00000002 jl 00007F46A06E91ACh 0x00000008 jns 00007F46A06E91A6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov dword ptr [esp], eax 0x00000013 mov dword ptr [ebp+122D34FAh], eax 0x00000019 push dword ptr fs:[00000000h] 0x00000020 mov bx, 4721h 0x00000024 mov dword ptr fs:[00000000h], esp 0x0000002b or bh, 0000007Ah 0x0000002e mov eax, dword ptr [ebp+122D0FF9h] 0x00000034 jmp 00007F46A06E91B1h 0x00000039 push FFFFFFFFh 0x0000003b jmp 00007F46A06E91AEh 0x00000040 nop 0x00000041 jmp 00007F46A06E91B5h 0x00000046 push eax 0x00000047 push eax 0x00000048 push edx 0x00000049 jno 00007F46A06E91ACh 0x0000004f rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9B2DE7 second address: 9B2DED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A4D67 second address: 9A4D6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A5E03 second address: 9A5E0D instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F46A0F60136h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9B2DED second address: 9B2DF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A5E0D second address: 9A5E12 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9B2DF1 second address: 9B2DF5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A5E12 second address: 9A5E18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9B2DF5 second address: 9B2E6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b xor bx, 2410h 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push esi 0x00000015 call 00007F46A06E91A8h 0x0000001a pop esi 0x0000001b mov dword ptr [esp+04h], esi 0x0000001f add dword ptr [esp+04h], 00000019h 0x00000027 inc esi 0x00000028 push esi 0x00000029 ret 0x0000002a pop esi 0x0000002b ret 0x0000002c ja 00007F46A06E91A6h 0x00000032 push 00000000h 0x00000034 call 00007F46A06E91B7h 0x00000039 jmp 00007F46A06E91B2h 0x0000003e pop edi 0x0000003f push eax 0x00000040 push eax 0x00000041 push edx 0x00000042 push eax 0x00000043 jmp 00007F46A06E91AEh 0x00000048 pop eax 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9B2E6D second address: 9B2E89 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F46A0F60148h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9B4D9E second address: 9B4DA4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9B3FE9 second address: 9B3FEE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9B5E65 second address: 9B5E6B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9B5E6B second address: 9B5EE2 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F46A0F60144h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push ebx 0x00000010 call 00007F46A0F60138h 0x00000015 pop ebx 0x00000016 mov dword ptr [esp+04h], ebx 0x0000001a add dword ptr [esp+04h], 00000017h 0x00000022 inc ebx 0x00000023 push ebx 0x00000024 ret 0x00000025 pop ebx 0x00000026 ret 0x00000027 sbb bh, 0000004Bh 0x0000002a push 00000000h 0x0000002c jng 00007F46A0F6013Bh 0x00000032 add di, 3891h 0x00000037 push 00000000h 0x00000039 push 00000000h 0x0000003b push edi 0x0000003c call 00007F46A0F60138h 0x00000041 pop edi 0x00000042 mov dword ptr [esp+04h], edi 0x00000046 add dword ptr [esp+04h], 00000018h 0x0000004e inc edi 0x0000004f push edi 0x00000050 ret 0x00000051 pop edi 0x00000052 ret 0x00000053 mov di, 0C17h 0x00000057 xchg eax, esi 0x00000058 push eax 0x00000059 push edx 0x0000005a push ecx 0x0000005b pushad 0x0000005c popad 0x0000005d pop ecx 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9B5EE2 second address: 9B5F18 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A06E91B6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007F46A06E91B6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9B5F18 second address: 9B5F1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9B613D second address: 9B6144 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9B6144 second address: 9B615A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F46A0F6013Bh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9B615A second address: 9B615E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9C130D second address: 9C131A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jl 00007F46A0F60136h 0x00000009 push edi 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9C131A second address: 9C1343 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jnc 00007F46A06E91A6h 0x00000012 jmp 00007F46A06E91B7h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9C0BC8 second address: 9C0BCE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9C0BCE second address: 9C0BEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F46A06E91AFh 0x0000000a jg 00007F46A06E91ACh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9C889B second address: 9C88AE instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F46A0F60138h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e push eax 0x0000000f push edx 0x00000010 push esi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9C88AE second address: 9C88B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9C88B3 second address: 9C88D1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A0F6013Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 js 00007F46A0F60136h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9C88D1 second address: 9C88D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9C88D7 second address: 9C88E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007F46A0F60136h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9C88E2 second address: 7F888F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pop eax 0x00000008 jng 00007F46A06E91ACh 0x0000000e pushad 0x0000000f mov si, cx 0x00000012 stc 0x00000013 popad 0x00000014 push dword ptr [ebp+122D05E5h] 0x0000001a cmc 0x0000001b call dword ptr [ebp+122D2EA0h] 0x00000021 pushad 0x00000022 jne 00007F46A06E91ACh 0x00000028 xor eax, eax 0x0000002a xor dword ptr [ebp+122D20DDh], edx 0x00000030 mov edx, dword ptr [esp+28h] 0x00000034 pushad 0x00000035 jmp 00007F46A06E91B5h 0x0000003a mov edx, dword ptr [ebp+122D29FAh] 0x00000040 popad 0x00000041 mov dword ptr [ebp+122D289Eh], eax 0x00000047 cmc 0x00000048 jmp 00007F46A06E91ADh 0x0000004d mov esi, 0000003Ch 0x00000052 or dword ptr [ebp+122D20DDh], ecx 0x00000058 add esi, dword ptr [esp+24h] 0x0000005c cld 0x0000005d lodsw 0x0000005f jmp 00007F46A06E91B8h 0x00000064 add eax, dword ptr [esp+24h] 0x00000068 jne 00007F46A06E91BDh 0x0000006e mov ebx, dword ptr [esp+24h] 0x00000072 jmp 00007F46A06E91B3h 0x00000077 nop 0x00000078 pushad 0x00000079 ja 00007F46A06E91A8h 0x0000007f push esi 0x00000080 jmp 00007F46A06E91B9h 0x00000085 pop esi 0x00000086 popad 0x00000087 push eax 0x00000088 push esi 0x00000089 pushad 0x0000008a push eax 0x0000008b push edx 0x0000008c rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9CD25E second address: 9CD262 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9CD262 second address: 9CD268 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9CBF2F second address: 9CBF42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jne 00007F46A0F60163h 0x0000000d push eax 0x0000000e push edx 0x0000000f push edx 0x00000010 pop edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9CCB3B second address: 9CCB41 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9CCF75 second address: 9CCFA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 pushad 0x00000007 jg 00007F46A0F60142h 0x0000000d jp 00007F46A0F60136h 0x00000013 jl 00007F46A0F60136h 0x00000019 jmp 00007F46A0F60140h 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D4158 second address: 9D4175 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A06E91B1h 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 pop eax 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D4175 second address: 9D4196 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007F46A0F60148h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D4196 second address: 9D41AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edi 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e jl 00007F46A06E91A6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D41AA second address: 9D41B2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D2F7E second address: 9D2F85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D2F85 second address: 9D2F8D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D2F8D second address: 9D2F91 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A0BC4 second address: 9A0BCA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A0BCA second address: 9A0BCE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A0CC6 second address: 9A0CCC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A0CCC second address: 9A0CD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A10F5 second address: 9A10F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A10F9 second address: 9A10FF instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A11D1 second address: 9A11D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A14A1 second address: 9A14AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F46A06E91A6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A14AB second address: 9A14E3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jno 00007F46A0F6013Eh 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 jmp 00007F46A0F60147h 0x0000001b push esi 0x0000001c pop esi 0x0000001d popad 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A14E3 second address: 9A14E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A14E9 second address: 9A151E instructions: 0x00000000 rdtsc 0x00000002 jno 00007F46A0F60136h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e jmp 00007F46A0F60140h 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 pushad 0x00000018 pushad 0x00000019 push esi 0x0000001a pop esi 0x0000001b js 00007F46A0F60136h 0x00000021 popad 0x00000022 push eax 0x00000023 push edx 0x00000024 jo 00007F46A0F60136h 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A16E1 second address: 9A16E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A1B17 second address: 9A1B2C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A0F60141h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A1B2C second address: 9A1B5E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jl 00007F46A06E91A6h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d mov dword ptr [ebp+122D1BC4h], esi 0x00000013 mov edx, 31444163h 0x00000018 push 0000001Eh 0x0000001a mov ecx, dword ptr [ebp+122D1D35h] 0x00000020 nop 0x00000021 pushad 0x00000022 jno 00007F46A06E91A8h 0x00000028 js 00007F46A06E91ACh 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A1EDE second address: 9A1F50 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A0F60140h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jno 00007F46A0F60140h 0x00000010 nop 0x00000011 xor dword ptr [ebp+1245FC84h], ecx 0x00000017 lea eax, dword ptr [ebp+1247B938h] 0x0000001d call 00007F46A0F60149h 0x00000022 call 00007F46A0F60147h 0x00000027 mov di, bx 0x0000002a pop edi 0x0000002b pop ecx 0x0000002c nop 0x0000002d push eax 0x0000002e push edx 0x0000002f jng 00007F46A0F6013Ch 0x00000035 push eax 0x00000036 push edx 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A1F50 second address: 9A1F54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A1F54 second address: 9A1F69 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F46A0F6013Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A1F69 second address: 9A1F71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D326C second address: 9D328F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F46A0F60146h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 pop eax 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D328F second address: 9D329B instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F46A06E91A6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D33C9 second address: 9D33CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D33CF second address: 9D33D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D33D3 second address: 9D342E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A0F60142h 0x00000007 jmp 00007F46A0F60144h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f pushad 0x00000010 jnl 00007F46A0F60136h 0x00000016 jmp 00007F46A0F60149h 0x0000001b pushad 0x0000001c popad 0x0000001d jmp 00007F46A0F6013Ah 0x00000022 popad 0x00000023 push esi 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D342E second address: 9D3440 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop esi 0x00000007 je 00007F46A06E91A8h 0x0000000d push edi 0x0000000e pop edi 0x0000000f push edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D3604 second address: 9D3608 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D38E6 second address: 9D38EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9836C5 second address: 9836CB instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D82FE second address: 9D831F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F46A06E91B7h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D831F second address: 9D8323 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D8323 second address: 9D833A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A06E91B3h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D860D second address: 9D863A instructions: 0x00000000 rdtsc 0x00000002 je 00007F46A0F60142h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b jmp 00007F46A0F60142h 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D8905 second address: 9D8909 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D8909 second address: 9D890F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D8B68 second address: 9D8B6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D8B6E second address: 9D8B77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D8B77 second address: 9D8B81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F46A06E91A6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D8D01 second address: 9D8D36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F46A0F60146h 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F46A0F60142h 0x00000011 jc 00007F46A0F60136h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D8D36 second address: 9D8D3A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D9161 second address: 9D9174 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A0F6013Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9D9174 second address: 9D9179 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9DE6DB second address: 9DE6E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9DE6E3 second address: 9DE6E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9DE6E9 second address: 9DE6F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9DE6F2 second address: 9DE6F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9DE6F6 second address: 9DE6FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9E25D5 second address: 9E25D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9E2ACF second address: 9E2AE7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F46A0F6013Fh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9E2AE7 second address: 9E2AED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9E2AED second address: 9E2AFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F46A0F60136h 0x0000000a jg 00007F46A0F60136h 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9E2C75 second address: 9E2C91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F46A06E91B4h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9E2C91 second address: 9E2CA2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jmp 00007F46A0F6013Bh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9E2334 second address: 9E233A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9E233A second address: 9E2348 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A0F6013Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9E2348 second address: 9E234E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9E234E second address: 9E2352 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9E65E1 second address: 9E65E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9E65E6 second address: 9E65EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9E65EC second address: 9E65F2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9E65F2 second address: 9E6613 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F46A0F60144h 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9E88BD second address: 9E88C4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9E88C4 second address: 9E88CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9E84BD second address: 9E84C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9ED711 second address: 9ED715 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9ED715 second address: 9ED730 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F46A06E91A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F46A06E91ADh 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9ECF6A second address: 9ECF74 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F46A0F60136h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9ECF74 second address: 9ECF7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9ECF7A second address: 9ECF9B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A0F60145h 0x00000007 jg 00007F46A0F6013Eh 0x0000000d push eax 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9ECF9B second address: 9ECFAA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 js 00007F46A06E91A6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9ED4DB second address: 9ED4F6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A0F60147h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9F0A24 second address: 9F0A29 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9F0B5D second address: 9F0B61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9F0C7D second address: 9F0CB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007F46A06E91B3h 0x0000000a pushad 0x0000000b jmp 00007F46A06E91B0h 0x00000010 jnl 00007F46A06E91A6h 0x00000016 push ebx 0x00000017 pop ebx 0x00000018 popad 0x00000019 popad 0x0000001a pushad 0x0000001b pushad 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9F77B8 second address: 9F77BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9F77BE second address: 9F77C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9F77C3 second address: 9F77C9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9F77C9 second address: 9F77CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9F6284 second address: 9F628A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9F6413 second address: 9F6432 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F46A06E91B4h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9F6432 second address: 9F6436 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9F6436 second address: 9F6447 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jp 00007F46A06E91A6h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9F6447 second address: 9F6496 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 jmp 00007F46A0F6013Ah 0x0000000e jc 00007F46A0F60136h 0x00000014 jmp 00007F46A0F60146h 0x00000019 jns 00007F46A0F60136h 0x0000001f popad 0x00000020 jmp 00007F46A0F60149h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9F660A second address: 9F6621 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jno 00007F46A06E91A6h 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9A1B07 second address: 9A1B17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a jnl 00007F46A0F60136h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9F9C09 second address: 9F9C0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9F9C0D second address: 9F9C13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9F9C13 second address: 9F9C30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F46A06E91B4h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A00B59 second address: A00B5F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9FEBF7 second address: 9FEC19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push ebx 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 jmp 00007F46A06E91B9h 0x0000000d pop ebx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9FF170 second address: 9FF174 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9FF174 second address: 9FF184 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007F46A06E91AEh 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9FF40A second address: 9FF426 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jmp 00007F46A0F60143h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9FF9F3 second address: 9FF9F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9FF9F7 second address: 9FFA2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007F46A0F60143h 0x0000000e jmp 00007F46A0F6013Fh 0x00000013 jbe 00007F46A0F60136h 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9FFA2D second address: 9FFA33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9FFA33 second address: 9FFA67 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A0F6013Ah 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f pushad 0x00000010 popad 0x00000011 pop edi 0x00000012 push eax 0x00000013 jmp 00007F46A0F60145h 0x00000018 jng 00007F46A0F60136h 0x0000001e pop eax 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9FFA67 second address: 9FFA7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F46A06E91B2h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9FFA7D second address: 9FFA81 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9FFD50 second address: 9FFD5A instructions: 0x00000000 rdtsc 0x00000002 jno 00007F46A06E91A6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9FFD5A second address: 9FFD71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 je 00007F46A0F60136h 0x0000000d push eax 0x0000000e pop eax 0x0000000f push edi 0x00000010 pop edi 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 popad 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 9FFD71 second address: 9FFD77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A00073 second address: A00082 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A00082 second address: A00086 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A00086 second address: A0008E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A0008E second address: A00096 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A00096 second address: A000A0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A000A0 second address: A000AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F46A06E91A6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A07C90 second address: A07C98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A07C98 second address: A07CDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F46A06E91B0h 0x0000000b jmp 00007F46A06E91B4h 0x00000010 popad 0x00000011 pop edx 0x00000012 push esi 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F46A06E91B2h 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A07E4D second address: A07E57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F46A0F60136h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A07E57 second address: A07E71 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F46A06E91A6h 0x00000008 jl 00007F46A06E91A6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jp 00007F46A06E91AEh 0x00000016 pushad 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A07FB1 second address: A07FB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A07FB7 second address: A07FBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A0838F second address: A08393 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A08393 second address: A08399 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A08399 second address: A083C3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A0F60143h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007F46A0F6013Eh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A08520 second address: A0852A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A0852A second address: A08540 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F46A0F6013Bh 0x0000000a popad 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A08540 second address: A08544 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A08544 second address: A08548 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A0FFE5 second address: A0FFEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A0FFEB second address: A0FFF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A0FFF1 second address: A10003 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F46A06E91ADh 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A10569 second address: A1056D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A1056D second address: A10579 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F46A06E91A6h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A1072D second address: A1075C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F46A0F6013Ah 0x00000008 jno 00007F46A0F60136h 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 push edx 0x00000011 pop edx 0x00000012 popad 0x00000013 pushad 0x00000014 jmp 00007F46A0F60144h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A0F617 second address: A0F61B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A0F61B second address: A0F61F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A0F61F second address: A0F625 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A171C9 second address: A171CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A171CE second address: A171DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jp 00007F46A06E91A6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A171DD second address: A171E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A16D23 second address: A16D2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A16D2F second address: A16D40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jns 00007F46A0F60136h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A16D40 second address: A16D60 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F46A06E91B5h 0x0000000c push edx 0x0000000d pop edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A16EB6 second address: A16EE1 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F46A0F6013Eh 0x00000008 jns 00007F46A0F60136h 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F46A0F60147h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A16EE1 second address: A16EE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A196CF second address: A196D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A196D4 second address: A196D9 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 954BF9 second address: 954C00 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A25568 second address: A25574 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A25574 second address: A25578 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A250FF second address: A2510A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F46A06E91A6h 0x0000000a pop ecx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A2510A second address: A2510F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A2510F second address: A2511D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F46A06E91A6h 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A26B99 second address: A26BDD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A0F60147h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a jl 00007F46A0F60136h 0x00000010 pop edi 0x00000011 jne 00007F46A0F6013Ch 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a jne 00007F46A0F60142h 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A2912C second address: A29141 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jmp 00007F46A06E91AAh 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A29141 second address: A2916F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A0F60146h 0x00000007 je 00007F46A0F60136h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f popad 0x00000010 push edi 0x00000011 push ebx 0x00000012 push eax 0x00000013 pop eax 0x00000014 pop ebx 0x00000015 push eax 0x00000016 push edx 0x00000017 jg 00007F46A0F60136h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A2916F second address: A29173 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A2B9F2 second address: A2B9F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A2BB66 second address: A2BB84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F46A06E91B0h 0x0000000b jno 00007F46A06E91A6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A3C833 second address: A3C856 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A0F60143h 0x00000007 jl 00007F46A0F60136h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A3C856 second address: A3C863 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F46A06E91A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A3C863 second address: A3C869 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A3C869 second address: A3C86E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A3C86E second address: A3C87E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007F46A0F60136h 0x0000000a jns 00007F46A0F60136h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A3C87E second address: A3C882 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A3C882 second address: A3C892 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jl 00007F46A0F6013Ch 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A42FA9 second address: A42FAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A42FAF second address: A42FC9 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jc 00007F46A0F60136h 0x0000000d ja 00007F46A0F60136h 0x00000013 pop eax 0x00000014 popad 0x00000015 push edi 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A42FC9 second address: A42FCD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A4310F second address: A43145 instructions: 0x00000000 rdtsc 0x00000002 je 00007F46A0F60136h 0x00000008 jmp 00007F46A0F6013Ch 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push ecx 0x00000010 pushad 0x00000011 popad 0x00000012 pop ecx 0x00000013 popad 0x00000014 jne 00007F46A0F6015Ch 0x0000001a pushad 0x0000001b jmp 00007F46A0F60142h 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A43145 second address: A4314B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A4314B second address: A43151 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A43415 second address: A4341B instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A4341B second address: A43425 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F46A0F6013Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A43425 second address: A43436 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jng 00007F46A06E91A6h 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A4357E second address: A43582 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A43582 second address: A4358E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push edx 0x0000000b pop edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A48282 second address: A48289 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A48289 second address: A482B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 jnp 00007F46A06E91A6h 0x0000000e push eax 0x0000000f pop eax 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 jne 00007F46A06E91A6h 0x0000001c jmp 00007F46A06E91B2h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A482B7 second address: A482BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A482BB second address: A482C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A47DB0 second address: A47DB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push esi 0x00000007 pop esi 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A47F35 second address: A47F3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A47F3A second address: A47F7F instructions: 0x00000000 rdtsc 0x00000002 jno 00007F46A0F60138h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jc 00007F46A0F6016Eh 0x00000010 jbe 00007F46A0F60153h 0x00000016 pushad 0x00000017 push ebx 0x00000018 pop ebx 0x00000019 jmp 00007F46A0F6013Bh 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A508B7 second address: A508C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 pop eax 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A66308 second address: A6630E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A664BF second address: A664D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jnc 00007F46A06E91ACh 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A67DDD second address: A67DE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edi 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A67DE4 second address: A67E1B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 js 00007F46A06E91A6h 0x00000009 jmp 00007F46A06E91AFh 0x0000000e jmp 00007F46A06E91B6h 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 jnc 00007F46A06E91A6h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A67E1B second address: A67E1F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A7BF07 second address: A7BF0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A7BF0F second address: A7BF1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F46A0F60136h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A7BF1E second address: A7BF22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A7C53E second address: A7C56C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop esi 0x00000008 pushad 0x00000009 jmp 00007F46A0F60143h 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 jmp 00007F46A0F6013Eh 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A82450 second address: A82456 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A82456 second address: A8247F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F46A0F60148h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jno 00007F46A0F60138h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: A83A71 second address: A83A8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F46A06E91B9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 99C105 second address: 99C10F instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F46A0F60136h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 99C10F second address: 99C114 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\lJEIftsml0.exe | RDTSC instruction interceptor: First address: 99F6C3 second address: 99F6C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |