Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196774329.00000000012DD000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2237814084.00000000012D5000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2197539344.00000000012D5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2237814084.00000000012D5000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2197539344.00000000012D5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://broadcast.st.dl.eccdnx.com |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2197539344.00000000012D5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/fatalerror.css?v=OFUqlcDNiD6y&l=engli |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2237814084.00000000012D5000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2197539344.00000000012D5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2237814084.00000000012D5000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2197539344.00000000012D5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2237814084.00000000012D5000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2197539344.00000000012D5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2237814084.00000000012D5000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2197539344.00000000012D5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=FRRi |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196774329.00000000012FC000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2237884835.00000000012FC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://curverpluch.lat:443/api0 |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://player.vimeo.com |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2237814084.00000000012D5000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2197539344.00000000012D5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237814084.00000000012D5000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2197539344.00000000012D5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/1 |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2237814084.00000000012D5000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2197539344.00000000012D5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/p |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237814084.00000000012D5000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2197539344.00000000012D5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900 |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237814084.00000000012D5000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2197539344.00000000012D5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196774329.00000000012DD000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2237884835.00000000012DE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900s |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196774329.00000000012FC000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2237884835.00000000012FC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com:443/profiles/76561199724331900P |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197374319.0000000001313000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001312000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2197599051.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/; |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197374319.0000000001313000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001312000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2197599051.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2237814084.00000000012D5000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2197539344.00000000012D5000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop0 |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196774329.00000000012FC000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2237884835.00000000012FC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://tentabatte.lat:443/api( |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: RUUSfr6dVm.exe, 00000000.00000003.2196774329.00000000012DD000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2197489482.0000000001364000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196738507.000000000135A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: RUUSfr6dVm.exe, 00000000.00000002.2237995364.0000000001315000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000002.2238016083.0000000001329000.00000004.00000020.00020000.00000000.sdmp, RUUSfr6dVm.exe, 00000000.00000003.2196774329.0000000001329000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A5B100 | 0_2_00A5B100 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A58600 | 0_2_00A58600 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B010B3 | 0_2_00B010B3 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B1D0B9 | 0_2_00B1D0B9 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AD40BD | 0_2_00AD40BD |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC30B8 | 0_2_00AC30B8 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B720AF | 0_2_00B720AF |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE108F | 0_2_00AE108F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B60095 | 0_2_00B60095 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B0309E | 0_2_00B0309E |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE6081 | 0_2_00AE6081 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B04084 | 0_2_00B04084 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A7C09E | 0_2_00A7C09E |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5808B | 0_2_00B5808B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A7C0E6 | 0_2_00A7C0E6 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B550F4 | 0_2_00B550F4 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B4A0F6 | 0_2_00B4A0F6 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A660E9 | 0_2_00A660E9 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B7C0EF | 0_2_00B7C0EF |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ADB0F2 | 0_2_00ADB0F2 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC10CA | 0_2_00AC10CA |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B1B0DB | 0_2_00B1B0DB |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A7A0CA | 0_2_00A7A0CA |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF70DF | 0_2_00AF70DF |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A5D021 | 0_2_00A5D021 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B2403A | 0_2_00B2403A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B1E025 | 0_2_00B1E025 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B50021 | 0_2_00B50021 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A6D003 | 0_2_00A6D003 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AD801B | 0_2_00AD801B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B74009 | 0_2_00B74009 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AFD06E | 0_2_00AFD06E |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B2C077 | 0_2_00B2C077 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00C1500C | 0_2_00C1500C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE9063 | 0_2_00AE9063 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B4907A | 0_2_00B4907A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5E07A | 0_2_00B5E07A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B47066 | 0_2_00B47066 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE0070 | 0_2_00AE0070 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5B06B | 0_2_00B5B06B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AFA04C | 0_2_00AFA04C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B6305F | 0_2_00B6305F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE7043 | 0_2_00AE7043 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B10040 | 0_2_00B10040 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B7B041 | 0_2_00B7B041 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ABE05C | 0_2_00ABE05C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A791AE | 0_2_00A791AE |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B391BC | 0_2_00B391BC |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5F1BA | 0_2_00B5F1BA |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B131A1 | 0_2_00B131A1 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00C0F1D3 | 0_2_00C0F1D3 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB31B2 | 0_2_00AB31B2 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB118B | 0_2_00AB118B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AD918C | 0_2_00AD918C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A8F18B | 0_2_00A8F18B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A7E180 | 0_2_00A7E180 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3A182 | 0_2_00B3A182 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ABE1E2 | 0_2_00ABE1E2 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5C1F8 | 0_2_00B5C1F8 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B281E0 | 0_2_00B281E0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5B1D1 | 0_2_00B5B1D1 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B051D6 | 0_2_00B051D6 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A781CC | 0_2_00A781CC |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B121DD | 0_2_00B121DD |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B561C6 | 0_2_00B561C6 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B251C6 | 0_2_00B251C6 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AEE12D | 0_2_00AEE12D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B6D138 | 0_2_00B6D138 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3212F | 0_2_00B3212F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B36110 | 0_2_00B36110 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE210B | 0_2_00AE210B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ADE11D | 0_2_00ADE11D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B7710F | 0_2_00B7710F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AFA110 | 0_2_00AFA110 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A56160 | 0_2_00A56160 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A68169 | 0_2_00A68169 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AD617B | 0_2_00AD617B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B78160 | 0_2_00B78160 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B1A16A | 0_2_00B1A16A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3815F | 0_2_00B3815F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AD115D | 0_2_00AD115D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B7614F | 0_2_00B7614F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A7C09E | 0_2_00A7C09E |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB9152 | 0_2_00AB9152 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B0C14F | 0_2_00B0C14F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC02A7 | 0_2_00AC02A7 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B672A0 | 0_2_00B672A0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ADD2B3 | 0_2_00ADD2B3 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB82B4 | 0_2_00AB82B4 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A89280 | 0_2_00A89280 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3328A | 0_2_00B3328A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B172F1 | 0_2_00B172F1 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF92E9 | 0_2_00AF92E9 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B442FF | 0_2_00B442FF |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE32E0 | 0_2_00AE32E0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5A2E6 | 0_2_00B5A2E6 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B532D6 | 0_2_00B532D6 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B302D5 | 0_2_00B302D5 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B002C6 | 0_2_00B002C6 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A742D0 | 0_2_00A742D0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3E2C8 | 0_2_00B3E2C8 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A61227 | 0_2_00A61227 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A6E220 | 0_2_00A6E220 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B48239 | 0_2_00B48239 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B34224 | 0_2_00B34224 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B4322F | 0_2_00B4322F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B4620F | 0_2_00B4620F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B4120B | 0_2_00B4120B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B1F27B | 0_2_00B1F27B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B2B27E | 0_2_00B2B27E |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A54270 | 0_2_00A54270 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B6E26D | 0_2_00B6E26D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AFB24D | 0_2_00AFB24D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B35250 | 0_2_00B35250 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B0625E | 0_2_00B0625E |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B45244 | 0_2_00B45244 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B18247 | 0_2_00B18247 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B62248 | 0_2_00B62248 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE23AD | 0_2_00AE23AD |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB63BB | 0_2_00AB63BB |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC73B8 | 0_2_00AC73B8 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B523AB | 0_2_00B523AB |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B27381 | 0_2_00B27381 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B40382 | 0_2_00B40382 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF43E3 | 0_2_00AF43E3 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B293FD | 0_2_00B293FD |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3B3D0 | 0_2_00B3B3D0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A5F3C0 | 0_2_00A5F3C0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF33C9 | 0_2_00AF33C9 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B753D1 | 0_2_00B753D1 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B2D3C2 | 0_2_00B2D3C2 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A573D0 | 0_2_00A573D0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B113CB | 0_2_00B113CB |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF03D4 | 0_2_00AF03D4 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A783D8 | 0_2_00A783D8 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ABF32A | 0_2_00ABF32A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B69331 | 0_2_00B69331 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B7B338 | 0_2_00B7B338 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00BB032B | 0_2_00BB032B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ABB33C | 0_2_00ABB33C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ACC308 | 0_2_00ACC308 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC8304 | 0_2_00AC8304 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AEF304 | 0_2_00AEF304 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B21301 | 0_2_00B21301 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A59310 | 0_2_00A59310 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ABC311 | 0_2_00ABC311 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B6430C | 0_2_00B6430C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF1367 | 0_2_00AF1367 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AEB360 | 0_2_00AEB360 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ACA363 | 0_2_00ACA363 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A7F377 | 0_2_00A7F377 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC4374 | 0_2_00AC4374 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A71340 | 0_2_00A71340 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B1B35B | 0_2_00B1B35B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A7D34A | 0_2_00A7D34A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AD8356 | 0_2_00AD8356 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B0934C | 0_2_00B0934C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B2C4B0 | 0_2_00B2C4B0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B104B4 | 0_2_00B104B4 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B474B2 | 0_2_00B474B2 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ACF4AB | 0_2_00ACF4AB |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B374BB | 0_2_00B374BB |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ACD4A1 | 0_2_00ACD4A1 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3C4A0 | 0_2_00B3C4A0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B314AB | 0_2_00B314AB |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE948A | 0_2_00AE948A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AD1486 | 0_2_00AD1486 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3949D | 0_2_00B3949D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B6A487 | 0_2_00B6A487 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC9499 | 0_2_00AC9499 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ADA491 | 0_2_00ADA491 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B1C48D | 0_2_00B1C48D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A724E0 | 0_2_00A724E0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B7B4FB | 0_2_00B7B4FB |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B044E2 | 0_2_00B044E2 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A5D4F3 | 0_2_00A5D4F3 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B144E9 | 0_2_00B144E9 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A704C6 | 0_2_00A704C6 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B504D1 | 0_2_00B504D1 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B194D7 | 0_2_00B194D7 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B49434 | 0_2_00B49434 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE5406 | 0_2_00AE5406 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3541D | 0_2_00B3541D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF6415 | 0_2_00AF6415 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B1D40C | 0_2_00B1D40C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB4415 | 0_2_00AB4415 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A90460 | 0_2_00A90460 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B7A46D | 0_2_00B7A46D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A6747D | 0_2_00A6747D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B68457 | 0_2_00B68457 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B2F451 | 0_2_00B2F451 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A77440 | 0_2_00A77440 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A8A440 | 0_2_00A8A440 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B6C45E | 0_2_00B6C45E |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B66458 | 0_2_00B66458 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5D45A | 0_2_00B5D45A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE045D | 0_2_00AE045D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ACE455 | 0_2_00ACE455 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B2B44D | 0_2_00B2B44D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B725B4 | 0_2_00B725B4 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A8C5A0 | 0_2_00A8C5A0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B085BD | 0_2_00B085BD |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5F5AC | 0_2_00B5F5AC |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B79597 | 0_2_00B79597 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC159A | 0_2_00AC159A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B71581 | 0_2_00B71581 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B32588 | 0_2_00B32588 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B6158A | 0_2_00B6158A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B135F0 | 0_2_00B135F0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B735F2 | 0_2_00B735F2 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ADC5E3 | 0_2_00ADC5E3 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ADE5FD | 0_2_00ADE5FD |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A565F0 | 0_2_00A565F0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ACE5F3 | 0_2_00ACE5F3 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B155EE | 0_2_00B155EE |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ABE5CB | 0_2_00ABE5CB |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF55CC | 0_2_00AF55CC |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B565D1 | 0_2_00B565D1 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B185DD | 0_2_00B185DD |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B745DA | 0_2_00B745DA |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AEA5C1 | 0_2_00AEA5C1 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B055C7 | 0_2_00B055C7 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A8A5D4 | 0_2_00A8A5D4 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC05D2 | 0_2_00AC05D2 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC552A | 0_2_00AC552A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B2653A | 0_2_00B2653A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B7653D | 0_2_00B7653D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AFB524 | 0_2_00AFB524 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5B521 | 0_2_00B5B521 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A7C53C | 0_2_00A7C53C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B6752B | 0_2_00B6752B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AFD50A | 0_2_00AFD50A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B70511 | 0_2_00B70511 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B22508 | 0_2_00B22508 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AD256C | 0_2_00AD256C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B42575 | 0_2_00B42575 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A74560 | 0_2_00A74560 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ABD562 | 0_2_00ABD562 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AD0563 | 0_2_00AD0563 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B59562 | 0_2_00B59562 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3F568 | 0_2_00B3F568 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B0755F | 0_2_00B0755F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B0254C | 0_2_00B0254C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF8551 | 0_2_00AF8551 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B0E54F | 0_2_00B0E54F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B536B6 | 0_2_00B536B6 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B766BD | 0_2_00B766BD |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B336AA | 0_2_00B336AA |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB168A | 0_2_00AB168A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A5E687 | 0_2_00A5E687 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B6F686 | 0_2_00B6F686 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF1699 | 0_2_00AF1699 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B0C689 | 0_2_00B0C689 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AEF6EF | 0_2_00AEF6EF |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B436F7 | 0_2_00B436F7 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B446F0 | 0_2_00B446F0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B6D6F1 | 0_2_00B6D6F1 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5D6E5 | 0_2_00B5D6E5 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B066E4 | 0_2_00B066E4 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A906F0 | 0_2_00A906F0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A746D0 | 0_2_00A746D0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3A6CB | 0_2_00B3A6CB |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ABF6D2 | 0_2_00ABF6D2 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AFF62D | 0_2_00AFF62D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B00635 | 0_2_00B00635 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB262D | 0_2_00AB262D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B1263D | 0_2_00B1263D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB3624 | 0_2_00AB3624 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ACB63C | 0_2_00ACB63C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B40624 | 0_2_00B40624 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3D620 | 0_2_00B3D620 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A6E630 | 0_2_00A6E630 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B2862C | 0_2_00B2862C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AED609 | 0_2_00AED609 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A5F60D | 0_2_00A5F60D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B4A618 | 0_2_00B4A618 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ADB61D | 0_2_00ADB61D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5E604 | 0_2_00B5E604 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A6961B | 0_2_00A6961B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB8616 | 0_2_00AB8616 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5567C | 0_2_00B5567C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5C678 | 0_2_00B5C678 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB6674 | 0_2_00AB6674 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B62659 | 0_2_00B62659 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF765C | 0_2_00AF765C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A88650 | 0_2_00A88650 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB97BE | 0_2_00AB97BE |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF07B7 | 0_2_00AF07B7 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ABC78F | 0_2_00ABC78F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A59780 | 0_2_00A59780 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AD4785 | 0_2_00AD4785 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B1E7F5 | 0_2_00B1E7F5 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF37FD | 0_2_00AF37FD |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B757E1 | 0_2_00B757E1 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AEA7F4 | 0_2_00AEA7F4 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3B7E9 | 0_2_00B3B7E9 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A657C0 | 0_2_00A657C0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AEC7C7 | 0_2_00AEC7C7 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE57DA | 0_2_00AE57DA |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B037C9 | 0_2_00B037C9 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5F737 | 0_2_00B5F737 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF673F | 0_2_00AF673F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B07726 | 0_2_00B07726 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B1B72C | 0_2_00B1B72C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A79739 | 0_2_00A79739 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF2709 | 0_2_00AF2709 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B2A714 | 0_2_00B2A714 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AFC76F | 0_2_00AFC76F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B65779 | 0_2_00B65779 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00C12713 | 0_2_00C12713 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B35760 | 0_2_00B35760 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B1C751 | 0_2_00B1C751 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A77740 | 0_2_00A77740 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE0743 | 0_2_00AE0743 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A62750 | 0_2_00A62750 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC7752 | 0_2_00AC7752 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A6C8A0 | 0_2_00A6C8A0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B0C8B8 | 0_2_00B0C8B8 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ACF8A2 | 0_2_00ACF8A2 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A888B0 | 0_2_00A888B0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ACD8B1 | 0_2_00ACD8B1 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B6A8A9 | 0_2_00B6A8A9 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B6E893 | 0_2_00B6E893 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5A892 | 0_2_00B5A892 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B6C89B | 0_2_00B6C89B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE289C | 0_2_00AE289C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A6B8F6 | 0_2_00A6B8F6 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B228E1 | 0_2_00B228E1 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A538C0 | 0_2_00A538C0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE78DC | 0_2_00AE78DC |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B208C6 | 0_2_00B208C6 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ABA8DC | 0_2_00ABA8DC |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ABB8DC | 0_2_00ABB8DC |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A838D0 | 0_2_00A838D0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AD88D7 | 0_2_00AD88D7 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5283C | 0_2_00B5283C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A5D83C | 0_2_00A5D83C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3C828 | 0_2_00B3C828 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B2D811 | 0_2_00B2D811 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE9806 | 0_2_00AE9806 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B6081D | 0_2_00B6081D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B1A875 | 0_2_00B1A875 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B48870 | 0_2_00B48870 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ADA87C | 0_2_00ADA87C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE484E | 0_2_00AE484E |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A5C840 | 0_2_00A5C840 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AFB843 | 0_2_00AFB843 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B2785E | 0_2_00B2785E |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B2C842 | 0_2_00B2C842 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AFA854 | 0_2_00AFA854 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B57849 | 0_2_00B57849 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00C069CC | 0_2_00C069CC |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ADE9A0 | 0_2_00ADE9A0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC89BD | 0_2_00AC89BD |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B059A2 | 0_2_00B059A2 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC29B8 | 0_2_00AC29B8 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AEE9BB | 0_2_00AEE9BB |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AFE9B8 | 0_2_00AFE9B8 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AFD9B7 | 0_2_00AFD9B7 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB59B1 | 0_2_00AB59B1 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ACB9B7 | 0_2_00ACB9B7 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B779AA | 0_2_00B779AA |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A739B9 | 0_2_00A739B9 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B59999 | 0_2_00B59999 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B4D982 | 0_2_00B4D982 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AD0996 | 0_2_00AD0996 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B7B98B | 0_2_00B7B98B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3F9F0 | 0_2_00B3F9F0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B429F0 | 0_2_00B429F0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B079F6 | 0_2_00B079F6 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A909E0 | 0_2_00A909E0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A7C9EB | 0_2_00A7C9EB |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ADC9CB | 0_2_00ADC9CB |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B169D7 | 0_2_00B169D7 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3D9D4 | 0_2_00B3D9D4 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ADB9D8 | 0_2_00ADB9D8 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3C9C9 | 0_2_00B3C9C9 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B499CB | 0_2_00B499CB |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AD592E | 0_2_00AD592E |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3E935 | 0_2_00B3E935 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5E93E | 0_2_00B5E93E |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B11929 | 0_2_00B11929 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC590C | 0_2_00AC590C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A55900 | 0_2_00A55900 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B46911 | 0_2_00B46911 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AD790B | 0_2_00AD790B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF4907 | 0_2_00AF4907 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B7A918 | 0_2_00B7A918 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B10901 | 0_2_00B10901 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A76910 | 0_2_00A76910 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC1915 | 0_2_00AC1915 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B4B974 | 0_2_00B4B974 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF996B | 0_2_00AF996B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A6E960 | 0_2_00A6E960 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB2962 | 0_2_00AB2962 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B7297D | 0_2_00B7297D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B63967 | 0_2_00B63967 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5B96D | 0_2_00B5B96D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B7196F | 0_2_00B7196F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B6696F | 0_2_00B6696F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B0D96A | 0_2_00B0D96A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B6596C | 0_2_00B6596C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE1970 | 0_2_00AE1970 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B61956 | 0_2_00B61956 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B23954 | 0_2_00B23954 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B7895F | 0_2_00B7895F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5095B | 0_2_00B5095B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B2F947 | 0_2_00B2F947 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE8958 | 0_2_00AE8958 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B6F949 | 0_2_00B6F949 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B1FAB3 | 0_2_00B1FAB3 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC3AA8 | 0_2_00AC3AA8 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B1EAA5 | 0_2_00B1EAA5 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A78ABC | 0_2_00A78ABC |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B56AA9 | 0_2_00B56AA9 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A89A80 | 0_2_00A89A80 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B4CA9F | 0_2_00B4CA9F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B45A87 | 0_2_00B45A87 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B08A84 | 0_2_00B08A84 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC7AE0 | 0_2_00AC7AE0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B18AFE | 0_2_00B18AFE |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5CADB | 0_2_00B5CADB |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A69AD0 | 0_2_00A69AD0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B28ACF | 0_2_00B28ACF |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB8A29 | 0_2_00AB8A29 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B06A32 | 0_2_00B06A32 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A8FA20 | 0_2_00A8FA20 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B24A23 | 0_2_00B24A23 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AD9A3E | 0_2_00AD9A3E |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AEAA30 | 0_2_00AEAA30 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AFAA0A | 0_2_00AFAA0A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B41A1F | 0_2_00B41A1F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ACDA01 | 0_2_00ACDA01 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B26A1C | 0_2_00B26A1C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B36A03 | 0_2_00B36A03 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B0BA0D | 0_2_00B0BA0D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC6A6A | 0_2_00AC6A6A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF2A7C | 0_2_00AF2A7C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B34A6D | 0_2_00B34A6D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B67A68 | 0_2_00B67A68 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ADDA4F | 0_2_00ADDA4F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A8DA4D | 0_2_00A8DA4D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A85A4F | 0_2_00A85A4F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A8CA40 | 0_2_00A8CA40 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B12A58 | 0_2_00B12A58 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3BBB2 | 0_2_00B3BBB2 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A54BA0 | 0_2_00A54BA0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00C10BC7 | 0_2_00C10BC7 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B0FBBE | 0_2_00B0FBBE |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B3EBAF | 0_2_00B3EBAF |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A6EB80 | 0_2_00A6EB80 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B2DB9F | 0_2_00B2DB9F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00C15BF8 | 0_2_00C15BF8 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B2AB8B | 0_2_00B2AB8B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB3BED | 0_2_00AB3BED |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B03BF8 | 0_2_00B03BF8 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF3BC8 | 0_2_00AF3BC8 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE3BDF | 0_2_00AE3BDF |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AD4BDF | 0_2_00AD4BDF |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B4FBC6 | 0_2_00B4FBC6 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF6BDC | 0_2_00AF6BDC |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB6BDD | 0_2_00AB6BDD |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B29BCF | 0_2_00B29BCF |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B1BBCE | 0_2_00B1BBCE |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ADCB2C | 0_2_00ADCB2C |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B5DB31 | 0_2_00B5DB31 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00C0BB54 | 0_2_00C0BB54 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB9B3E | 0_2_00AB9B3E |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AEDB0E | 0_2_00AEDB0E |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB0B0A | 0_2_00AB0B0A |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AF1B08 | 0_2_00AF1B08 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AB7B01 | 0_2_00AB7B01 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A8FB10 | 0_2_00A8FB10 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AECB17 | 0_2_00AECB17 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B43B0F | 0_2_00B43B0F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A68B1B | 0_2_00A68B1B |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ADBB78 | 0_2_00ADBB78 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A5AB40 | 0_2_00A5AB40 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B74B5E | 0_2_00B74B5E |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B59B4D | 0_2_00B59B4D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B44B49 | 0_2_00B44B49 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AE0B51 | 0_2_00AE0B51 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ADACAE | 0_2_00ADACAE |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B0DCB3 | 0_2_00B0DCB3 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A64CA0 | 0_2_00A64CA0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B65CA7 | 0_2_00B65CA7 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AD5CB9 | 0_2_00AD5CB9 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ABBCB5 | 0_2_00ABBCB5 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B60C93 | 0_2_00B60C93 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AD7C85 | 0_2_00AD7C85 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B2EC9F | 0_2_00B2EC9F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC0C9D | 0_2_00AC0C9D |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B19C82 | 0_2_00B19C82 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B75C80 | 0_2_00B75C80 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B2BC8F | 0_2_00B2BC8F |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00B71CF8 | 0_2_00B71CF8 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00A81CF0 | 0_2_00A81CF0 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ADFCCE | 0_2_00ADFCCE |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00AC2CCA | 0_2_00AC2CCA |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | Code function: 0_2_00ABCCC1 | 0_2_00ABCCC1 |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: AA92D3 second address: AA8B31 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782D2A30A4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c mov dword ptr [ebp+122D1CE7h], ebx 0x00000012 push dword ptr [ebp+122D12FDh] 0x00000018 jmp 00007F782D2A30A0h 0x0000001d jmp 00007F782D2A309Ah 0x00000022 call dword ptr [ebp+122D2AB4h] 0x00000028 pushad 0x00000029 mov dword ptr [ebp+122D25B4h], esi 0x0000002f xor eax, eax 0x00000031 jmp 00007F782D2A30A4h 0x00000036 mov edx, dword ptr [esp+28h] 0x0000003a cld 0x0000003b mov dword ptr [ebp+122D389Ch], eax 0x00000041 pushad 0x00000042 pushad 0x00000043 sub dword ptr [ebp+122D25B4h], edi 0x00000049 jg 00007F782D2A3096h 0x0000004f popad 0x00000050 movzx edx, ax 0x00000053 popad 0x00000054 mov esi, 0000003Ch 0x00000059 jp 00007F782D2A30ABh 0x0000005f add esi, dword ptr [esp+24h] 0x00000063 jp 00007F782D2A30AFh 0x00000069 lodsw 0x0000006b jmp 00007F782D2A30A3h 0x00000070 add eax, dword ptr [esp+24h] 0x00000074 sub dword ptr [ebp+122D25B4h], edi 0x0000007a mov ebx, dword ptr [esp+24h] 0x0000007e mov dword ptr [ebp+122D25B4h], eax 0x00000084 push eax 0x00000085 push eax 0x00000086 push eax 0x00000087 push edx 0x00000088 jmp 00007F782D2A309Bh 0x0000008d rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1AAB9 second address: C1AAC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1AC88 second address: C1AC8E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1AC8E second address: C1AC96 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1AC96 second address: C1ACA0 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F782D2A3096h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1ADE0 second address: C1ADEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jp 00007F782CBDBD66h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1ADEF second address: C1ADF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1DB6F second address: C1DB79 instructions: 0x00000000 rdtsc 0x00000002 je 00007F782CBDBD66h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1DB79 second address: C1DB7F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1DB7F second address: C1DBA5 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c push eax 0x0000000d push edx 0x0000000e push edx 0x0000000f jmp 00007F782CBDBD76h 0x00000014 pop edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1DC55 second address: C1DC5F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1DC5F second address: C1DC63 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1DC63 second address: C1DC75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jnp 00007F782D2A30A8h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1DC75 second address: C1DC79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1DC79 second address: C1DC7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1DC7D second address: C1DCB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a jnc 00007F782CBDBD7Ah 0x00000010 jmp 00007F782CBDBD74h 0x00000015 mov eax, dword ptr [eax] 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F782CBDBD73h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1DCB9 second address: C1DCBD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1DF26 second address: C1DF2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1DF2B second address: C1DF35 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007F782D2A3096h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1E035 second address: C1E03B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1E03B second address: C1E05C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F782D2A30A5h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1E05C second address: C1E089 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b jmp 00007F782CBDBD6Bh 0x00000010 mov eax, dword ptr [eax] 0x00000012 jmp 00007F782CBDBD6Ah 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e push edi 0x0000001f pop edi 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1E089 second address: C1E08E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C1E08E second address: C1E094 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C3B5DF second address: C3B5F3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782D2A309Eh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C3B5F3 second address: C3B5F8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C3B9E1 second address: C3BA0C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F782D2A30A5h 0x00000008 jmp 00007F782D2A309Bh 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 push ebx 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C3BB8E second address: C3BB92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C3C394 second address: C3C398 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C3C398 second address: C3C3AC instructions: 0x00000000 rdtsc 0x00000002 je 00007F782CBDBD66h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e jg 00007F782CBDBD66h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C3C3AC second address: C3C3B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C32F27 second address: C32F2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C32F2D second address: C32F33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C32F33 second address: C32F38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C081B0 second address: C081B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C081B4 second address: C081D0 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 push edx 0x0000000a pop edx 0x0000000b pushad 0x0000000c popad 0x0000000d pop esi 0x0000000e ja 00007F782CBDBD6Ah 0x00000014 push eax 0x00000015 push edx 0x00000016 push edx 0x00000017 pop edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C41FA4 second address: C41FA8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C42423 second address: C4242E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C42605 second address: C42678 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jp 00007F782D2A3096h 0x00000010 jmp 00007F782D2A30A3h 0x00000015 popad 0x00000016 pop eax 0x00000017 mov eax, dword ptr [esp+04h] 0x0000001b jmp 00007F782D2A30A7h 0x00000020 mov eax, dword ptr [eax] 0x00000022 pushad 0x00000023 jl 00007F782D2A30AAh 0x00000029 jmp 00007F782D2A30A4h 0x0000002e jmp 00007F782D2A309Bh 0x00000033 popad 0x00000034 mov dword ptr [esp+04h], eax 0x00000038 push eax 0x00000039 push edx 0x0000003a push esi 0x0000003b push eax 0x0000003c pop eax 0x0000003d pop esi 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4454F second address: C44555 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C44555 second address: C4458E instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F782D2A309Eh 0x00000008 push esi 0x00000009 jng 00007F782D2A3096h 0x0000000f pop esi 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F782D2A309Bh 0x00000019 pushad 0x0000001a pushad 0x0000001b popad 0x0000001c pushad 0x0000001d popad 0x0000001e jbe 00007F782D2A3096h 0x00000024 jc 00007F782D2A3096h 0x0000002a popad 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C48C9B second address: C48CA3 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C48CA3 second address: C48CAA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C48E19 second address: C48E4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F782CBDBD6Dh 0x0000000b popad 0x0000000c je 00007F782CBDBD7Fh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4B4BB second address: C4B4CB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jnp 00007F782D2A309Eh 0x0000000d push edi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4B534 second address: C4B539 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4B539 second address: C4B53E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4B53E second address: C4B567 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d push eax 0x0000000e push edx 0x0000000f push ebx 0x00000010 jmp 00007F782CBDBD78h 0x00000015 pop ebx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4B567 second address: C4B5DE instructions: 0x00000000 rdtsc 0x00000002 jne 00007F782D2A3098h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [eax] 0x0000000c jl 00007F782D2A30A2h 0x00000012 jmp 00007F782D2A309Ch 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b jc 00007F782D2A30AFh 0x00000021 jmp 00007F782D2A30A9h 0x00000026 pop eax 0x00000027 push 00000000h 0x00000029 push edi 0x0000002a call 00007F782D2A3098h 0x0000002f pop edi 0x00000030 mov dword ptr [esp+04h], edi 0x00000034 add dword ptr [esp+04h], 00000018h 0x0000003c inc edi 0x0000003d push edi 0x0000003e ret 0x0000003f pop edi 0x00000040 ret 0x00000041 mov dword ptr [ebp+122D1DF7h], ebx 0x00000047 movzx edi, bx 0x0000004a push ECBDDC8Ch 0x0000004f push eax 0x00000050 push edx 0x00000051 push esi 0x00000052 push eax 0x00000053 push edx 0x00000054 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4B5DE second address: C4B5E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4B5E3 second address: C4B5EE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jg 00007F782D2A3096h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4B749 second address: C4B74D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4B8F1 second address: C4B8F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4C1E4 second address: C4C207 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782CBDBD78h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f pop edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4C207 second address: C4C227 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007F782D2A30A0h 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebx 0x0000000c cld 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 push edi 0x00000012 pop edi 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4C227 second address: C4C22C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4C44F second address: C4C454 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4C779 second address: C4C77D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4CC6C second address: C4CC89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F782D2A30A5h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4CC89 second address: C4CC8E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4CC8E second address: C4CD16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 jne 00007F782D2A309Ch 0x0000000e and di, D79Ch 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push eax 0x00000018 call 00007F782D2A3098h 0x0000001d pop eax 0x0000001e mov dword ptr [esp+04h], eax 0x00000022 add dword ptr [esp+04h], 0000001Ah 0x0000002a inc eax 0x0000002b push eax 0x0000002c ret 0x0000002d pop eax 0x0000002e ret 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 push eax 0x00000034 call 00007F782D2A3098h 0x00000039 pop eax 0x0000003a mov dword ptr [esp+04h], eax 0x0000003e add dword ptr [esp+04h], 0000001Dh 0x00000046 inc eax 0x00000047 push eax 0x00000048 ret 0x00000049 pop eax 0x0000004a ret 0x0000004b pushad 0x0000004c mov edx, dword ptr [ebp+122D2C50h] 0x00000052 mov dword ptr [ebp+1245A598h], esi 0x00000058 popad 0x00000059 xchg eax, ebx 0x0000005a push eax 0x0000005b push edx 0x0000005c pushad 0x0000005d jmp 00007F782D2A30A0h 0x00000062 push eax 0x00000063 push edx 0x00000064 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4CD16 second address: C4CD1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4CD1B second address: C4CD21 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4D63C second address: C4D6C8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782CBDBD70h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push eax 0x0000000d call 00007F782CBDBD68h 0x00000012 pop eax 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 add dword ptr [esp+04h], 0000001Dh 0x0000001f inc eax 0x00000020 push eax 0x00000021 ret 0x00000022 pop eax 0x00000023 ret 0x00000024 mov esi, dword ptr [ebp+122D25C2h] 0x0000002a push 00000000h 0x0000002c push 00000000h 0x0000002e push eax 0x0000002f call 00007F782CBDBD68h 0x00000034 pop eax 0x00000035 mov dword ptr [esp+04h], eax 0x00000039 add dword ptr [esp+04h], 00000014h 0x00000041 inc eax 0x00000042 push eax 0x00000043 ret 0x00000044 pop eax 0x00000045 ret 0x00000046 mov edi, 5A22AF57h 0x0000004b push 00000000h 0x0000004d add di, 0300h 0x00000052 xchg eax, ebx 0x00000053 jc 00007F782CBDBD7Ch 0x00000059 pushad 0x0000005a je 00007F782CBDBD66h 0x00000060 jmp 00007F782CBDBD6Eh 0x00000065 popad 0x00000066 push eax 0x00000067 push esi 0x00000068 push edx 0x00000069 push eax 0x0000006a push edx 0x0000006b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4E820 second address: C4E824 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4E824 second address: C4E83C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jc 00007F782CBDBD66h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 jc 00007F782CBDBD66h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4E83C second address: C4E846 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4E846 second address: C4E84A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4E84A second address: C4E8A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782D2A309Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a nop 0x0000000b movzx esi, bx 0x0000000e push 00000000h 0x00000010 push 00000000h 0x00000012 push eax 0x00000013 call 00007F782D2A3098h 0x00000018 pop eax 0x00000019 mov dword ptr [esp+04h], eax 0x0000001d add dword ptr [esp+04h], 0000001Ah 0x00000025 inc eax 0x00000026 push eax 0x00000027 ret 0x00000028 pop eax 0x00000029 ret 0x0000002a push 00000000h 0x0000002c sub esi, dword ptr [ebp+122D3730h] 0x00000032 xchg eax, ebx 0x00000033 jc 00007F782D2A30A2h 0x00000039 jnc 00007F782D2A309Ch 0x0000003f push eax 0x00000040 jo 00007F782D2A30A4h 0x00000046 push eax 0x00000047 push edx 0x00000048 push eax 0x00000049 push edx 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4E8A9 second address: C4E8AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4FDDE second address: C4FDE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4FDE2 second address: C4FDE8 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4FDE8 second address: C4FE8A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782D2A30A5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push eax 0x0000000f call 00007F782D2A3098h 0x00000014 pop eax 0x00000015 mov dword ptr [esp+04h], eax 0x00000019 add dword ptr [esp+04h], 00000019h 0x00000021 inc eax 0x00000022 push eax 0x00000023 ret 0x00000024 pop eax 0x00000025 ret 0x00000026 jmp 00007F782D2A30A4h 0x0000002b push 00000000h 0x0000002d push 00000000h 0x0000002f push eax 0x00000030 call 00007F782D2A3098h 0x00000035 pop eax 0x00000036 mov dword ptr [esp+04h], eax 0x0000003a add dword ptr [esp+04h], 0000001Bh 0x00000042 inc eax 0x00000043 push eax 0x00000044 ret 0x00000045 pop eax 0x00000046 ret 0x00000047 push 00000000h 0x00000049 push 00000000h 0x0000004b push edi 0x0000004c call 00007F782D2A3098h 0x00000051 pop edi 0x00000052 mov dword ptr [esp+04h], edi 0x00000056 add dword ptr [esp+04h], 00000017h 0x0000005e inc edi 0x0000005f push edi 0x00000060 ret 0x00000061 pop edi 0x00000062 ret 0x00000063 mov esi, dword ptr [ebp+122D3930h] 0x00000069 xchg eax, ebx 0x0000006a pushad 0x0000006b push esi 0x0000006c push eax 0x0000006d push edx 0x0000006e rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C5094E second address: C5098D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 mov dword ptr [esp], eax 0x00000008 or edi, dword ptr [ebp+12442D6Fh] 0x0000000e push 00000000h 0x00000010 push 00000000h 0x00000012 push ebx 0x00000013 call 00007F782CBDBD68h 0x00000018 pop ebx 0x00000019 mov dword ptr [esp+04h], ebx 0x0000001d add dword ptr [esp+04h], 00000017h 0x00000025 inc ebx 0x00000026 push ebx 0x00000027 ret 0x00000028 pop ebx 0x00000029 ret 0x0000002a push 00000000h 0x0000002c push eax 0x0000002d push eax 0x0000002e push edx 0x0000002f jmp 00007F782CBDBD6Bh 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C50703 second address: C50721 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F782D2A30A2h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C50721 second address: C5072B instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F782CBDBD66h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C52D05 second address: C52D0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C5481E second address: C54822 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C54822 second address: C5482C instructions: 0x00000000 rdtsc 0x00000002 ja 00007F782D2A3096h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C53C02 second address: C53C06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C53C06 second address: C53C19 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782D2A309Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C56D6B second address: C56D7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F782CBDBD6Dh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C56D7D second address: C56D83 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C56D83 second address: C56D87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C56D87 second address: C56D96 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edi 0x0000000c pushad 0x0000000d popad 0x0000000e pop edi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C56D96 second address: C56D9C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C56EAD second address: C56EC4 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F782D2A3098h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c pushad 0x0000000d jno 00007F782D2A3096h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C5CECE second address: C5CED2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C5BF9F second address: C5BFB7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782D2A30A4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C5DE4A second address: C5DE5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F782CBDBD6Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C61E0C second address: C61E72 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F782D2A30A6h 0x0000000e nop 0x0000000f push 00000000h 0x00000011 push eax 0x00000012 call 00007F782D2A3098h 0x00000017 pop eax 0x00000018 mov dword ptr [esp+04h], eax 0x0000001c add dword ptr [esp+04h], 00000019h 0x00000024 inc eax 0x00000025 push eax 0x00000026 ret 0x00000027 pop eax 0x00000028 ret 0x00000029 push 00000000h 0x0000002b mov bx, cx 0x0000002e push 00000000h 0x00000030 mov ebx, dword ptr [ebp+122D36C4h] 0x00000036 xchg eax, esi 0x00000037 jmp 00007F782D2A30A2h 0x0000003c push eax 0x0000003d push eax 0x0000003e pushad 0x0000003f push eax 0x00000040 push edx 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C5EF68 second address: C5EF6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C5E015 second address: C5E025 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F782D2A309Bh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C6004B second address: C6004F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C60F83 second address: C60F89 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C61FEB second address: C62001 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jnp 00007F782CBDBD6Ch 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C62D59 second address: C62D5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C62D5D second address: C62D86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a js 00007F782CBDBD7Fh 0x00000010 jmp 00007F782CBDBD79h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C62D86 second address: C62D9F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F782D2A30A5h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C640A3 second address: C640A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C640A8 second address: C640AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C640AE second address: C640C1 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c jnc 00007F782CBDBD66h 0x00000012 pop ebx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C640C1 second address: C640C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C6CB4D second address: C6CB53 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C6CCE0 second address: C6CCEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F782D2A309Ah 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C6CCEF second address: C6CCF5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C6CCF5 second address: C6CCF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C6CE61 second address: C6CE67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C6CE67 second address: C6CE77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F782D2A3096h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C6CE77 second address: C6CE7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C7326E second address: C7328D instructions: 0x00000000 rdtsc 0x00000002 ja 00007F782D2A3096h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e jmp 00007F782D2A30A0h 0x00000013 pop ebx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C7328D second address: C73292 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C73292 second address: C732C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F782D2A3096h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 jmp 00007F782D2A30A6h 0x00000016 mov eax, dword ptr [eax] 0x00000018 push eax 0x00000019 push edx 0x0000001a push edi 0x0000001b push eax 0x0000001c pop eax 0x0000001d pop edi 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C732C1 second address: C732E3 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F782CBDBD70h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp+04h], eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jns 00007F782CBDBD68h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C732E3 second address: C732E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C732E8 second address: C732EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C73397 second address: C7339D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C7339D second address: C733CE instructions: 0x00000000 rdtsc 0x00000002 jno 00007F782CBDBD66h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jnl 00007F782CBDBD78h 0x00000013 mov eax, dword ptr [esp+04h] 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a push eax 0x0000001b pop eax 0x0000001c push ecx 0x0000001d pop ecx 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C733CE second address: C7340E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782D2A30A0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push edx 0x0000000c jmp 00007F782D2A30A6h 0x00000011 pop edx 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 jl 00007F782D2A30A2h 0x0000001c js 00007F782D2A309Ch 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C73535 second address: C73540 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F782CBDBD66h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C73540 second address: C73546 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C73546 second address: C7354A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C78267 second address: C78279 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F782D2A309Bh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C78279 second address: C7827F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C7750A second address: C77510 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C776C3 second address: C776C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C779A7 second address: C779B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push edi 0x00000007 pop edi 0x00000008 jno 00007F782D2A3096h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C779B5 second address: C779B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C77CA0 second address: C77CD7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 jmp 00007F782D2A309Ah 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push ebx 0x00000010 push esi 0x00000011 pop esi 0x00000012 jno 00007F782D2A3096h 0x00000018 pop ebx 0x00000019 pushad 0x0000001a push esi 0x0000001b pop esi 0x0000001c jmp 00007F782D2A309Fh 0x00000021 jo 00007F782D2A3096h 0x00000027 popad 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C77F7A second address: C77F84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C780E3 second address: C780EB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C780EB second address: C780F0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C780F0 second address: C780F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C0B6A3 second address: C0B6A9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C0B6A9 second address: C0B6AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C0B6AF second address: C0B6B4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C7C8AE second address: C7C8DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782D2A309Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F782D2A30A6h 0x00000010 push ebx 0x00000011 push edi 0x00000012 pop edi 0x00000013 push edi 0x00000014 pop edi 0x00000015 pop ebx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C7C01C second address: C7C026 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C7CE63 second address: C7CE7F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007F782D2A30A1h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebx 0x0000000c push eax 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C7EB07 second address: C7EB20 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F782CBDBD75h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C7EB20 second address: C7EB38 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F782D2A3096h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jbe 00007F782D2A30A2h 0x00000010 jnl 00007F782D2A3096h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C82F48 second address: C82F59 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jl 00007F782CBDBD66h 0x00000009 je 00007F782CBDBD66h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C82F59 second address: C82F74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F782D2A3096h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F782D2A309Eh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C82F74 second address: C82F9D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007F782CBDBD6Ah 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F782CBDBD72h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C82F9D second address: C82FA3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C13C18 second address: C13C1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C13C1C second address: C13C27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C49E36 second address: C49EA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push edx 0x0000000c call 00007F782CBDBD68h 0x00000011 pop edx 0x00000012 mov dword ptr [esp+04h], edx 0x00000016 add dword ptr [esp+04h], 0000001Dh 0x0000001e inc edx 0x0000001f push edx 0x00000020 ret 0x00000021 pop edx 0x00000022 ret 0x00000023 movzx ecx, dx 0x00000026 clc 0x00000027 mov edx, 5B8E4900h 0x0000002c lea eax, dword ptr [ebp+12474B7Bh] 0x00000032 jng 00007F782CBDBD67h 0x00000038 cmc 0x00000039 nop 0x0000003a pushad 0x0000003b push eax 0x0000003c jnc 00007F782CBDBD66h 0x00000042 pop eax 0x00000043 jmp 00007F782CBDBD6Fh 0x00000048 popad 0x00000049 push eax 0x0000004a push eax 0x0000004b push edx 0x0000004c push ebx 0x0000004d jmp 00007F782CBDBD6Eh 0x00000052 pop ebx 0x00000053 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C49EA7 second address: C49EAC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C49EAC second address: C32F27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a jmp 00007F782CBDBD78h 0x0000000f add cx, AF79h 0x00000014 call dword ptr [ebp+122D210Dh] 0x0000001a push eax 0x0000001b push edx 0x0000001c push ecx 0x0000001d jmp 00007F782CBDBD6Eh 0x00000022 pushad 0x00000023 popad 0x00000024 pop ecx 0x00000025 pushad 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4A0C1 second address: C4A0C7 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4A0C7 second address: C4A0EF instructions: 0x00000000 rdtsc 0x00000002 jl 00007F782CBDBD6Ch 0x00000008 jo 00007F782CBDBD66h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F782CBDBD74h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4A0EF second address: C4A0F9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4A458 second address: AA8B31 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782CBDBD78h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a xor dword ptr [ebp+122D1D57h], ecx 0x00000010 push dword ptr [ebp+122D12FDh] 0x00000016 mov ecx, 20E02C75h 0x0000001b call dword ptr [ebp+122D2AB4h] 0x00000021 pushad 0x00000022 mov dword ptr [ebp+122D25B4h], esi 0x00000028 xor eax, eax 0x0000002a jmp 00007F782CBDBD74h 0x0000002f mov edx, dword ptr [esp+28h] 0x00000033 cld 0x00000034 mov dword ptr [ebp+122D389Ch], eax 0x0000003a pushad 0x0000003b pushad 0x0000003c sub dword ptr [ebp+122D25B4h], edi 0x00000042 jg 00007F782CBDBD66h 0x00000048 popad 0x00000049 movzx edx, ax 0x0000004c popad 0x0000004d mov esi, 0000003Ch 0x00000052 jp 00007F782CBDBD7Bh 0x00000058 add esi, dword ptr [esp+24h] 0x0000005c jp 00007F782CBDBD7Fh 0x00000062 lodsw 0x00000064 jmp 00007F782CBDBD73h 0x00000069 add eax, dword ptr [esp+24h] 0x0000006d sub dword ptr [ebp+122D25B4h], edi 0x00000073 mov ebx, dword ptr [esp+24h] 0x00000077 mov dword ptr [ebp+122D25B4h], eax 0x0000007d push eax 0x0000007e push eax 0x0000007f push eax 0x00000080 push edx 0x00000081 jmp 00007F782CBDBD6Bh 0x00000086 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4A4D1 second address: C4A4DE instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4A4DE second address: C4A4E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4A4E2 second address: C4A4E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4A4E6 second address: C4A4FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F782CBDBD6Ah 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4A4FD second address: C4A502 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4A502 second address: C4A528 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F782CBDBD79h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4A528 second address: C4A52D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4A5DA second address: C4A5EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F782CBDBD6Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4A761 second address: C4A765 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4ADCF second address: C4AE03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push eax 0x00000008 jmp 00007F782CBDBD78h 0x0000000d pop eax 0x0000000e nop 0x0000000f push 0000001Eh 0x00000011 mov edx, 1EA51681h 0x00000016 mov ecx, edi 0x00000018 push eax 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c pushad 0x0000001d popad 0x0000001e push eax 0x0000001f pop eax 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4AF63 second address: C4AF68 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4AF68 second address: C4AF7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jc 00007F782CBDBD70h 0x0000000e pushad 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C81FBF second address: C81FD0 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F782D2A309Ch 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C82174 second address: C82178 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C82178 second address: C8217C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C8217C second address: C821B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 pushad 0x0000000a pushad 0x0000000b jno 00007F782CBDBD66h 0x00000011 jmp 00007F782CBDBD75h 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 jno 00007F782CBDBD66h 0x0000001f ja 00007F782CBDBD66h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C8245D second address: C82468 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push edi 0x0000000a pop edi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C82468 second address: C8246E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C8246E second address: C824CB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782D2A309Eh 0x00000007 pushad 0x00000008 jmp 00007F782D2A30A9h 0x0000000d jmp 00007F782D2A309Eh 0x00000012 popad 0x00000013 pop edx 0x00000014 pop eax 0x00000015 jo 00007F782D2A30BDh 0x0000001b jne 00007F782D2A30A9h 0x00000021 push esi 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C824CB second address: C824D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C82A1E second address: C82A23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C82A23 second address: C82A40 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F782CBDBD75h 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C82A40 second address: C82A55 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F782D2A309Bh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C8730D second address: C87315 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C87315 second address: C8731A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C8731A second address: C87344 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F782CBDBD6Eh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F782CBDBD76h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C87344 second address: C8734E instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F782D2A309Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C87600 second address: C87605 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C877C6 second address: C877CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C877CC second address: C877D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C877D0 second address: C877D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C87AE2 second address: C87AE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C87AE7 second address: C87AF2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007F782D2A3096h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C87C45 second address: C87C4B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C87F4B second address: C87F4F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C87F4F second address: C87F55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C88475 second address: C8848E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782D2A30A5h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C8848E second address: C88494 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C88494 second address: C884A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F782D2A30A0h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C8BCCB second address: C8BCDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 jmp 00007F782CBDBD6Dh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C8BCDF second address: C8BCE4 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C8BCE4 second address: C8BD10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F782CBDBD70h 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007F782CBDBD73h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C8E75E second address: C8E763 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C8E763 second address: C8E770 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jc 00007F782CBDBD76h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C955A6 second address: C955B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F782D2A3096h 0x0000000a pop esi 0x0000000b jng 00007F782D2A3098h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C9528B second address: C95299 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 jns 00007F782CBDBD66h 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C98382 second address: C9838C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F782D2A3096h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C9838C second address: C98390 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C98390 second address: C98398 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C98398 second address: C983A8 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F782CBDBD68h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C983A8 second address: C983AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C9CB8F second address: C9CB93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C9CB93 second address: C9CB97 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C9CB97 second address: C9CB9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C9CF8C second address: C9CF94 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 push esi 0x00000007 pop esi 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CA1BD6 second address: CA1BDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4ABA9 second address: C4ABEE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782D2A30A6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jnp 00007F782D2A3098h 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 mov dword ptr [esp], eax 0x00000015 movsx ecx, dx 0x00000018 mov ebx, dword ptr [ebp+12474BBAh] 0x0000001e mov edx, dword ptr [ebp+122D25BAh] 0x00000024 add eax, ebx 0x00000026 sbb ch, FFFFFF85h 0x00000029 push eax 0x0000002a pushad 0x0000002b pushad 0x0000002c jnp 00007F782D2A3096h 0x00000032 push eax 0x00000033 push edx 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4ABEE second address: C4AC76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jbe 00007F782CBDBD7Ah 0x0000000b jmp 00007F782CBDBD74h 0x00000010 popad 0x00000011 mov dword ptr [esp], eax 0x00000014 push 00000000h 0x00000016 push ebp 0x00000017 call 00007F782CBDBD68h 0x0000001c pop ebp 0x0000001d mov dword ptr [esp+04h], ebp 0x00000021 add dword ptr [esp+04h], 00000018h 0x00000029 inc ebp 0x0000002a push ebp 0x0000002b ret 0x0000002c pop ebp 0x0000002d ret 0x0000002e push 00000004h 0x00000030 push 00000000h 0x00000032 push edi 0x00000033 call 00007F782CBDBD68h 0x00000038 pop edi 0x00000039 mov dword ptr [esp+04h], edi 0x0000003d add dword ptr [esp+04h], 0000001Ch 0x00000045 inc edi 0x00000046 push edi 0x00000047 ret 0x00000048 pop edi 0x00000049 ret 0x0000004a nop 0x0000004b jmp 00007F782CBDBD77h 0x00000050 push eax 0x00000051 push eax 0x00000052 push edx 0x00000053 push eax 0x00000054 push edx 0x00000055 push eax 0x00000056 push edx 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4AC76 second address: C4AC7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C4AC7A second address: C4AC80 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CA1EBE second address: CA1EC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push edi 0x00000008 pop edi 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CA29F1 second address: CA2A08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 jmp 00007F782CBDBD6Eh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CA52F2 second address: CA5316 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F782D2A30A9h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CACD42 second address: CACD46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CACD46 second address: CACD65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F782D2A30A9h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CACD65 second address: CACD80 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jmp 00007F782CBDBD75h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CAAD3B second address: CAAD58 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F782D2A30A7h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CAB30A second address: CAB310 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CAB310 second address: CAB31F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F782D2A309Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CAB31F second address: CAB34A instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 pop eax 0x00000009 jmp 00007F782CBDBD76h 0x0000000e pop eax 0x0000000f pop edx 0x00000010 pop eax 0x00000011 jg 00007F782CBDBD7Eh 0x00000017 push ebx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CAB34A second address: CAB35A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop ebx 0x00000007 push edx 0x00000008 jo 00007F782D2A3096h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CAC14D second address: CAC17A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782CBDBD6Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a je 00007F782CBDBD66h 0x00000010 jmp 00007F782CBDBD71h 0x00000015 popad 0x00000016 pushad 0x00000017 pushad 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CAC17A second address: CAC180 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CAC180 second address: CAC1B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 jng 00007F782CBDBD66h 0x0000000c jmp 00007F782CBDBD77h 0x00000011 pop esi 0x00000012 popad 0x00000013 jl 00007F782CBDBD90h 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c popad 0x0000001d jnl 00007F782CBDBD66h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CACA8A second address: CACA90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CACA90 second address: CACA94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CB216D second address: CB217B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F782D2A3096h 0x0000000a pop edi 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CB217B second address: CB2181 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CB2181 second address: CB2187 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CB2187 second address: CB219B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jno 00007F782CBDBD66h 0x0000000c jnp 00007F782CBDBD66h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CB5277 second address: CB52A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F782D2A30A1h 0x00000009 jmp 00007F782D2A30A9h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CB52A9 second address: CB52AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CB52AF second address: CB52B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CB52B3 second address: CB52B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CB52B7 second address: CB52C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CB52C3 second address: CB52C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CB52C7 second address: CB52E4 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F782D2A3096h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push ebx 0x0000000c pushad 0x0000000d jmp 00007F782D2A309Eh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CB52E4 second address: CB52EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CB56C3 second address: CB56C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CB56C9 second address: CB56CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CB56CD second address: CB56E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F782D2A309Eh 0x0000000b pop ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f push edi 0x00000010 pop edi 0x00000011 pop ebx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CB56E8 second address: CB56ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CB5849 second address: CB5853 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F782D2A3096h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CBD257 second address: CBD26B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F782CBDBD6Eh 0x00000009 push esi 0x0000000a pop esi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CBB47F second address: CBB486 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CBB486 second address: CBB491 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007F782CBDBD66h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CBB491 second address: CBB497 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CBB497 second address: CBB4D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F782CBDBD79h 0x00000009 popad 0x0000000a push edx 0x0000000b jmp 00007F782CBDBD75h 0x00000010 pop edx 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 push edx 0x00000017 pop edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CBB4D5 second address: CBB4D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CBB4D9 second address: CBB4DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CBBB88 second address: CBBB8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CBCA21 second address: CBCA38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F782CBDBD70h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CBAFDE second address: CBB003 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F782D2A30A8h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop esi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CBB003 second address: CBB007 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CBB007 second address: CBB00B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CBB00B second address: CBB02F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F782CBDBD79h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CBB02F second address: CBB03C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F782D2A3096h 0x0000000a push esi 0x0000000b pop esi 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CC4AB2 second address: CC4AB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CC4AB8 second address: CC4ABC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CC6D3A second address: CC6D44 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F782CBDBD66h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CC8523 second address: CC853A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push edx 0x00000006 jmp 00007F782D2A309Dh 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CC853A second address: CC853E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CC9CEB second address: CC9CF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CC9CF1 second address: CC9CFE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CD74FB second address: CD7516 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782D2A30A5h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CDC630 second address: CDC63A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F782CBDBD66h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CDC63A second address: CDC644 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F782D2A3096h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CDC644 second address: CDC661 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F782CBDBD66h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b jmp 00007F782CBDBD70h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CDC661 second address: CDC6AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 jne 00007F782D2A30A7h 0x0000000e jmp 00007F782D2A30A8h 0x00000013 push ecx 0x00000014 jns 00007F782D2A3096h 0x0000001a ja 00007F782D2A3096h 0x00000020 pop ecx 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CDC6AA second address: CDC6AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: C121BE second address: C121C4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CDC21E second address: CDC224 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CDC224 second address: CDC228 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CDC363 second address: CDC374 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F782CBDBD6Bh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CE17FE second address: CE1808 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F782D2A3096h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CE1808 second address: CE185B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782CBDBD76h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jmp 00007F782CBDBD79h 0x0000000f jmp 00007F782CBDBD6Bh 0x00000014 jmp 00007F782CBDBD6Dh 0x00000019 push esi 0x0000001a pop esi 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CE185B second address: CE186F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 js 00007F782D2A3098h 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 pop eax 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CE523C second address: CE5246 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F782CBDBD66h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CE5246 second address: CE525E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F782D2A30A3h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CE99F4 second address: CE9A14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F782CBDBD78h 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CEDA46 second address: CEDA4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CEDA4C second address: CEDA7E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782CBDBD75h 0x00000007 jng 00007F782CBDBD66h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 push esi 0x00000016 pop esi 0x00000017 pop edx 0x00000018 push eax 0x00000019 push edx 0x0000001a jl 00007F782CBDBD66h 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CEDA7E second address: CEDA82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CEDA82 second address: CEDA8C instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F782CBDBD66h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CEDA8C second address: CEDAB0 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F782D2A30AEh 0x00000008 jmp 00007F782D2A30A8h 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CED8C8 second address: CED8E3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782CBDBD71h 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push esi 0x0000000e pop esi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CED8E3 second address: CED8E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CED8E9 second address: CED8EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CED8EF second address: CED8F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CED8F3 second address: CED8F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CF6090 second address: CF60AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F782D2A30A8h 0x00000009 push edi 0x0000000a pop edi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CF60AE second address: CF60C1 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 ja 00007F782CBDBD66h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CF4F2C second address: CF4F32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CF4F32 second address: CF4F36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CF4F36 second address: CF4F3C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CF4F3C second address: CF4F55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 jne 00007F782CBDBD88h 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F782CBDBD6Ah 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CF4F55 second address: CF4F5B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CF5DC7 second address: CF5DEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F782CBDBD78h 0x00000009 ja 00007F782CBDBD66h 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CF9B5E second address: CF9B62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CF9B62 second address: CF9B97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F782CBDBD71h 0x0000000b jmp 00007F782CBDBD6Eh 0x00000010 pushad 0x00000011 push esi 0x00000012 pop esi 0x00000013 jmp 00007F782CBDBD6Bh 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CF96EB second address: CF96EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CF96EF second address: CF9702 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d jg 00007F782CBDBD66h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CF9702 second address: CF9706 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CF9706 second address: CF9722 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F782CBDBD76h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: CF9722 second address: CF9727 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D082D5 second address: D082ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F782CBDBD74h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D082ED second address: D082FF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782D2A309Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D082FF second address: D08320 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 push edi 0x00000009 jmp 00007F782CBDBD74h 0x0000000e pop edi 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D08320 second address: D0832F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jl 00007F782D2A3096h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D0C372 second address: D0C37E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 pushad 0x0000000a popad 0x0000000b pop edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D0C37E second address: D0C384 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D0C384 second address: D0C393 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F782CBDBD6Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D0C393 second address: D0C399 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D0C399 second address: D0C3D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F782CBDBD72h 0x0000000e jg 00007F782CBDBD66h 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c popad 0x0000001d jmp 00007F782CBDBD73h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D0C3D6 second address: D0C3EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnl 00007F782D2A3096h 0x0000000e jno 00007F782D2A3096h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D0C3EA second address: D0C3F0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D0C3F0 second address: D0C404 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F782D2A309Eh 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D0C404 second address: D0C412 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782CBDBD6Ah 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D06E28 second address: D06E2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D06E2C second address: D06E34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D06E34 second address: D06E4F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782D2A30A5h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D1AE15 second address: D1AE19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D1AE19 second address: D1AE1D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D1AE1D second address: D1AE27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D1AE27 second address: D1AE2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D1AE2D second address: D1AE31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D30F97 second address: D30F9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D30F9B second address: D30F9F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D30F9F second address: D30FA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D30FA5 second address: D30FB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnc 00007F782CBDBD68h 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D30FB6 second address: D30FC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b jnc 00007F782D2A3096h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D31149 second address: D3114D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D3114D second address: D31153 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D31153 second address: D3115F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007F782CBDBD66h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D31592 second address: D3159C instructions: 0x00000000 rdtsc 0x00000002 jno 00007F782D2A3096h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D3159C second address: D315AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jc 00007F782CBDBD6Eh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D31B64 second address: D31B6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D31B6A second address: D31B75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push edx 0x0000000a pop edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D31B75 second address: D31B79 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D34ACB second address: D34AD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D34AD0 second address: D34ADA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F782D2A3096h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D34ADA second address: D34B23 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c jmp 00007F782CBDBD75h 0x00000011 mov eax, dword ptr [eax] 0x00000013 jp 00007F782CBDBD74h 0x00000019 mov dword ptr [esp+04h], eax 0x0000001d push eax 0x0000001e push edx 0x0000001f jnc 00007F782CBDBD6Ch 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D34D9E second address: D34E0B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F782D2A30A3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jns 00007F782D2A30ABh 0x00000010 nop 0x00000011 jmp 00007F782D2A30A4h 0x00000016 push dword ptr [ebp+122D3662h] 0x0000001c call 00007F782D2A309Ah 0x00000021 jnc 00007F782D2A3099h 0x00000027 pop edx 0x00000028 push 061FEA05h 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 popad 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D34E0B second address: D34E11 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\RUUSfr6dVm.exe | RDTSC instruction interceptor: First address: D3973E second address: D39742 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |