Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481204384.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000002.1523540228.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481204384.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000002.1523540228.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481204384.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000002.1523540228.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://broadcast.st.dl.eccdnx.com |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481204384.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000002.1523540228.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/fatalerror.css?v=OFUqlcDNiD6y&l=engli |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481204384.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000002.1523540228.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481204384.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000002.1523540228.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481204384.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000002.1523540228.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481204384.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000002.1523540228.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=FRRi |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: oQSTpQfzz5.exe, 00000000.00000002.1523617032.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.ste |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://player.vimeo.com |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481204384.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000002.1523540228.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481204384.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000002.1523540228.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481291479.0000000000D33000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480874165.0000000000D33000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D4C000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480874165.0000000000D4A000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000002.1523617032.0000000000D4D000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000002.1523571965.0000000000D33000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900 |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/tore |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481159176.0000000000D81000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480874165.0000000000D88000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480874165.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000002.1523739954.0000000000D88000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/; |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481159176.0000000000D81000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480874165.0000000000D79000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481204384.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000002.1523540228.0000000000D28000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: oQSTpQfzz5.exe, 00000000.00000003.1480874165.0000000000D2D000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1480835259.0000000000DB9000.00000004.00000020.00020000.00000000.sdmp, oQSTpQfzz5.exe, 00000000.00000003.1481176869.0000000000DC2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: oQSTpQfzz5.exe, 00000000.00000003.1481055532.0000000000D79000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00568600 | 0_2_00568600 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0056B100 | 0_2_0056B100 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005CA054 | 0_2_005CA054 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00662077 | 0_2_00662077 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006CC05C | 0_2_006CC05C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00680028 | 0_2_00680028 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0063C022 | 0_2_0063C022 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0067C024 | 0_2_0067C024 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0066E02F | 0_2_0066E02F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0065202B | 0_2_0065202B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006CE03A | 0_2_006CE03A |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0063A000 | 0_2_0063A000 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005E4034 | 0_2_005E4034 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005FC035 | 0_2_005FC035 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006DA003 | 0_2_006DA003 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005F8027 | 0_2_005F8027 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0069E011 | 0_2_0069E011 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_007240F2 | 0_2_007240F2 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006720E6 | 0_2_006720E6 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006D80E9 | 0_2_006D80E9 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0072E0F7 | 0_2_0072E0F7 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0058A0CA | 0_2_0058A0CA |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006060F8 | 0_2_006060F8 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006380C1 | 0_2_006380C1 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006820D9 | 0_2_006820D9 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005E20ED | 0_2_005E20ED |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0058C0E6 | 0_2_0058C0E6 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005760E9 | 0_2_005760E9 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0058C09E | 0_2_0058C09E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006C40A3 | 0_2_006C40A3 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00636080 | 0_2_00636080 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005D20A9 | 0_2_005D20A9 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006A809E | 0_2_006A809E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006DE09B | 0_2_006DE09B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00690092 | 0_2_00690092 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0058C09E | 0_2_0058C09E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006AC162 | 0_2_006AC162 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0065016F | 0_2_0065016F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0060217A | 0_2_0060217A |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00632147 | 0_2_00632147 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006A614C | 0_2_006A614C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00566160 | 0_2_00566160 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00612158 | 0_2_00612158 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00578169 | 0_2_00578169 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006C613F | 0_2_006C613F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00684102 | 0_2_00684102 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005DE12B | 0_2_005DE12B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0066E1E4 | 0_2_0066E1E4 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005881CC | 0_2_005881CC |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006601C1 | 0_2_006601C1 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006301A5 | 0_2_006301A5 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0065C1A8 | 0_2_0065C1A8 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006241B7 | 0_2_006241B7 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006521B3 | 0_2_006521B3 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0058E180 | 0_2_0058E180 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0065418C | 0_2_0065418C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0060E197 | 0_2_0060E197 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00616199 | 0_2_00616199 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005CC25C | 0_2_005CC25C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005D2255 | 0_2_005D2255 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00600275 | 0_2_00600275 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0069A271 | 0_2_0069A271 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00694270 | 0_2_00694270 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00564270 | 0_2_00564270 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0060425D | 0_2_0060425D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0062825F | 0_2_0062825F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006DE22E | 0_2_006DE22E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0063C227 | 0_2_0063C227 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006CE22A | 0_2_006CE22A |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00620200 | 0_2_00620200 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00686219 | 0_2_00686219 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0057E220 | 0_2_0057E220 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005842D0 | 0_2_005842D0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006D42F7 | 0_2_006D42F7 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006402C5 | 0_2_006402C5 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006082C3 | 0_2_006082C3 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006742C9 | 0_2_006742C9 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0063E2D4 | 0_2_0063E2D4 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005F82E1 | 0_2_005F82E1 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0068A2A3 | 0_2_0068A2A3 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0069C2B1 | 0_2_0069C2B1 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0067828F | 0_2_0067828F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00698283 | 0_2_00698283 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005C22B0 | 0_2_005C22B0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0060C299 | 0_2_0060C299 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00660377 | 0_2_00660377 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0067A344 | 0_2_0067A344 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0065A34F | 0_2_0065A34F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00646352 | 0_2_00646352 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006D0335 | 0_2_006D0335 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0063A33A | 0_2_0063A33A |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005C833C | 0_2_005C833C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006D630D | 0_2_006D630D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005EC33B | 0_2_005EC33B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005DA32D | 0_2_005DA32D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006BC31C | 0_2_006BC31C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006B4315 | 0_2_006B4315 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0061A31E | 0_2_0061A31E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005883D8 | 0_2_005883D8 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006683EA | 0_2_006683EA |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0069E3FE | 0_2_0069E3FE |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005D63FC | 0_2_005D63FC |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0062E3D5 | 0_2_0062E3D5 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006803AB | 0_2_006803AB |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00606383 | 0_2_00606383 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006A238E | 0_2_006A238E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005C645F | 0_2_005C645F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006CA467 | 0_2_006CA467 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005F6453 | 0_2_005F6453 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005FC451 | 0_2_005FC451 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0067C469 | 0_2_0067C469 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0063C46C | 0_2_0063C46C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00676471 | 0_2_00676471 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0059A440 | 0_2_0059A440 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005DC47F | 0_2_005DC47F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0060A44E | 0_2_0060A44E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00618453 | 0_2_00618453 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0068C45D | 0_2_0068C45D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00674451 | 0_2_00674451 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005A0460 | 0_2_005A0460 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0066E459 | 0_2_0066E459 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005F4412 | 0_2_005F4412 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0064A438 | 0_2_0064A438 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006D240D | 0_2_006D240D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00636405 | 0_2_00636405 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005EA433 | 0_2_005EA433 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005F242A | 0_2_005F242A |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006384E4 | 0_2_006384E4 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006C04E7 | 0_2_006C04E7 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006524E8 | 0_2_006524E8 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0062A4F0 | 0_2_0062A4F0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006104F4 | 0_2_006104F4 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006B84FC | 0_2_006B84FC |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005804C6 | 0_2_005804C6 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005824E0 | 0_2_005824E0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006904B9 | 0_2_006904B9 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006A04BD | 0_2_006A04BD |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0062C48B | 0_2_0062C48B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0068E487 | 0_2_0068E487 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005C455D | 0_2_005C455D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0061C577 | 0_2_0061C577 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006CE576 | 0_2_006CE576 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0062857D | 0_2_0062857D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00682577 | 0_2_00682577 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00584560 | 0_2_00584560 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005CA567 | 0_2_005CA567 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005F0561 | 0_2_005F0561 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00632529 | 0_2_00632529 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0065053B | 0_2_0065053B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006AA534 | 0_2_006AA534 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0066A506 | 0_2_0066A506 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0058C53C | 0_2_0058C53C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005E253A | 0_2_005E253A |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0062251C | 0_2_0062251C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0060E5E6 | 0_2_0060E5E6 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0059A5D4 | 0_2_0059A5D4 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0066E5F1 | 0_2_0066E5F1 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006A25F3 | 0_2_006A25F3 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005665F0 | 0_2_005665F0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006C65CB | 0_2_006C65CB |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006C85D7 | 0_2_006C85D7 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006245AB | 0_2_006245AB |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006BA5A2 | 0_2_006BA5A2 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005EE591 | 0_2_005EE591 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0069A5BF | 0_2_0069A5BF |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006985B3 | 0_2_006985B3 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006DA5B3 | 0_2_006DA5B3 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006A4589 | 0_2_006A4589 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00636594 | 0_2_00636594 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0059C5A0 | 0_2_0059C5A0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005DA65F | 0_2_005DA65F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00736675 | 0_2_00736675 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00598650 | 0_2_00598650 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0067267B | 0_2_0067267B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006D4670 | 0_2_006D4670 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0068A677 | 0_2_0068A677 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0069C64D | 0_2_0069C64D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0065C64A | 0_2_0065C64A |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0057E630 | 0_2_0057E630 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005E0636 | 0_2_005E0636 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0060C60F | 0_2_0060C60F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0064E61B | 0_2_0064E61B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006086E1 | 0_2_006086E1 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005846D0 | 0_2_005846D0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_007226E6 | 0_2_007226E6 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005F66C7 | 0_2_005F66C7 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005A06F0 | 0_2_005A06F0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006006CB | 0_2_006006CB |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006926D1 | 0_2_006926D1 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005F86E2 | 0_2_005F86E2 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0063E6AB | 0_2_0063E6AB |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006CC6A2 | 0_2_006CC6A2 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006486B4 | 0_2_006486B4 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0056E687 | 0_2_0056E687 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0068668E | 0_2_0068668E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0062A685 | 0_2_0062A685 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0061E69E | 0_2_0061E69E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00628760 | 0_2_00628760 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0067E765 | 0_2_0067E765 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0069676F | 0_2_0069676F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00572750 | 0_2_00572750 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0062A769 | 0_2_0062A769 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0067C779 | 0_2_0067C779 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0068E74B | 0_2_0068E74B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00656756 | 0_2_00656756 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005C2762 | 0_2_005C2762 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0065872F | 0_2_0065872F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005E070E | 0_2_005E070E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00618733 | 0_2_00618733 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005CC73D | 0_2_005CC73D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006DC71F | 0_2_006DC71F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005EA72B | 0_2_005EA72B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006D6716 | 0_2_006D6716 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0067871A | 0_2_0067871A |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005DE7DF | 0_2_005DE7DF |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005E27DA | 0_2_005E27DA |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006267E9 | 0_2_006267E9 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0066C7F0 | 0_2_0066C7F0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0080671D | 0_2_0080671D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005DC7E5 | 0_2_005DC7E5 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006C27AD | 0_2_006C27AD |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005C8788 | 0_2_005C8788 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00646860 | 0_2_00646860 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0068886E | 0_2_0068886E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0056C840 | 0_2_0056C840 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0061087C | 0_2_0061087C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0069284A | 0_2_0069284A |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005CE81E | 0_2_005CE81E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005CA814 | 0_2_005CA814 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0061A83E | 0_2_0061A83E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006B081F | 0_2_006B081F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005D0826 | 0_2_005D0826 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006C08EC | 0_2_006C08EC |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006788ED | 0_2_006788ED |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006AA8C0 | 0_2_006AA8C0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006BA8D5 | 0_2_006BA8D5 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006848AB | 0_2_006848AB |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006A08A7 | 0_2_006A08A7 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0063C8B3 | 0_2_0063C8B3 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005C68BC | 0_2_005C68BC |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005988B0 | 0_2_005988B0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005D88B2 | 0_2_005D88B2 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0057C8A0 | 0_2_0057C8A0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0065096F | 0_2_0065096F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0067497D | 0_2_0067497D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0060494B | 0_2_0060494B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0060E94B | 0_2_0060E94B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0057E960 | 0_2_0057E960 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006CA92F | 0_2_006CA92F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00586910 | 0_2_00586910 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005FA939 | 0_2_005FA939 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0066890F | 0_2_0066890F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005F292A | 0_2_005F292A |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006B89DB | 0_2_006B89DB |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0058C9EB | 0_2_0058C9EB |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005D69EA | 0_2_005D69EA |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005A09E0 | 0_2_005A09E0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_007169CC | 0_2_007169CC |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0069E9B3 | 0_2_0069E9B3 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005E6981 | 0_2_005E6981 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00624983 | 0_2_00624983 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0069A98B | 0_2_0069A98B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00634985 | 0_2_00634985 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00638988 | 0_2_00638988 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00632991 | 0_2_00632991 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006B0994 | 0_2_006B0994 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0067AA76 | 0_2_0067AA76 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0059CA40 | 0_2_0059CA40 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006A2A4D | 0_2_006A2A4D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00614A4F | 0_2_00614A4F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006B6A2B | 0_2_006B6A2B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00628A27 | 0_2_00628A27 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0064CA23 | 0_2_0064CA23 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00658A34 | 0_2_00658A34 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0064AA01 | 0_2_0064AA01 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006A4A12 | 0_2_006A4A12 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00682A11 | 0_2_00682A11 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00644AEF | 0_2_00644AEF |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006D2AE1 | 0_2_006D2AE1 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00636AF6 | 0_2_00636AF6 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005CEACA | 0_2_005CEACA |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005FAAF8 | 0_2_005FAAF8 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005F8AEA | 0_2_005F8AEA |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0065EAD0 | 0_2_0065EAD0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00698ADF | 0_2_00698ADF |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006C6AD3 | 0_2_006C6AD3 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006B2AA6 | 0_2_006B2AA6 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00630AB5 | 0_2_00630AB5 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006D6ABB | 0_2_006D6ABB |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0062CA83 | 0_2_0062CA83 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00588ABC | 0_2_00588ABC |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0068AA84 | 0_2_0068AA84 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00662A94 | 0_2_00662A94 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005C4AA6 | 0_2_005C4AA6 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00666B62 | 0_2_00666B62 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0060CB67 | 0_2_0060CB67 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0056AB40 | 0_2_0056AB40 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005EAB6F | 0_2_005EAB6F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00600B5D | 0_2_00600B5D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00670B22 | 0_2_00670B22 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00578B1B | 0_2_00578B1B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005D0B04 | 0_2_005D0B04 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00620B07 | 0_2_00620B07 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00696B13 | 0_2_00696B13 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005ECBDB | 0_2_005ECBDB |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00618BFD | 0_2_00618BFD |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00656BFA | 0_2_00656BFA |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006DCBCF | 0_2_006DCBCF |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00626BB0 | 0_2_00626BB0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0057EB80 | 0_2_0057EB80 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005F2B81 | 0_2_005F2B81 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006ACB8E | 0_2_006ACB8E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00564BA0 | 0_2_00564BA0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00684C6D | 0_2_00684C6D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0063CC7C | 0_2_0063CC7C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005E2C73 | 0_2_005E2C73 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00646C4A | 0_2_00646C4A |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005CCC6B | 0_2_005CCC6B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005CAC0C | 0_2_005CAC0C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005D2C3A | 0_2_005D2C3A |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0068CC19 | 0_2_0068CC19 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0065AC16 | 0_2_0065AC16 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0066CC1B | 0_2_0066CC1B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006A8CE6 | 0_2_006A8CE6 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00692CFA | 0_2_00692CFA |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006B8CC2 | 0_2_006B8CC2 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0061ACCB | 0_2_0061ACCB |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0072ACD9 | 0_2_0072ACD9 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006A0CC7 | 0_2_006A0CC7 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00676CD5 | 0_2_00676CD5 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00632CD7 | 0_2_00632CD7 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0069CCDE | 0_2_0069CCDE |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00616CA4 | 0_2_00616CA4 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005DCC91 | 0_2_005DCC91 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00634CB2 | 0_2_00634CB2 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006BAC86 | 0_2_006BAC86 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00650C8B | 0_2_00650C8B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0066EC96 | 0_2_0066EC96 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00574CA0 | 0_2_00574CA0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006C8C9B | 0_2_006C8C9B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0060AC9D | 0_2_0060AC9D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0058CD5E | 0_2_0058CD5E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0060ED67 | 0_2_0060ED67 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005F4D4E | 0_2_005F4D4E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0058CD4C | 0_2_0058CD4C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00648D7F | 0_2_00648D7F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005E6D7C | 0_2_005E6D7C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00664D20 | 0_2_00664D20 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0062ED02 | 0_2_0062ED02 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0063AD0C | 0_2_0063AD0C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00586D2E | 0_2_00586D2E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005FED27 | 0_2_005FED27 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005A0D20 | 0_2_005A0D20 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00678DE7 | 0_2_00678DE7 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005FADDE | 0_2_005FADDE |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0063EDE7 | 0_2_0063EDE7 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00674DE0 | 0_2_00674DE0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006CEDE5 | 0_2_006CEDE5 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00688DE5 | 0_2_00688DE5 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00666DF6 | 0_2_00666DF6 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006D2DFD | 0_2_006D2DFD |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0063CDFD | 0_2_0063CDFD |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00636DC6 | 0_2_00636DC6 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0059CDF0 | 0_2_0059CDF0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005E4DE6 | 0_2_005E4DE6 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00628DA7 | 0_2_00628DA7 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005F0D8C | 0_2_005F0D8C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005F6D8C | 0_2_005F6D8C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00670DBE | 0_2_00670DBE |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006B0D8B | 0_2_006B0D8B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00690D88 | 0_2_00690D88 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006B6D8E | 0_2_006B6D8E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006D8D82 | 0_2_006D8D82 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006BCD9E | 0_2_006BCD9E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0065CD9A | 0_2_0065CD9A |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00638E64 | 0_2_00638E64 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0064CE72 | 0_2_0064CE72 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0062AE47 | 0_2_0062AE47 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00654E43 | 0_2_00654E43 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006B8E4D | 0_2_006B8E4D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0067EE4B | 0_2_0067EE4B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00580E6C | 0_2_00580E6C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00582E6D | 0_2_00582E6D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0058EE63 | 0_2_0058EE63 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0062CE2E | 0_2_0062CE2E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00622E36 | 0_2_00622E36 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006B2E30 | 0_2_006B2E30 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0065EE05 | 0_2_0065EE05 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006A4E03 | 0_2_006A4E03 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006D4E13 | 0_2_006D4E13 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00652EFC | 0_2_00652EFC |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00696EC4 | 0_2_00696EC4 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00612ED7 | 0_2_00612ED7 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00672EDE | 0_2_00672EDE |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005EAE9B | 0_2_005EAE9B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00662EBF | 0_2_00662EBF |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0067AEB9 | 0_2_0067AEB9 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005E0E81 | 0_2_005E0E81 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00600E83 | 0_2_00600E83 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00698E8D | 0_2_00698E8D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00562EB0 | 0_2_00562EB0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0057AEB0 | 0_2_0057AEB0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005ECEB1 | 0_2_005ECEB1 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00598EA0 | 0_2_00598EA0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00644E99 | 0_2_00644E99 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006BEE95 | 0_2_006BEE95 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00576F52 | 0_2_00576F52 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00678F6E | 0_2_00678F6E |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00626F72 | 0_2_00626F72 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005C6F48 | 0_2_005C6F48 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00692F7F | 0_2_00692F7F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005D2F79 | 0_2_005D2F79 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005D0F75 | 0_2_005D0F75 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00684F24 | 0_2_00684F24 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005D4F3F | 0_2_005D4F3F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0066CF0F | 0_2_0066CF0F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00660F16 | 0_2_00660F16 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005DAF2B | 0_2_005DAF2B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00640FC8 | 0_2_00640FC8 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006D6FC3 | 0_2_006D6FC3 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0062AFDD | 0_2_0062AFDD |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0064EFA3 | 0_2_0064EFA3 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0061AF81 | 0_2_0061AF81 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00614F85 | 0_2_00614F85 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006DCF86 | 0_2_006DCF86 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00617077 | 0_2_00617077 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0068B056 | 0_2_0068B056 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006C702F | 0_2_006C702F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0068102F | 0_2_0068102F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0057D003 | 0_2_0057D003 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005ED032 | 0_2_005ED032 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006A7005 | 0_2_006A7005 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0056D021 | 0_2_0056D021 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005E1025 | 0_2_005E1025 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005CF0D5 | 0_2_005CF0D5 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0062F0ED | 0_2_0062F0ED |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0060F0F6 | 0_2_0060F0F6 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006690FB | 0_2_006690FB |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006B70CC | 0_2_006B70CC |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005F90EF | 0_2_005F90EF |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0060D0D7 | 0_2_0060D0D7 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0063B0DF | 0_2_0063B0DF |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006C90AE | 0_2_006C90AE |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006A30A1 | 0_2_006A30A1 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005EF086 | 0_2_005EF086 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006D90B5 | 0_2_006D90B5 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005C50B4 | 0_2_005C50B4 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00619099 | 0_2_00619099 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005FF159 | 0_2_005FF159 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0068D173 | 0_2_0068D173 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0066D17A | 0_2_0066D17A |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0061D140 | 0_2_0061D140 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0064F14D | 0_2_0064F14D |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0064B15C | 0_2_0064B15C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006A9123 | 0_2_006A9123 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006AD123 | 0_2_006AD123 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006C113F | 0_2_006C113F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0065713F | 0_2_0065713F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00665112 | 0_2_00665112 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005DD122 | 0_2_005DD122 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006DB1E2 | 0_2_006DB1E2 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006011F5 | 0_2_006011F5 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006491C0 | 0_2_006491C0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0069F1B8 | 0_2_0069F1B8 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0059F18B | 0_2_0059F18B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0063F1B8 | 0_2_0063F1B8 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006091BE | 0_2_006091BE |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0064D18C | 0_2_0064D18C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0063D18F | 0_2_0063D18F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005891AE | 0_2_005891AE |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00603269 | 0_2_00603269 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0067726A | 0_2_0067726A |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005DF249 | 0_2_005DF249 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0067D27F | 0_2_0067D27F |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005DB244 | 0_2_005DB244 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005F5274 | 0_2_005F5274 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0069922C | 0_2_0069922C |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006D5224 | 0_2_006D5224 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00675230 | 0_2_00675230 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006B3203 | 0_2_006B3203 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0062120B | 0_2_0062120B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00571227 | 0_2_00571227 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00605210 | 0_2_00605210 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005F122A | 0_2_005F122A |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006CF217 | 0_2_006CF217 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006C3212 | 0_2_006C3212 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005D32DD | 0_2_005D32DD |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006132C2 | 0_2_006132C2 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005E72FA | 0_2_005E72FA |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006852DE | 0_2_006852DE |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005C72E3 | 0_2_005C72E3 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006CD2AA | 0_2_006CD2AA |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006BD2A4 | 0_2_006BD2A4 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006832B0 | 0_2_006832B0 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_00599280 | 0_2_00599280 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_005FB2B3 | 0_2_005FB2B3 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_006AF286 | 0_2_006AF286 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0066329B | 0_2_0066329B |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0069B296 | 0_2_0069B296 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | Code function: 0_2_0069D296 | 0_2_0069D296 |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 5B955F second address: 5B9565 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 5B9565 second address: 5B9569 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73B774 second address: 73B77A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73B77A second address: 73B77E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73B77E second address: 73B782 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73B782 second address: 73B78B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73B78B second address: 73B7B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jmp 00007FBA592642B1h 0x0000000b jmp 00007FBA592642B6h 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73B7B9 second address: 73B809 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FBA5938170Ch 0x00000008 push esi 0x00000009 jmp 00007FBA59381715h 0x0000000e pop esi 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pushad 0x00000012 jmp 00007FBA5938170Dh 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FBA59381717h 0x0000001e push esi 0x0000001f pop esi 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73B809 second address: 73B80D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 723CEA second address: 723CEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 723CEE second address: 723CF9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73A944 second address: 73A98D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jng 00007FBA59381730h 0x0000000d push eax 0x0000000e jg 00007FBA59381706h 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 jnc 00007FBA59381706h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73AC22 second address: 73AC28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73B09F second address: 73B0C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007FBA59381706h 0x0000000a jmp 00007FBA59381719h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73E3D4 second address: 73E3DE instructions: 0x00000000 rdtsc 0x00000002 je 00007FBA592642A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73E3DE second address: 73E412 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA59381715h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a mov dx, di 0x0000000d push 00000000h 0x0000000f mov edx, dword ptr [ebp+122D297Ah] 0x00000015 push 4F992DF1h 0x0000001a jnc 00007FBA59381714h 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73E412 second address: 73E416 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73E416 second address: 73E4C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 xor dword ptr [esp], 4F992D71h 0x0000000d push 00000000h 0x0000000f push esi 0x00000010 call 00007FBA59381708h 0x00000015 pop esi 0x00000016 mov dword ptr [esp+04h], esi 0x0000001a add dword ptr [esp+04h], 00000017h 0x00000022 inc esi 0x00000023 push esi 0x00000024 ret 0x00000025 pop esi 0x00000026 ret 0x00000027 push 00000003h 0x00000029 add esi, 2EA61283h 0x0000002f call 00007FBA59381710h 0x00000034 pop ecx 0x00000035 push 00000000h 0x00000037 mov dword ptr [ebp+122D3047h], ecx 0x0000003d push 00000003h 0x0000003f mov dx, si 0x00000042 push 5BF75519h 0x00000047 jnl 00007FBA59381720h 0x0000004d add dword ptr [esp], 6408AAE7h 0x00000054 mov esi, dword ptr [ebp+122D29C6h] 0x0000005a lea ebx, dword ptr [ebp+124592CCh] 0x00000060 mov edx, dword ptr [ebp+122D2E6Ah] 0x00000066 movsx ecx, dx 0x00000069 push eax 0x0000006a pushad 0x0000006b jmp 00007FBA59381712h 0x00000070 push eax 0x00000071 push edx 0x00000072 push eax 0x00000073 push edx 0x00000074 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73E4C1 second address: 73E4C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73E519 second address: 73E528 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jl 00007FBA59381706h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73E528 second address: 73E599 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA592642B9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FBA592642B4h 0x0000000e popad 0x0000000f nop 0x00000010 mov dword ptr [ebp+122D1EE7h], edx 0x00000016 push 00000000h 0x00000018 push 00000000h 0x0000001a push edi 0x0000001b call 00007FBA592642A8h 0x00000020 pop edi 0x00000021 mov dword ptr [esp+04h], edi 0x00000025 add dword ptr [esp+04h], 0000001Bh 0x0000002d inc edi 0x0000002e push edi 0x0000002f ret 0x00000030 pop edi 0x00000031 ret 0x00000032 mov dh, ch 0x00000034 push ebx 0x00000035 mov edi, dword ptr [ebp+122D2B4Eh] 0x0000003b pop esi 0x0000003c push 07D8FF63h 0x00000041 push ebx 0x00000042 push ebx 0x00000043 push eax 0x00000044 push edx 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73E599 second address: 73E63A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop ebx 0x00000006 xor dword ptr [esp], 07D8FFE3h 0x0000000d push 00000000h 0x0000000f push edi 0x00000010 call 00007FBA59381708h 0x00000015 pop edi 0x00000016 mov dword ptr [esp+04h], edi 0x0000001a add dword ptr [esp+04h], 0000001Bh 0x00000022 inc edi 0x00000023 push edi 0x00000024 ret 0x00000025 pop edi 0x00000026 ret 0x00000027 mov esi, dword ptr [ebp+122D2CC2h] 0x0000002d push 00000003h 0x0000002f mov ch, 2Bh 0x00000031 push 00000000h 0x00000033 sub dword ptr [ebp+122D1D6Bh], esi 0x00000039 push edi 0x0000003a movzx edi, bx 0x0000003d pop edx 0x0000003e push 00000003h 0x00000040 push 5AB8192Dh 0x00000045 jmp 00007FBA5938170Ch 0x0000004a add dword ptr [esp], 6547E6D3h 0x00000051 mov dx, si 0x00000054 lea ebx, dword ptr [ebp+124592D5h] 0x0000005a mov edx, dword ptr [ebp+122D2BDAh] 0x00000060 call 00007FBA5938170Dh 0x00000065 mov esi, dword ptr [ebp+122D2CC6h] 0x0000006b pop esi 0x0000006c xchg eax, ebx 0x0000006d push ecx 0x0000006e jnl 00007FBA5938170Ch 0x00000074 pop ecx 0x00000075 push eax 0x00000076 pushad 0x00000077 push ebx 0x00000078 push esi 0x00000079 pop esi 0x0000007a pop ebx 0x0000007b jc 00007FBA5938170Ch 0x00000081 push eax 0x00000082 push edx 0x00000083 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73E6E5 second address: 73E6F2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b push edi 0x0000000c pop edi 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73E6F2 second address: 73E6F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73E6F6 second address: 73E71E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 je 00007FBA592642A6h 0x0000000d pop eax 0x0000000e popad 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 jmp 00007FBA592642AAh 0x00000018 mov eax, dword ptr [eax] 0x0000001a push ecx 0x0000001b je 00007FBA592642ACh 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73E71E second address: 73E751 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 mov dword ptr [esp+04h], eax 0x00000009 js 00007FBA5938170Ch 0x0000000f pop eax 0x00000010 lea ebx, dword ptr [ebp+124592E0h] 0x00000016 jg 00007FBA5938170Ch 0x0000001c add dword ptr [ebp+122D316Ch], ebx 0x00000022 xchg eax, ebx 0x00000023 push eax 0x00000024 push edx 0x00000025 push ecx 0x00000026 jnc 00007FBA59381706h 0x0000002c pop ecx 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73E751 second address: 73E757 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 73E757 second address: 73E75B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 74FB14 second address: 74FB39 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FBA592642A8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FBA592642B4h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 74FB39 second address: 74FB3D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 74FB3D second address: 74FB43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 74FB43 second address: 74FB4D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007FBA59381706h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75F2BB second address: 75F2BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75F2BF second address: 75F2D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FBA5938170Bh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75F2D0 second address: 75F2F1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA592642ABh 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FBA592642B0h 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75F2F1 second address: 75F2F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75F2F5 second address: 75F301 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75F301 second address: 75F307 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75F307 second address: 75F315 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FBA592642A6h 0x0000000a popad 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75D27D second address: 75D285 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75D3C6 second address: 75D3CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75D3CA second address: 75D3CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75D3CE second address: 75D3DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FBA592642A6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d pushad 0x0000000e popad 0x0000000f pop ecx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75D3DE second address: 75D3E4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75D3E4 second address: 75D3EA instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75D3EA second address: 75D3F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75D3F4 second address: 75D405 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBA592642ADh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75D405 second address: 75D40F instructions: 0x00000000 rdtsc 0x00000002 jns 00007FBA59381706h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75D557 second address: 75D55D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75D55D second address: 75D56B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FBA59381706h 0x0000000a popad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75D56B second address: 75D59D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push edx 0x0000000d pop edx 0x0000000e push edi 0x0000000f pop edi 0x00000010 popad 0x00000011 popad 0x00000012 pushad 0x00000013 jne 00007FBA592642AAh 0x00000019 pushad 0x0000001a jno 00007FBA592642A6h 0x00000020 push eax 0x00000021 pop eax 0x00000022 ja 00007FBA592642A6h 0x00000028 pushad 0x00000029 popad 0x0000002a popad 0x0000002b push esi 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75D59D second address: 75D5A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75D708 second address: 75D737 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 popad 0x00000009 pop eax 0x0000000a jmp 00007FBA592642AEh 0x0000000f popad 0x00000010 jc 00007FBA592642C2h 0x00000016 jno 00007FBA592642A8h 0x0000001c push eax 0x0000001d push edx 0x0000001e jne 00007FBA592642A6h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75D737 second address: 75D73B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75D9D9 second address: 75D9DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75DCC7 second address: 75DCD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FBA59381706h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75DCD1 second address: 75DCD5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75DE2B second address: 75DE31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75DE31 second address: 75DE35 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75DE35 second address: 75DE3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75E0D8 second address: 75E0DD instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 753FBD second address: 753FD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 jmp 00007FBA59381713h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 728CBA second address: 728CC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 ja 00007FBA592642A6h 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75E4E0 second address: 75E4F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FBA59381706h 0x0000000a popad 0x0000000b jg 00007FBA5938170Ah 0x00000011 push eax 0x00000012 pop eax 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75EEDC second address: 75EEE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75EEE0 second address: 75EEE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 75EEE6 second address: 75EEEB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 71ED51 second address: 71ED57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 71ED57 second address: 71ED5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 71ED5B second address: 71ED75 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FBA59381706h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jp 00007FBA59381706h 0x00000014 jg 00007FBA59381706h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7646C0 second address: 7646C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7646C4 second address: 7646D2 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a push ecx 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 764997 second address: 76499D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76499D second address: 7649A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76C7C7 second address: 76C7CC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76BC5A second address: 76BC5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76BC5F second address: 76BC81 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FBA592642A8h 0x00000008 push edi 0x00000009 pushad 0x0000000a popad 0x0000000b jmp 00007FBA592642ACh 0x00000010 pop edi 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 push ebx 0x00000016 push eax 0x00000017 pop eax 0x00000018 pop ebx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76BC81 second address: 76BC87 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76BF2D second address: 76BF58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jbe 00007FBA592642BBh 0x0000000c push eax 0x0000000d push edx 0x0000000e jnc 00007FBA592642A6h 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76BF58 second address: 76BF65 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FBA59381706h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76C35E second address: 76C362 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76C362 second address: 76C368 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76C368 second address: 76C378 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a jns 00007FBA592642A6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76C378 second address: 76C39D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jnc 00007FBA59381706h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jnc 00007FBA59381706h 0x00000014 jmp 00007FBA59381711h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76C39D second address: 76C3A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76C3A1 second address: 76C3BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007FBA59381712h 0x0000000c popad 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 pop eax 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76C514 second address: 76C519 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76C519 second address: 76C51F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76C51F second address: 76C525 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76D851 second address: 76D857 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76D857 second address: 76D86A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push esi 0x0000000c jg 00007FBA592642A6h 0x00000012 pop esi 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76DBE2 second address: 76DBFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBA59381717h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76DBFD second address: 76DC10 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jno 00007FBA592642A8h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76DC10 second address: 76DC16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76DDBF second address: 76DDC4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76DDC4 second address: 76DDCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76E7F4 second address: 76E7FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007FBA592642A6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76E7FE second address: 76E802 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76E802 second address: 76E823 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FBA592642B5h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76E823 second address: 76E827 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76E8F4 second address: 76E8FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76E8FD second address: 76E901 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76E901 second address: 76E913 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jl 00007FBA592642C2h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76E913 second address: 76E917 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76EF4D second address: 76EF59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76EF59 second address: 76EF5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76EF5D second address: 76EF67 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FBA592642A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 76EF67 second address: 76EF6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 770A01 second address: 770A07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 770A07 second address: 770A3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FBA59381717h 0x0000000b jmp 00007FBA59381712h 0x00000010 popad 0x00000011 popad 0x00000012 push eax 0x00000013 push esi 0x00000014 push eax 0x00000015 push edx 0x00000016 push ebx 0x00000017 pop ebx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 770139 second address: 77013F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 77013F second address: 770143 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7714B0 second address: 7714BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBA592642AAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 773583 second address: 773587 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 773587 second address: 77358D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 77358D second address: 773592 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 771C65 second address: 771C6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 771C6C second address: 771C93 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA59381712h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007FBA5938170Ah 0x00000012 push ebx 0x00000013 pop ebx 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7740BC second address: 77414C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA592642AEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push eax 0x0000000d call 00007FBA592642A8h 0x00000012 pop eax 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 add dword ptr [esp+04h], 00000015h 0x0000001f inc eax 0x00000020 push eax 0x00000021 ret 0x00000022 pop eax 0x00000023 ret 0x00000024 mov dword ptr [ebp+124592DBh], esi 0x0000002a push 00000000h 0x0000002c pushad 0x0000002d mov si, 7FC5h 0x00000031 mov eax, dword ptr [ebp+122D2B5Ah] 0x00000037 popad 0x00000038 push 00000000h 0x0000003a push 00000000h 0x0000003c push esi 0x0000003d call 00007FBA592642A8h 0x00000042 pop esi 0x00000043 mov dword ptr [esp+04h], esi 0x00000047 add dword ptr [esp+04h], 00000016h 0x0000004f inc esi 0x00000050 push esi 0x00000051 ret 0x00000052 pop esi 0x00000053 ret 0x00000054 mov di, si 0x00000057 push eax 0x00000058 pushad 0x00000059 jmp 00007FBA592642B7h 0x0000005e push eax 0x0000005f push edx 0x00000060 jmp 00007FBA592642AEh 0x00000065 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 773E42 second address: 773E47 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 778592 second address: 77859C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 pushad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 77859C second address: 7785AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FBA59381706h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7785AB second address: 7785AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 77B53D second address: 77B542 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 77F4B8 second address: 77F4E3 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FBA592642A8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e jne 00007FBA592642BAh 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 77F4E3 second address: 77F4E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 780563 second address: 780567 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 780567 second address: 780571 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 78151D second address: 781522 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 781522 second address: 781580 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 and ebx, 7961DA85h 0x0000000f mov ebx, 6E5DC661h 0x00000014 push 00000000h 0x00000016 push 00000000h 0x00000018 push esi 0x00000019 call 00007FBA59381708h 0x0000001e pop esi 0x0000001f mov dword ptr [esp+04h], esi 0x00000023 add dword ptr [esp+04h], 0000001Bh 0x0000002b inc esi 0x0000002c push esi 0x0000002d ret 0x0000002e pop esi 0x0000002f ret 0x00000030 mov dword ptr [ebp+122D2CE9h], edi 0x00000036 push 00000000h 0x00000038 jno 00007FBA5938170Ch 0x0000003e push eax 0x0000003f push eax 0x00000040 push edx 0x00000041 push esi 0x00000042 jmp 00007FBA5938170Ch 0x00000047 pop esi 0x00000048 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 781580 second address: 781586 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 782650 second address: 782655 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 77872A second address: 77872E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 77872E second address: 778732 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 778732 second address: 778738 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 778738 second address: 77873E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 784719 second address: 7847AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 js 00007FBA592642A6h 0x0000000c jmp 00007FBA592642AEh 0x00000011 popad 0x00000012 popad 0x00000013 push eax 0x00000014 jmp 00007FBA592642AAh 0x00000019 nop 0x0000001a mov dword ptr [ebp+1246B74Eh], edi 0x00000020 push 00000000h 0x00000022 push 00000000h 0x00000024 push ecx 0x00000025 call 00007FBA592642A8h 0x0000002a pop ecx 0x0000002b mov dword ptr [esp+04h], ecx 0x0000002f add dword ptr [esp+04h], 00000015h 0x00000037 inc ecx 0x00000038 push ecx 0x00000039 ret 0x0000003a pop ecx 0x0000003b ret 0x0000003c mov dword ptr [ebp+1245DD1Eh], edi 0x00000042 push 00000000h 0x00000044 push 00000000h 0x00000046 push esi 0x00000047 call 00007FBA592642A8h 0x0000004c pop esi 0x0000004d mov dword ptr [esp+04h], esi 0x00000051 add dword ptr [esp+04h], 00000016h 0x00000059 inc esi 0x0000005a push esi 0x0000005b ret 0x0000005c pop esi 0x0000005d ret 0x0000005e mov dword ptr [ebp+12457482h], esi 0x00000064 push eax 0x00000065 pushad 0x00000066 jmp 00007FBA592642B5h 0x0000006b pushad 0x0000006c pushad 0x0000006d popad 0x0000006e push eax 0x0000006f push edx 0x00000070 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7797EC second address: 7797F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 77A734 second address: 77A74A instructions: 0x00000000 rdtsc 0x00000002 jg 00007FBA592642A8h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jp 00007FBA592642A6h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 786802 second address: 786808 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 786808 second address: 78681F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jns 00007FBA592642A6h 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jbe 00007FBA592642ACh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 78681F second address: 786823 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 77A74A second address: 77A7C5 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push edx 0x0000000b call 00007FBA592642A8h 0x00000010 pop edx 0x00000011 mov dword ptr [esp+04h], edx 0x00000015 add dword ptr [esp+04h], 00000015h 0x0000001d inc edx 0x0000001e push edx 0x0000001f ret 0x00000020 pop edx 0x00000021 ret 0x00000022 push dword ptr fs:[00000000h] 0x00000029 mov ebx, dword ptr [ebp+12467781h] 0x0000002f mov dword ptr fs:[00000000h], esp 0x00000036 xor di, 1BF5h 0x0000003b mov di, 3581h 0x0000003f mov eax, dword ptr [ebp+122D1259h] 0x00000045 call 00007FBA592642ADh 0x0000004a jnp 00007FBA592642A9h 0x00000050 sub bh, 00000005h 0x00000053 pop edi 0x00000054 mov edi, 26D9371Dh 0x00000059 push FFFFFFFFh 0x0000005b sub dword ptr [ebp+1246082Eh], eax 0x00000061 push eax 0x00000062 push eax 0x00000063 push edx 0x00000064 jl 00007FBA592642ACh 0x0000006a jc 00007FBA592642A6h 0x00000070 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 786823 second address: 786861 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b mov edi, dword ptr [ebp+122D27E4h] 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push esi 0x00000016 call 00007FBA59381708h 0x0000001b pop esi 0x0000001c mov dword ptr [esp+04h], esi 0x00000020 add dword ptr [esp+04h], 00000015h 0x00000028 inc esi 0x00000029 push esi 0x0000002a ret 0x0000002b pop esi 0x0000002c ret 0x0000002d mov bx, 8344h 0x00000031 movzx edi, ax 0x00000034 push eax 0x00000035 push eax 0x00000036 push edx 0x00000037 push edi 0x00000038 push edx 0x00000039 pop edx 0x0000003a pop edi 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7797F0 second address: 7797FA instructions: 0x00000000 rdtsc 0x00000002 jne 00007FBA592642A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 786861 second address: 786866 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7797FA second address: 779800 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 779800 second address: 77989B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FBA59381718h 0x0000000e nop 0x0000000f push 00000000h 0x00000011 push edx 0x00000012 call 00007FBA59381708h 0x00000017 pop edx 0x00000018 mov dword ptr [esp+04h], edx 0x0000001c add dword ptr [esp+04h], 0000001Bh 0x00000024 inc edx 0x00000025 push edx 0x00000026 ret 0x00000027 pop edx 0x00000028 ret 0x00000029 push dword ptr fs:[00000000h] 0x00000030 push 00000000h 0x00000032 push edx 0x00000033 call 00007FBA59381708h 0x00000038 pop edx 0x00000039 mov dword ptr [esp+04h], edx 0x0000003d add dword ptr [esp+04h], 0000001Ch 0x00000045 inc edx 0x00000046 push edx 0x00000047 ret 0x00000048 pop edx 0x00000049 ret 0x0000004a xor dword ptr [ebp+122D3904h], edx 0x00000050 mov dword ptr fs:[00000000h], esp 0x00000057 mov edi, dword ptr [ebp+122D1D96h] 0x0000005d mov eax, dword ptr [ebp+122D0699h] 0x00000063 push FFFFFFFFh 0x00000065 add edi, dword ptr [ebp+122D3047h] 0x0000006b nop 0x0000006c jbe 00007FBA59381710h 0x00000072 pushad 0x00000073 push eax 0x00000074 push edx 0x00000075 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 77D761 second address: 77D77D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FBA592642ABh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 push edi 0x00000012 pop edi 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 77F68D second address: 77F691 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 77F691 second address: 77F697 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 780815 second address: 78081B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 78393F second address: 783944 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 783944 second address: 783949 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7848DD second address: 784935 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 pop eax 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b push ecx 0x0000000c or ebx, 56876B10h 0x00000012 pop edi 0x00000013 sub dword ptr [ebp+122D31ADh], esi 0x00000019 push dword ptr fs:[00000000h] 0x00000020 mov bh, B1h 0x00000022 xor dword ptr [ebp+12457722h], ebx 0x00000028 mov dword ptr fs:[00000000h], esp 0x0000002f mov ebx, dword ptr [ebp+122D3A9Bh] 0x00000035 mov eax, dword ptr [ebp+122D16C5h] 0x0000003b movzx edi, si 0x0000003e push FFFFFFFFh 0x00000040 xor ebx, dword ptr [ebp+122D2D24h] 0x00000046 nop 0x00000047 pushad 0x00000048 jne 00007FBA592642ACh 0x0000004e push eax 0x0000004f push edx 0x00000050 push eax 0x00000051 push edx 0x00000052 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 784935 second address: 784939 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 784939 second address: 784954 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FBA592642A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FBA592642ACh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7858EC second address: 785908 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FBA59381706h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FBA59381710h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 77B751 second address: 77B755 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 786A49 second address: 786A53 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007FBA59381706h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 786A53 second address: 786A61 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 786A61 second address: 786A65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7879C1 second address: 7879C6 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7879C6 second address: 7879E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FBA59381716h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7879E6 second address: 7879EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7879EC second address: 7879F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7921BC second address: 7921C3 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 72F6D3 second address: 72F6E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA5938170Fh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 72F6E8 second address: 72F6EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 72F6EE second address: 72F6F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 72F6F2 second address: 72F6F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 72F6F6 second address: 72F6FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 72F6FC second address: 72F705 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 791D33 second address: 791D46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBA5938170Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 798E92 second address: 798EAA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBA592642AEh 0x00000009 popad 0x0000000a pushad 0x0000000b push esi 0x0000000c pop esi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 79F152 second address: 79F16C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 jnc 00007FBA59381706h 0x0000000c pop edx 0x0000000d pop edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 ja 00007FBA59381706h 0x00000019 pop edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 79DE41 second address: 79DE45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 79DE45 second address: 79DE59 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA5938170Fh 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 79E41E second address: 79E43A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA592642B4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 79E43A second address: 79E43E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 79EB11 second address: 79EB2A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA592642B5h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 79EB2A second address: 79EB30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 79EDFF second address: 79EE1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jmp 00007FBA592642B8h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 79EE1E second address: 79EE48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBA59381716h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FBA5938170Bh 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 79EE48 second address: 79EE60 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA592642B4h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 79EFC6 second address: 79EFCA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 79EFCA second address: 79EFD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 71D283 second address: 71D2B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA59381712h 0x00000007 jmp 00007FBA5938170Eh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop eax 0x0000000f push ebx 0x00000010 jo 00007FBA59381708h 0x00000016 push eax 0x00000017 pop eax 0x00000018 push eax 0x00000019 push edx 0x0000001a jno 00007FBA59381706h 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 71D2B9 second address: 71D2BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 71D2BD second address: 71D2C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7766C1 second address: 7766FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 nop 0x00000006 push 00000000h 0x00000008 push edi 0x00000009 call 00007FBA592642A8h 0x0000000e pop edi 0x0000000f mov dword ptr [esp+04h], edi 0x00000013 add dword ptr [esp+04h], 00000015h 0x0000001b inc edi 0x0000001c push edi 0x0000001d ret 0x0000001e pop edi 0x0000001f ret 0x00000020 add dword ptr [ebp+1245DD1Eh], ecx 0x00000026 sub dword ptr [ebp+122D26ECh], eax 0x0000002c lea eax, dword ptr [ebp+12491393h] 0x00000032 nop 0x00000033 push eax 0x00000034 pushad 0x00000035 push eax 0x00000036 push edx 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7766FB second address: 753FBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FBA5938170Dh 0x0000000e nop 0x0000000f push 00000000h 0x00000011 push ecx 0x00000012 call 00007FBA59381708h 0x00000017 pop ecx 0x00000018 mov dword ptr [esp+04h], ecx 0x0000001c add dword ptr [esp+04h], 0000001Bh 0x00000024 inc ecx 0x00000025 push ecx 0x00000026 ret 0x00000027 pop ecx 0x00000028 ret 0x00000029 jnp 00007FBA5938170Ch 0x0000002f mov edx, dword ptr [ebp+122D29DAh] 0x00000035 jnl 00007FBA5938170Ch 0x0000003b call dword ptr [ebp+122D17E2h] 0x00000041 pushad 0x00000042 pushad 0x00000043 jnl 00007FBA59381706h 0x00000049 pushad 0x0000004a popad 0x0000004b pushad 0x0000004c popad 0x0000004d popad 0x0000004e jp 00007FBA5938170Ch 0x00000054 jc 00007FBA5938170Ch 0x0000005a push eax 0x0000005b push edx 0x0000005c rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 77689B second address: 77689F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 776AD9 second address: 776AE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FBA59381706h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 776C42 second address: 776CA5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA592642ADh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jmp 00007FBA592642ABh 0x0000000f jc 00007FBA592642A6h 0x00000015 popad 0x00000016 popad 0x00000017 add dword ptr [esp], 6EF0B3CDh 0x0000001e push 00000000h 0x00000020 push esi 0x00000021 call 00007FBA592642A8h 0x00000026 pop esi 0x00000027 mov dword ptr [esp+04h], esi 0x0000002b add dword ptr [esp+04h], 0000001Dh 0x00000033 inc esi 0x00000034 push esi 0x00000035 ret 0x00000036 pop esi 0x00000037 ret 0x00000038 push 1A7893C9h 0x0000003d pushad 0x0000003e push eax 0x0000003f jp 00007FBA592642A6h 0x00000045 pop eax 0x00000046 push eax 0x00000047 push edx 0x00000048 pushad 0x00000049 popad 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 776CA5 second address: 776CA9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 77704C second address: 777051 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7777DE second address: 7777E2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7A58AE second address: 7A58CA instructions: 0x00000000 rdtsc 0x00000002 je 00007FBA592642A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnl 00007FBA592642B2h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7A58CA second address: 7A58FF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA59381715h 0x00000007 jmp 00007FBA59381712h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push edi 0x0000000f pushad 0x00000010 jc 00007FBA59381706h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7A5CD6 second address: 7A5D0C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push esi 0x00000008 jmp 00007FBA592642B9h 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FBA592642B3h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7A5FBD second address: 7A5FD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FBA59381706h 0x0000000a jmp 00007FBA5938170Bh 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7A5FD7 second address: 7A5FE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FBA592642A6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7A5FE1 second address: 7A5FE7 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7A625F second address: 7A6278 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBA592642B3h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7A6278 second address: 7A6283 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7A6283 second address: 7A6287 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7AAD9F second address: 7AADCA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jne 00007FBA59381706h 0x00000009 pop edi 0x0000000a jnc 00007FBA5938170Eh 0x00000010 push eax 0x00000011 pop eax 0x00000012 jnc 00007FBA59381706h 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007FBA5938170Fh 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7AADCA second address: 7AADD2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push esi 0x00000007 pop esi 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7AB07C second address: 7AB095 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jc 00007FBA59381706h 0x00000009 ja 00007FBA59381706h 0x0000000f pop ecx 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7AB095 second address: 7AB099 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7AB1CF second address: 7AB1D5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7AB1D5 second address: 7AB1DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7AB1DB second address: 7AB1F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA59381717h 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7AB1F7 second address: 7AB1FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7AB32A second address: 7AB330 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7AB330 second address: 7AB340 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBA592642ACh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7AB340 second address: 7AB3A7 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jmp 00007FBA59381711h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e push ebx 0x0000000f pushad 0x00000010 popad 0x00000011 jo 00007FBA59381706h 0x00000017 pop ebx 0x00000018 pushad 0x00000019 jmp 00007FBA59381712h 0x0000001e jp 00007FBA59381706h 0x00000024 push eax 0x00000025 pop eax 0x00000026 popad 0x00000027 pushad 0x00000028 js 00007FBA59381706h 0x0000002e jg 00007FBA59381706h 0x00000034 jmp 00007FBA59381718h 0x00000039 push eax 0x0000003a push edx 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7AB3A7 second address: 7AB3AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7AB3AF second address: 7AB3B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7ABA80 second address: 7ABA88 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7ABCD8 second address: 7ABCED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jmp 00007FBA5938170Eh 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7ABCED second address: 7ABD0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jmp 00007FBA592642ABh 0x0000000b popad 0x0000000c jng 00007FBA592642B0h 0x00000012 push edi 0x00000013 push edx 0x00000014 pop edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7B1E48 second address: 7B1E52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FBA59381706h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 72DB98 second address: 72DB9E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 72DB9E second address: 72DBB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FBA5938170Ah 0x0000000f jnc 00007FBA59381706h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 72DBB8 second address: 72DBDE instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FBA592642A6h 0x00000008 jmp 00007FBA592642B9h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 72DBDE second address: 72DC10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FBA59381706h 0x0000000a jmp 00007FBA5938170Fh 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 pushad 0x00000013 jmp 00007FBA59381713h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7B834A second address: 7B836E instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007FBA592642B2h 0x00000008 jc 00007FBA592642A6h 0x0000000e pop edi 0x0000000f jnc 00007FBA592642B2h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7B836E second address: 7B8374 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7B71EC second address: 7B71F0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7B7DB0 second address: 7B7DB6 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7B7DB6 second address: 7B7DBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7B8089 second address: 7B808F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7B808F second address: 7B8096 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7B8096 second address: 7B809C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7B809C second address: 7B80A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7BD8F1 second address: 7BD8F9 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7BD1A5 second address: 7BD1AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FBA592642A6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7BD626 second address: 7BD62A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C1743 second address: 7C1747 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C1747 second address: 7C174C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C174C second address: 7C1752 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C0E74 second address: 7C0E78 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C0E78 second address: 7C0E8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 pushad 0x00000008 popad 0x00000009 jno 00007FBA592642A6h 0x0000000f pop ecx 0x00000010 popad 0x00000011 push ecx 0x00000012 pushad 0x00000013 push edx 0x00000014 pop edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C0E8F second address: 7C0EA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FBA5938170Ah 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jnc 00007FBA59381706h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C0EA8 second address: 7C0EAC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C1104 second address: 7C110A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C110A second address: 7C110E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C110E second address: 7C1120 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007FBA5938170Ch 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C5899 second address: 7C58BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBA592642AAh 0x00000009 popad 0x0000000a jmp 00007FBA592642B3h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C4E3D second address: 7C4E42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C4E42 second address: 7C4E63 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA592642B1h 0x00000007 push ebx 0x00000008 jnc 00007FBA592642A6h 0x0000000e pop ebx 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push edx 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C4FCE second address: 7C4FDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C4FDB second address: 7C4FEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FBA592642A6h 0x0000000a popad 0x0000000b push ebx 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C4FEB second address: 7C4FF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C4FF0 second address: 7C501E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA592642AAh 0x00000007 pushad 0x00000008 jmp 00007FBA592642B7h 0x0000000d pushad 0x0000000e popad 0x0000000f ja 00007FBA592642A6h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C51B3 second address: 7C51BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C51BE second address: 7C51C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C51C2 second address: 7C51C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7C5478 second address: 7C547C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7CA7A9 second address: 7CA7AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7CAAA8 second address: 7CAABD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jmp 00007FBA592642B0h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7CAABD second address: 7CAACE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 js 00007FBA59381706h 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7CAACE second address: 7CAAD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7CAAD4 second address: 7CAAD9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7CAAD9 second address: 7CAADF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7CAD6E second address: 7CAD8F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA59381719h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7CAD8F second address: 7CAD93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7CAEF3 second address: 7CAF0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 push eax 0x00000007 pop eax 0x00000008 jne 00007FBA59381706h 0x0000000e pop edi 0x0000000f push eax 0x00000010 push edx 0x00000011 jo 00007FBA59381706h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7771F8 second address: 7771FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7771FE second address: 777257 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push ebp 0x0000000c call 00007FBA59381708h 0x00000011 pop ebp 0x00000012 mov dword ptr [esp+04h], ebp 0x00000016 add dword ptr [esp+04h], 00000016h 0x0000001e inc ebp 0x0000001f push ebp 0x00000020 ret 0x00000021 pop ebp 0x00000022 ret 0x00000023 add dword ptr [ebp+122D1CB4h], eax 0x00000029 mov edi, edx 0x0000002b mov ebx, dword ptr [ebp+124913D2h] 0x00000031 jp 00007FBA59381712h 0x00000037 add eax, ebx 0x00000039 sub dword ptr [ebp+122D316Ch], esi 0x0000003f nop 0x00000040 pushad 0x00000041 push eax 0x00000042 push edx 0x00000043 jl 00007FBA59381706h 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 777257 second address: 77727B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA592642B8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jng 00007FBA592642ACh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7CB034 second address: 7CB038 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7CB038 second address: 7CB03C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7CB03C second address: 7CB067 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebx 0x00000009 jc 00007FBA59381726h 0x0000000f push edi 0x00000010 pushad 0x00000011 popad 0x00000012 pop edi 0x00000013 jo 00007FBA5938171Ch 0x00000019 jmp 00007FBA59381710h 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7D417E second address: 7D4182 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7D4182 second address: 7D418A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7D418A second address: 7D419E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBA592642AAh 0x00000009 jl 00007FBA592642A6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7D278F second address: 7D27A9 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FBA5938170Ch 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7D27A9 second address: 7D27AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7D27AD second address: 7D27B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7D27B1 second address: 7D27BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FBA592642A6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7D3610 second address: 7D3621 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBA5938170Bh 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7D3621 second address: 7D3625 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7D8208 second address: 7D820D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7D820D second address: 7D8218 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7D8218 second address: 7D8247 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBA59381713h 0x00000009 jmp 00007FBA59381716h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7D739A second address: 7D73C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 je 00007FBA592642AAh 0x0000000f push edx 0x00000010 pop edx 0x00000011 pushad 0x00000012 popad 0x00000013 pushad 0x00000014 jmp 00007FBA592642B7h 0x00000019 pushad 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7D73C9 second address: 7D73D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7D73D2 second address: 7D73D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7D73D8 second address: 7D73DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7D77D9 second address: 7D77FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 jmp 00007FBA592642B2h 0x0000000d popad 0x0000000e push ecx 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 pop ecx 0x00000012 pop esi 0x00000013 push eax 0x00000014 pushad 0x00000015 push ebx 0x00000016 pop ebx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7DCD3D second address: 7DCD43 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7DCD43 second address: 7DCD47 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7DCD47 second address: 7DCD53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7DCD53 second address: 7DCD57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7E330D second address: 7E331A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jne 00007FBA59381706h 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7E3451 second address: 7E3458 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7E384D second address: 7E3855 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7E3855 second address: 7E385E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7E3993 second address: 7E3997 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7EE8CA second address: 7EE8CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7EE73E second address: 7EE74E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FBA59381706h 0x0000000a jl 00007FBA59381706h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7EE74E second address: 7EE752 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7EE752 second address: 7EE758 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7EE758 second address: 7EE77F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007FBA592642C5h 0x0000000c jmp 00007FBA592642B9h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7FC147 second address: 7FC157 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FBA59381706h 0x00000008 jnl 00007FBA59381706h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7FC157 second address: 7FC1A2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FBA592642B1h 0x0000000a push eax 0x0000000b pop eax 0x0000000c jmp 00007FBA592642AEh 0x00000011 popad 0x00000012 push eax 0x00000013 pushad 0x00000014 popad 0x00000015 pop eax 0x00000016 pop edx 0x00000017 pop eax 0x00000018 pushad 0x00000019 jnc 00007FBA592642B2h 0x0000001f pushad 0x00000020 push edx 0x00000021 pop edx 0x00000022 jng 00007FBA592642A6h 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7FBCEC second address: 7FBD00 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b jg 00007FBA59381706h 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 7FFEF2 second address: 7FFEF7 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 80E3AE second address: 80E3B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 80E3B3 second address: 80E3C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBA592642ABh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 80E3C4 second address: 80E3C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 80E3C8 second address: 80E3D5 instructions: 0x00000000 rdtsc 0x00000002 je 00007FBA592642A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 80E3D5 second address: 80E3F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBA59381712h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 80E3F3 second address: 80E3F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 80E3F9 second address: 80E417 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 jmp 00007FBA5938170Fh 0x0000000b popad 0x0000000c pushad 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 732B5D second address: 732B84 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FBA592642B8h 0x0000000b push esi 0x0000000c push esi 0x0000000d pop esi 0x0000000e pop esi 0x0000000f popad 0x00000010 push edx 0x00000011 push ecx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 732B84 second address: 732B8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 732B8A second address: 732B97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jg 00007FBA592642A6h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 8167A6 second address: 8167AC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 8167AC second address: 8167C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FBA592642ABh 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 816E3A second address: 816E42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 816E42 second address: 816E48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 816FCA second address: 816FE4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FBA59381715h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 816FE4 second address: 817005 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBA592642B4h 0x00000009 popad 0x0000000a jnp 00007FBA592642B2h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 817144 second address: 817157 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 pop edi 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d jc 00007FBA59381706h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 817BA6 second address: 817BAA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 81D5FE second address: 81D602 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 81D602 second address: 81D628 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FBA592642A6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jbe 00007FBA592642BAh 0x00000012 jmp 00007FBA592642B4h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 82C1B8 second address: 82C1BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 82C1BC second address: 82C1C2 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 82C1C2 second address: 82C1DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007FBA59381717h 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007FBA5938170Fh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 8381CA second address: 8381CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 838005 second address: 838019 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jp 00007FBA5938170Ah 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 838019 second address: 83803B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBA592642ADh 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e je 00007FBA592642A6h 0x00000014 ja 00007FBA592642A6h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 850291 second address: 8502A0 instructions: 0x00000000 rdtsc 0x00000002 je 00007FBA59381706h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push esi 0x0000000c pop esi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 84F0F1 second address: 84F0F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 84F0F5 second address: 84F105 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FBA59381706h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 84F105 second address: 84F10B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 84F10B second address: 84F119 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBA5938170Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 84F2EB second address: 84F2F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 84F960 second address: 84F96B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 84F96B second address: 84F989 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FBA592642A6h 0x00000008 jmp 00007FBA592642ADh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 84F989 second address: 84F9A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 ja 00007FBA59381708h 0x0000000d push eax 0x0000000e jmp 00007FBA5938170Ch 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 84F9A7 second address: 84F9B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jo 00007FBA592642ACh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 84FAFF second address: 84FB04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 84FB04 second address: 84FB10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 jl 00007FBA592642A6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 84FB10 second address: 84FB42 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jnl 00007FBA59381706h 0x0000000d push esi 0x0000000e pop esi 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FBA59381716h 0x00000019 jl 00007FBA59381712h 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 84FB42 second address: 84FB4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FBA592642A6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 84FB4C second address: 84FB51 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 84FCE4 second address: 84FCE8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 84FE3E second address: 84FE54 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBA59381712h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 854221 second address: 854225 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 854225 second address: 854237 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jo 00007FBA59381714h 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 85474B second address: 854755 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007FBA592642A6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 8560E9 second address: 856110 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBA5938170Dh 0x00000009 popad 0x0000000a jmp 00007FBA59381715h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 855CB2 second address: 855CB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 855CB8 second address: 855CBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 857BEA second address: 857BF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ecx 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 857BF5 second address: 857BF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\oQSTpQfzz5.exe | RDTSC instruction interceptor: First address: 857BF9 second address: 857BFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |