Source: hx0wBsOjkQ.exe, 00000000.00000003.1566258618.00000000057FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1566258618.00000000057FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1566258618.00000000057FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1566258618.00000000057FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1566258618.00000000057FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1566258618.00000000057FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1566258618.00000000057FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1566258618.00000000057FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1566258618.00000000057FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495487358.0000000000DFE000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1517261667.0000000000E6B000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495487358.0000000000DFE000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1517261667.0000000000E6B000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495487358.0000000000DFE000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1517261667.0000000000E6B000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1566258618.00000000057FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1566258618.00000000057FE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1519093027.00000000057FC000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1518843947.00000000057FF000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1518974641.00000000057FC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1592981595.00000000057D3000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1591591909.00000000057D3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1592981595.00000000057D3000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1591591909.00000000057D3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&cta |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1599230927.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1626918311.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cashfuzysao.buzz:443/api |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1519093027.00000000057FC000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1518843947.00000000057FF000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1518974641.00000000057FC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1519093027.00000000057FC000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1518843947.00000000057FF000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1518974641.00000000057FC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1519093027.00000000057FC000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1518843947.00000000057FF000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1518974641.00000000057FC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495487358.0000000000DFE000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap& |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1626755261.0000000000E61000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1643372396.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1599170541.0000000000E5A000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1643550627.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000002.1673905575.0000000000E61000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1599605647.0000000000E61000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1623931109.0000000000E5C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/imag |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495487358.0000000000DFE000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495487358.0000000000DFE000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1517261667.0000000000E6B000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495487358.0000000000DFE000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495487358.0000000000DFE000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495487358.0000000000DFE000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=FRRi |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=oOCAGrkRfpQ6&l=e |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1592981595.00000000057D3000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1591591909.00000000057D3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1592981595.00000000057D3000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1591591909.00000000057D3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1519093027.00000000057FC000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1518843947.00000000057FF000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1518974641.00000000057FC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1519093027.00000000057FC000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1518843947.00000000057FF000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1518974641.00000000057FC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1519093027.00000000057FC000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1518843947.00000000057FF000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1518974641.00000000057FC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://hummskitnj.buzz:443/api |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1591591909.00000000057D3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1593068809.00000000057C1000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1566379520.00000000057C1000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1599605647.0000000000E61000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495521986.0000000000E20000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495218913.0000000000E20000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DE8000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1623931109.0000000000E5C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/ |
Source: hx0wBsOjkQ.exe, 00000000.00000002.1673905575.0000000000E61000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/9 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495218913.0000000000E20000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1643372396.0000000000E72000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1566708973.00000000057D7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1567527406.00000000057D7000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1565923725.00000000057D4000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1566258618.00000000057D4000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1566708973.00000000057D7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apiaLxz |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1517343643.0000000000E20000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apill |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1517343643.0000000000E20000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apipt |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1672980605.0000000000E72000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1643550627.0000000000E72000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000002.1673929346.0000000000E72000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1643372396.0000000000E72000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apis |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/m/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1626755261.0000000000E61000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1643372396.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1643550627.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495521986.0000000000E20000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495218913.0000000000E20000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1623931109.0000000000E5C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/pi |
Source: hx0wBsOjkQ.exe, 00000000.00000002.1673905575.0000000000E61000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/piA |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1626918311.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com:443/api |
Source: hx0wBsOjkQ.exe, 00000000.00000002.1673742160.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1599230927.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1672776832.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1626918311.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com:443/apirofiles/76561199724331900 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://prisonyfork.buzz:443/apia |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://scentniej.buzz:443/api |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495487358.0000000000DFE000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1517261667.0000000000E6B000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495487358.0000000000DFE000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1626755261.0000000000E61000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1643372396.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1599170541.0000000000E5A000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1643550627.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495487358.0000000000DFE000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1517261667.0000000000E6B000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1599605647.0000000000E61000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1623931109.0000000000E5C000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com:443/profiles/76561199724331900 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495405618.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495301417.0000000000DF3000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495487358.0000000000DFE000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1517261667.0000000000E6B000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1567544621.00000000058E3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1567544621.00000000058E3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1592981595.00000000057D3000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1591591909.00000000057D3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15e498ec2b39921665a1fbc954bff40a8106629178eadc64 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1519093027.00000000057FC000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1518843947.00000000057FF000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1518974641.00000000057FC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1519093027.00000000057FC000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1518843947.00000000057FF000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1518974641.00000000057FC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1592981595.00000000057D3000.00000004.00000800.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1591591909.00000000057D3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.marriott.com/default.mi?utm_source=admarketplace&utm_medium=cpc&utm_campaign=Marriott_Pr |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1567544621.00000000058E3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.d-GHL1OW1fkT |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1567544621.00000000058E3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.sYEKgG4Or0s6 |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1567544621.00000000058E3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1567544621.00000000058E3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1567544621.00000000058E3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: hx0wBsOjkQ.exe, 00000000.00000003.1495388507.0000000000E63000.00000004.00000020.00020000.00000000.sdmp, hx0wBsOjkQ.exe, 00000000.00000003.1495179656.0000000000E5D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_003EB100 | 0_2_003EB100 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_003F1227 | 0_2_003F1227 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00419280 | 0_2_00419280 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0040D34A | 0_2_0040D34A |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00407440 | 0_2_00407440 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00420460 | 0_2_00420460 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0041C5A0 | 0_2_0041C5A0 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_003E8600 | 0_2_003E8600 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_003EE687 | 0_2_003EE687 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_003F57C0 | 0_2_003F57C0 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_003F1D2B | 0_2_003F1D2B |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00401D00 | 0_2_00401D00 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00420D20 | 0_2_00420D20 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00418EA0 | 0_2_00418EA0 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004AE04E | 0_2_004AE04E |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0045F056 | 0_2_0045F056 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004A805F | 0_2_004A805F |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_003ED021 | 0_2_003ED021 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0046B067 | 0_2_0046B067 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0044C066 | 0_2_0044C066 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0049C06C | 0_2_0049C06C |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0044106B | 0_2_0044106B |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00483067 | 0_2_00483067 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004D007C | 0_2_004D007C |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004BE072 | 0_2_004BE072 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004DB074 | 0_2_004DB074 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_003FD003 | 0_2_003FD003 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004C9071 | 0_2_004C9071 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00456011 | 0_2_00456011 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0047801D | 0_2_0047801D |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004CB013 | 0_2_004CB013 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004B2021 | 0_2_004B2021 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00491025 | 0_2_00491025 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004AC033 | 0_2_004AC033 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004D8034 | 0_2_004D8034 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0047C03D | 0_2_0047C03D |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0059E0D0 | 0_2_0059E0D0 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004D50C4 | 0_2_004D50C4 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0040A0CA | 0_2_0040A0CA |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004AD0C6 | 0_2_004AD0C6 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004940C7 | 0_2_004940C7 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004C60DC | 0_2_004C60DC |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004C50EC | 0_2_004C50EC |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0044E0E5 | 0_2_0044E0E5 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0040C0E6 | 0_2_0040C0E6 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004AA0E3 | 0_2_004AA0E3 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004A50FE | 0_2_004A50FE |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0044A0FE | 0_2_0044A0FE |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004CE08C | 0_2_004CE08C |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0048408A | 0_2_0048408A |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_003F60E9 | 0_2_003F60E9 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0049D09F | 0_2_0049D09F |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0048F090 | 0_2_0048F090 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0040C09E | 0_2_0040C09E |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004D70B6 | 0_2_004D70B6 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0046D0BB | 0_2_0046D0BB |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00480147 | 0_2_00480147 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00457150 | 0_2_00457150 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004A015D | 0_2_004A015D |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004CC15B | 0_2_004CC15B |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00486153 | 0_2_00486153 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0040C09E | 0_2_0040C09E |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0044610A | 0_2_0044610A |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004BA104 | 0_2_004BA104 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00465116 | 0_2_00465116 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0047B112 | 0_2_0047B112 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_003F8169 | 0_2_003F8169 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0047111A | 0_2_0047111A |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_003E6160 | 0_2_003E6160 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00492117 | 0_2_00492117 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004CD138 | 0_2_004CD138 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00443139 | 0_2_00443139 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004B8135 | 0_2_004B8135 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0047E1CE | 0_2_0047E1CE |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004081CC | 0_2_004081CC |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0048E1DC | 0_2_0048E1DC |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004A11E9 | 0_2_004A11E9 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004491ED | 0_2_004491ED |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004CE1F7 | 0_2_004CE1F7 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0040E180 | 0_2_0040E180 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004BD183 | 0_2_004BD183 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0047918E | 0_2_0047918E |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004CA185 | 0_2_004CA185 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0041F18B | 0_2_0041F18B |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004DD19F | 0_2_004DD19F |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004C41AD | 0_2_004C41AD |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0045D1A0 | 0_2_0045D1A0 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004451AD | 0_2_004451AD |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004751AE | 0_2_004751AE |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004091AE | 0_2_004091AE |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004B31B5 | 0_2_004B31B5 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0045C244 | 0_2_0045C244 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00473241 | 0_2_00473241 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_003FE220 | 0_2_003FE220 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004B7269 | 0_2_004B7269 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0044D262 | 0_2_0044D262 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0048727A | 0_2_0048727A |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0046F272 | 0_2_0046F272 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0049C27C | 0_2_0049C27C |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004C327A | 0_2_004C327A |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0058E211 | 0_2_0058E211 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004D2207 | 0_2_004D2207 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_003E4270 | 0_2_003E4270 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0049F206 | 0_2_0049F206 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00468216 | 0_2_00468216 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0048022B | 0_2_0048022B |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004A6225 | 0_2_004A6225 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0049823F | 0_2_0049823F |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0044823B | 0_2_0044823B |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004892CC | 0_2_004892CC |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004C82CA | 0_2_004C82CA |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004042D0 | 0_2_004042D0 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_006602F5 | 0_2_006602F5 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004BC2F3 | 0_2_004BC2F3 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00470285 | 0_2_00470285 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00462280 | 0_2_00462280 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0046729B | 0_2_0046729B |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004582B3 | 0_2_004582B3 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00401340 | 0_2_00401340 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0059435F | 0_2_0059435F |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0049B341 | 0_2_0049B341 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004E0344 | 0_2_004E0344 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004B035B | 0_2_004B035B |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004D435C | 0_2_004D435C |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004A2359 | 0_2_004A2359 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004D1356 | 0_2_004D1356 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0048836D | 0_2_0048836D |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_003E9310 | 0_2_003E9310 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0040F377 | 0_2_0040F377 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0045A314 | 0_2_0045A314 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0044F313 | 0_2_0044F313 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0046C336 | 0_2_0046C336 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004593CE | 0_2_004593CE |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004083D8 | 0_2_004083D8 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004DC3EE | 0_2_004DC3EE |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0044B3E8 | 0_2_0044B3E8 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004B938C | 0_2_004B938C |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004AC383 | 0_2_004AC383 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004C239C | 0_2_004C239C |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_003E73D0 | 0_2_003E73D0 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004AB3BB | 0_2_004AB3BB |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004373B4 | 0_2_004373B4 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004D33B7 | 0_2_004D33B7 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_003EF3C0 | 0_2_003EF3C0 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004DA3B3 | 0_2_004DA3B3 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0041A440 | 0_2_0041A440 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0046B444 | 0_2_0046B444 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004DE442 | 0_2_004DE442 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0046D466 | 0_2_0046D466 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004C6465 | 0_2_004C6465 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004AA47B | 0_2_004AA47B |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_003F747D | 0_2_003F747D |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0049C400 | 0_2_0049C400 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0048C405 | 0_2_0048C405 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00463412 | 0_2_00463412 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004DF415 | 0_2_004DF415 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0046941D | 0_2_0046941D |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0044441B | 0_2_0044441B |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0049D42B | 0_2_0049D42B |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00453426 | 0_2_00453426 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0048D426 | 0_2_0048D426 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00441437 | 0_2_00441437 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004D9439 | 0_2_004D9439 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0049443E | 0_2_0049443E |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004974CD | 0_2_004974CD |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004004C6 | 0_2_004004C6 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004554C9 | 0_2_004554C9 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004024E0 | 0_2_004024E0 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004434E5 | 0_2_004434E5 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004D44E9 | 0_2_004D44E9 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004544EA | 0_2_004544EA |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004C44F1 | 0_2_004C44F1 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004AD4F5 | 0_2_004AD4F5 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0048448C | 0_2_0048448C |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004DB481 | 0_2_004DB481 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_003ED4F3 | 0_2_003ED4F3 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004AE487 | 0_2_004AE487 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00483498 | 0_2_00483498 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004CD498 | 0_2_004CD498 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0045B493 | 0_2_0045B493 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0047B4A7 | 0_2_0047B4A7 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00456545 | 0_2_00456545 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004BE54F | 0_2_004BE54F |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004A1542 | 0_2_004A1542 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00461551 | 0_2_00461551 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0047F55D | 0_2_0047F55D |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004B6551 | 0_2_004B6551 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0046E558 | 0_2_0046E558 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00404560 | 0_2_00404560 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0048F568 | 0_2_0048F568 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004BF564 | 0_2_004BF564 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0044A574 | 0_2_0044A574 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_00467570 | 0_2_00467570 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_004D0574 | 0_2_004D0574 |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | Code function: 0_2_0047057D | 0_2_0047057D |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 597396 second address: 59739A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 59739A second address: 5973A4 instructions: 0x00000000 rdtsc 0x00000002 je 00007FB9E4B29216h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5973A4 second address: 5973B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 js 00007FB9E5277416h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5973B2 second address: 5973B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A339E second address: 5A33A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A33A2 second address: 5A33AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 pushad 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A33AF second address: 5A33D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB9E5277423h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e jo 00007FB9E5277416h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A33D1 second address: 5A33EC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B29223h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A33EC second address: 5A340E instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jmp 00007FB9E5277425h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push edx 0x0000000f pop edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A3547 second address: 5A354B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A354B second address: 5A354F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A5074 second address: 5A5078 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A5078 second address: 5A50B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FB9E5277427h 0x0000000e pop edx 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FB9E5277428h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A50B7 second address: 5A50D9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B29220h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push esi 0x0000000f pop esi 0x00000010 jne 00007FB9E4B29216h 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A50D9 second address: 5A518E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E527741Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d pushad 0x0000000e jmp 00007FB9E527741Bh 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 pushad 0x00000017 popad 0x00000018 popad 0x00000019 popad 0x0000001a pop eax 0x0000001b cld 0x0000001c push 00000003h 0x0000001e mov cl, ah 0x00000020 push 00000000h 0x00000022 push 00000000h 0x00000024 push ebp 0x00000025 call 00007FB9E5277418h 0x0000002a pop ebp 0x0000002b mov dword ptr [esp+04h], ebp 0x0000002f add dword ptr [esp+04h], 0000001Bh 0x00000037 inc ebp 0x00000038 push ebp 0x00000039 ret 0x0000003a pop ebp 0x0000003b ret 0x0000003c cmc 0x0000003d push 00000003h 0x0000003f call 00007FB9E5277425h 0x00000044 jmp 00007FB9E527741Eh 0x00000049 pop esi 0x0000004a push 51894635h 0x0000004f jmp 00007FB9E527741Ah 0x00000054 add dword ptr [esp], 6E76B9CBh 0x0000005b mov edx, dword ptr [ebp+122D2C53h] 0x00000061 lea ebx, dword ptr [ebp+1243FEAAh] 0x00000067 pushad 0x00000068 xor cl, 0000000Dh 0x0000006b clc 0x0000006c popad 0x0000006d xchg eax, ebx 0x0000006e push eax 0x0000006f push edx 0x00000070 jmp 00007FB9E5277422h 0x00000075 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A518E second address: 5A5193 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A5249 second address: 5A52A8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007FB9E527741Fh 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d jmp 00007FB9E5277429h 0x00000012 pushad 0x00000013 jnp 00007FB9E5277416h 0x00000019 push esi 0x0000001a pop esi 0x0000001b popad 0x0000001c popad 0x0000001d nop 0x0000001e mov dword ptr [ebp+122D2219h], esi 0x00000024 push 00000000h 0x00000026 call 00007FB9E527741Bh 0x0000002b xor di, C03Dh 0x00000030 pop esi 0x00000031 push E172C01Ah 0x00000036 push ecx 0x00000037 push eax 0x00000038 push edx 0x00000039 pushad 0x0000003a popad 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A52A8 second address: 5A5336 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 add dword ptr [esp], 1E8D4066h 0x0000000e mov ecx, dword ptr [ebp+122D279Ah] 0x00000014 push 00000003h 0x00000016 pushad 0x00000017 mov bh, ah 0x00000019 or di, B5A5h 0x0000001e popad 0x0000001f push 00000000h 0x00000021 push 00000000h 0x00000023 push edx 0x00000024 call 00007FB9E4B29218h 0x00000029 pop edx 0x0000002a mov dword ptr [esp+04h], edx 0x0000002e add dword ptr [esp+04h], 0000001Bh 0x00000036 inc edx 0x00000037 push edx 0x00000038 ret 0x00000039 pop edx 0x0000003a ret 0x0000003b mov dword ptr [ebp+122D3383h], eax 0x00000041 push 00000003h 0x00000043 push 00000000h 0x00000045 push edi 0x00000046 call 00007FB9E4B29218h 0x0000004b pop edi 0x0000004c mov dword ptr [esp+04h], edi 0x00000050 add dword ptr [esp+04h], 00000017h 0x00000058 inc edi 0x00000059 push edi 0x0000005a ret 0x0000005b pop edi 0x0000005c ret 0x0000005d jmp 00007FB9E4B29224h 0x00000062 push 45BBB7CDh 0x00000067 push eax 0x00000068 push edx 0x00000069 push edi 0x0000006a jnl 00007FB9E4B29216h 0x00000070 pop edi 0x00000071 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A5336 second address: 5A5347 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB9E527741Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A5448 second address: 5A544C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A544C second address: 5A5486 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b jmp 00007FB9E5277427h 0x00000010 jmp 00007FB9E5277427h 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A5486 second address: 5A5490 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FB9E4B2921Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A5490 second address: 5A5515 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 nop 0x00000007 js 00007FB9E527741Ch 0x0000000d mov edi, dword ptr [ebp+122D27CEh] 0x00000013 push 00000000h 0x00000015 mov dword ptr [ebp+122D2244h], eax 0x0000001b push 99AB6461h 0x00000020 jmp 00007FB9E527741Ch 0x00000025 add dword ptr [esp], 66549C1Fh 0x0000002c push 00000000h 0x0000002e push ebx 0x0000002f call 00007FB9E5277418h 0x00000034 pop ebx 0x00000035 mov dword ptr [esp+04h], ebx 0x00000039 add dword ptr [esp+04h], 0000001Bh 0x00000041 inc ebx 0x00000042 push ebx 0x00000043 ret 0x00000044 pop ebx 0x00000045 ret 0x00000046 mov dword ptr [ebp+122D1C2Dh], eax 0x0000004c push 00000003h 0x0000004e mov ecx, 432D7525h 0x00000053 push 00000000h 0x00000055 and cx, 8EC4h 0x0000005a mov di, 777Bh 0x0000005e push 00000003h 0x00000060 mov dh, D9h 0x00000062 push 84253BD7h 0x00000067 push eax 0x00000068 push edx 0x00000069 je 00007FB9E527741Ch 0x0000006f jns 00007FB9E5277416h 0x00000075 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A5515 second address: 5A555D instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xor dword ptr [esp], 44253BD7h 0x0000000f ja 00007FB9E4B2921Ch 0x00000015 mov dword ptr [ebp+122D1860h], esi 0x0000001b lea ebx, dword ptr [ebp+1243FEBEh] 0x00000021 jmp 00007FB9E4B29229h 0x00000026 mov dh, 3Eh 0x00000028 xchg eax, ebx 0x00000029 push eax 0x0000002a push edx 0x0000002b push eax 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A555D second address: 5A5562 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A5562 second address: 5A5578 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB9E4B29221h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A5578 second address: 5A5585 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A5585 second address: 5A558A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5A558A second address: 5A558F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 59C37A second address: 59C390 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jbe 00007FB9E4B29216h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jp 00007FB9E4B29216h 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 59C390 second address: 59C39B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 js 00007FB9E5277416h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C54A1 second address: 5C54DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FB9E4B29229h 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jnl 00007FB9E4B29228h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C55FE second address: 5C561D instructions: 0x00000000 rdtsc 0x00000002 js 00007FB9E5277422h 0x00000008 js 00007FB9E5277416h 0x0000000e jo 00007FB9E5277416h 0x00000014 pop edx 0x00000015 pop eax 0x00000016 push esi 0x00000017 push eax 0x00000018 push edx 0x00000019 jne 00007FB9E5277416h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C561D second address: 5C5637 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B29220h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C57C2 second address: 5C57C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C57C6 second address: 5C57EF instructions: 0x00000000 rdtsc 0x00000002 jne 00007FB9E4B29216h 0x00000008 jmp 00007FB9E4B29224h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f ja 00007FB9E4B29218h 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C5A9D second address: 5C5AA9 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FB9E527741Eh 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C5DBA second address: 5C5DBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C5DBE second address: 5C5DCE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E527741Ch 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C60B9 second address: 5C60BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C60BF second address: 5C60C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C60C3 second address: 5C60C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C6244 second address: 5C6298 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jnc 00007FB9E5277416h 0x0000000b jng 00007FB9E5277416h 0x00000011 pushad 0x00000012 popad 0x00000013 jmp 00007FB9E527741Ah 0x00000018 popad 0x00000019 pushad 0x0000001a jmp 00007FB9E5277422h 0x0000001f jnc 00007FB9E5277416h 0x00000025 jmp 00007FB9E5277427h 0x0000002a popad 0x0000002b pushad 0x0000002c pushad 0x0000002d popad 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C63D4 second address: 5C63E7 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jbe 00007FB9E4B2923Ah 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C63E7 second address: 5C63F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FB9E5277416h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C63F8 second address: 5C63FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C63FC second address: 5C6400 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5BB9E6 second address: 5BB9F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jbe 00007FB9E4B2921Eh 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5BB9F6 second address: 5BBA2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 pop edx 0x00000008 pushad 0x00000009 popad 0x0000000a pop eax 0x0000000b jmp 00007FB9E5277429h 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FB9E5277420h 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5BBA2E second address: 5BBA32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C6CA0 second address: 5C6CAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FB9E5277416h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C9939 second address: 5C9941 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5C9941 second address: 5C994C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5CE679 second address: 5CE67D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5CE67D second address: 5CE683 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5CE683 second address: 5CE6A7 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FB9E4B29226h 0x00000008 jmp 00007FB9E4B29220h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 pushad 0x00000017 popad 0x00000018 pop eax 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5CE6A7 second address: 5CE6D0 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a pushad 0x0000000b push edi 0x0000000c pushad 0x0000000d popad 0x0000000e pop edi 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FB9E5277428h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5CD04F second address: 5CD05E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 jg 00007FB9E4B29216h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5CD05E second address: 5CD062 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5CFC89 second address: 5CFC9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 jc 00007FB9E4B29222h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5CFC9A second address: 5CFCA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D39ED second address: 5D3A07 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB9E4B29226h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D3A07 second address: 5D3A16 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D3A16 second address: 5D3A1C instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D3A1C second address: 5D3A47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FB9E5277427h 0x0000000b jl 00007FB9E5277422h 0x00000011 jnc 00007FB9E5277416h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 593E1F second address: 593E56 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B2921Dh 0x00000007 jmp 00007FB9E4B29223h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 jmp 00007FB9E4B2921Ch 0x00000017 pushad 0x00000018 popad 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 593E56 second address: 593E73 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB9E5277427h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 593E73 second address: 593E77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D2EF0 second address: 5D2F06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FB9E5277421h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D3172 second address: 5D319B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jmp 00007FB9E4B29224h 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FB9E4B2921Eh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D35AB second address: 5D35BB instructions: 0x00000000 rdtsc 0x00000002 jne 00007FB9E5277416h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D35BB second address: 5D35C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D35C1 second address: 5D35C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D35C5 second address: 5D35F5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007FB9E4B29223h 0x0000000c jmp 00007FB9E4B2921Dh 0x00000011 push edx 0x00000012 ja 00007FB9E4B29216h 0x00000018 pop edx 0x00000019 pushad 0x0000001a jmp 00007FB9E4B2921Ah 0x0000001f push eax 0x00000020 pop eax 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D372E second address: 5D3734 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D3734 second address: 5D3738 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D9476 second address: 5D947A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D947A second address: 5D94B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 jnp 00007FB9E4B29224h 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 pushad 0x00000013 push esi 0x00000014 jmp 00007FB9E4B29222h 0x00000019 pop esi 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D94B2 second address: 5D94C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FB9E5277416h 0x0000000a popad 0x0000000b popad 0x0000000c mov eax, dword ptr [eax] 0x0000000e push eax 0x0000000f push edx 0x00000010 push ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D94C5 second address: 5D94CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D94CA second address: 5D94F0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E5277422h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d pushad 0x0000000e jno 00007FB9E5277418h 0x00000014 push edi 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D94F0 second address: 5D9570 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 pop eax 0x00000007 push 00000000h 0x00000009 push esi 0x0000000a call 00007FB9E4B29218h 0x0000000f pop esi 0x00000010 mov dword ptr [esp+04h], esi 0x00000014 add dword ptr [esp+04h], 00000018h 0x0000001c inc esi 0x0000001d push esi 0x0000001e ret 0x0000001f pop esi 0x00000020 ret 0x00000021 mov esi, dword ptr [ebp+122D2182h] 0x00000027 mov si, 5E00h 0x0000002b call 00007FB9E4B29219h 0x00000030 jmp 00007FB9E4B2921Ah 0x00000035 push eax 0x00000036 js 00007FB9E4B29229h 0x0000003c push ecx 0x0000003d jmp 00007FB9E4B29221h 0x00000042 pop ecx 0x00000043 mov eax, dword ptr [esp+04h] 0x00000047 push eax 0x00000048 push edx 0x00000049 pushad 0x0000004a jmp 00007FB9E4B29229h 0x0000004f push eax 0x00000050 push edx 0x00000051 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D9570 second address: 5D9575 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D9575 second address: 5D9588 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jl 00007FB9E4B29216h 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D9588 second address: 5D958C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D9899 second address: 5D989E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D989E second address: 5D98A5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D9BBA second address: 5D9BC1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5DA23E second address: 5DA249 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FB9E5277416h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5DA444 second address: 5DA448 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5DA448 second address: 5DA44C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5DA568 second address: 5DA56E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5DA5ED second address: 5DA5FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a jng 00007FB9E5277416h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5DA5FD second address: 5DA601 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5DB6E7 second address: 5DB6EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5DB6EC second address: 5DB6FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 jnp 00007FB9E4B2921Ch 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5DB542 second address: 5DB560 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 jl 00007FB9E5277416h 0x0000000c je 00007FB9E5277416h 0x00000012 popad 0x00000013 popad 0x00000014 push eax 0x00000015 jg 00007FB9E527741Eh 0x0000001b push esi 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5DE6B8 second address: 5DE6BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5DF205 second address: 5DF20A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5DDA08 second address: 5DDA12 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FB9E4B2921Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5DF20A second address: 5DF249 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a mov edi, dword ptr [ebp+122D2A06h] 0x00000010 push 00000000h 0x00000012 mov dword ptr [ebp+122D37DEh], edx 0x00000018 push 00000000h 0x0000001a je 00007FB9E527741Ch 0x00000020 or dword ptr [ebp+1245A060h], edx 0x00000026 mov dword ptr [ebp+122D3349h], esi 0x0000002c push eax 0x0000002d push eax 0x0000002e push edx 0x0000002f jmp 00007FB9E5277420h 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5E1AF4 second address: 5E1B04 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FB9E4B29222h 0x00000008 jbe 00007FB9E4B29216h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5E2D83 second address: 5E2D87 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5E58BC second address: 5E58D5 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007FB9E4B2921Ch 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f pushad 0x00000010 popad 0x00000011 pop esi 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5E6791 second address: 5E6796 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5E6796 second address: 5E679B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5E884A second address: 5E8850 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5E797D second address: 5E7981 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5E7981 second address: 5E7985 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5EAA56 second address: 5EAA5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5EC9A4 second address: 5ECA0D instructions: 0x00000000 rdtsc 0x00000002 jno 00007FB9E5277416h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c mov dword ptr [ebp+1245AD0Fh], ebx 0x00000012 and di, 0868h 0x00000017 push 00000000h 0x00000019 push 00000000h 0x0000001b push ebx 0x0000001c call 00007FB9E5277418h 0x00000021 pop ebx 0x00000022 mov dword ptr [esp+04h], ebx 0x00000026 add dword ptr [esp+04h], 00000014h 0x0000002e inc ebx 0x0000002f push ebx 0x00000030 ret 0x00000031 pop ebx 0x00000032 ret 0x00000033 mov di, E282h 0x00000037 mov ebx, dword ptr [ebp+122D2203h] 0x0000003d push 00000000h 0x0000003f push 00000000h 0x00000041 push ebp 0x00000042 call 00007FB9E5277418h 0x00000047 pop ebp 0x00000048 mov dword ptr [esp+04h], ebp 0x0000004c add dword ptr [esp+04h], 00000014h 0x00000054 inc ebp 0x00000055 push ebp 0x00000056 ret 0x00000057 pop ebp 0x00000058 ret 0x00000059 sub ebx, 1C389EACh 0x0000005f push eax 0x00000060 pushad 0x00000061 push eax 0x00000062 push edx 0x00000063 push eax 0x00000064 pop eax 0x00000065 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5ECA0D second address: 5ECA11 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5ED9FE second address: 5EDA08 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FB9E5277416h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5EE8A9 second address: 5EE8AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5EE8AF second address: 5EE8B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5EE8B3 second address: 5EE955 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B29221h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007FB9E4B2921Bh 0x00000011 nop 0x00000012 push 00000000h 0x00000014 push eax 0x00000015 call 00007FB9E4B29218h 0x0000001a pop eax 0x0000001b mov dword ptr [esp+04h], eax 0x0000001f add dword ptr [esp+04h], 0000001Bh 0x00000027 inc eax 0x00000028 push eax 0x00000029 ret 0x0000002a pop eax 0x0000002b ret 0x0000002c add di, E39Ch 0x00000031 push 00000000h 0x00000033 push 00000000h 0x00000035 push eax 0x00000036 call 00007FB9E4B29218h 0x0000003b pop eax 0x0000003c mov dword ptr [esp+04h], eax 0x00000040 add dword ptr [esp+04h], 0000001Dh 0x00000048 inc eax 0x00000049 push eax 0x0000004a ret 0x0000004b pop eax 0x0000004c ret 0x0000004d je 00007FB9E4B2921Ch 0x00000053 xor dword ptr [ebp+1245A09Eh], esi 0x00000059 push 00000000h 0x0000005b mov edi, 761D5FD5h 0x00000060 push eax 0x00000061 pushad 0x00000062 push eax 0x00000063 push edx 0x00000064 jmp 00007FB9E4B29228h 0x00000069 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5F0A0C second address: 5F0A20 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB9E5277420h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5F0A20 second address: 5F0A60 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FB9E4B29216h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d jnc 00007FB9E4B29219h 0x00000013 push 00000000h 0x00000015 push esi 0x00000016 mov dword ptr [ebp+122D1E7Fh], edx 0x0000001c pop ebx 0x0000001d push 00000000h 0x0000001f mov edi, ebx 0x00000021 jmp 00007FB9E4B29221h 0x00000026 xchg eax, esi 0x00000027 push eax 0x00000028 push edx 0x00000029 jng 00007FB9E4B29218h 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5F0A60 second address: 5F0A7C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB9E5277428h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5F0A7C second address: 5F0AA7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B29222h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FB9E4B2921Fh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5ECC03 second address: 5ECC09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5ECC09 second address: 5ECC1C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jnc 00007FB9E4B29218h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5EFB8B second address: 5EFBA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB9E5277427h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5F1B29 second address: 5F1B53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jne 00007FB9E4B2921Ch 0x0000000b popad 0x0000000c push eax 0x0000000d jng 00007FB9E4B2922Dh 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FB9E4B2921Fh 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5F1B53 second address: 5F1BA6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 nop 0x00000007 sub dword ptr [ebp+122D222Ah], edi 0x0000000d push 00000000h 0x0000000f sub ebx, dword ptr [ebp+122D29DAh] 0x00000015 push 00000000h 0x00000017 push 00000000h 0x00000019 push eax 0x0000001a call 00007FB9E5277418h 0x0000001f pop eax 0x00000020 mov dword ptr [esp+04h], eax 0x00000024 add dword ptr [esp+04h], 0000001Ch 0x0000002c inc eax 0x0000002d push eax 0x0000002e ret 0x0000002f pop eax 0x00000030 ret 0x00000031 sub bl, FFFFFFD4h 0x00000034 push eax 0x00000035 pushad 0x00000036 jmp 00007FB9E5277420h 0x0000003b pushad 0x0000003c push eax 0x0000003d push edx 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5F0C07 second address: 5F0C88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a popad 0x0000000b nop 0x0000000c jp 00007FB9E4B29216h 0x00000012 push dword ptr fs:[00000000h] 0x00000019 push 00000000h 0x0000001b push eax 0x0000001c call 00007FB9E4B29218h 0x00000021 pop eax 0x00000022 mov dword ptr [esp+04h], eax 0x00000026 add dword ptr [esp+04h], 00000018h 0x0000002e inc eax 0x0000002f push eax 0x00000030 ret 0x00000031 pop eax 0x00000032 ret 0x00000033 xor di, EE00h 0x00000038 mov dword ptr fs:[00000000h], esp 0x0000003f push 00000000h 0x00000041 push ebp 0x00000042 call 00007FB9E4B29218h 0x00000047 pop ebp 0x00000048 mov dword ptr [esp+04h], ebp 0x0000004c add dword ptr [esp+04h], 0000001Ah 0x00000054 inc ebp 0x00000055 push ebp 0x00000056 ret 0x00000057 pop ebp 0x00000058 ret 0x00000059 mov bh, 6Ah 0x0000005b mov eax, dword ptr [ebp+122D1221h] 0x00000061 mov bh, ch 0x00000063 push FFFFFFFFh 0x00000065 movsx ebx, bx 0x00000068 nop 0x00000069 push eax 0x0000006a push edx 0x0000006b jns 00007FB9E4B29218h 0x00000071 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5F0C88 second address: 5F0C92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007FB9E5277416h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5F0C92 second address: 5F0CC8 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FB9E4B29216h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jmp 00007FB9E4B29225h 0x00000015 jmp 00007FB9E4B29220h 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 595995 second address: 5959B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FB9E5277422h 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5959B2 second address: 5959BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FB9E4B29216h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5959BE second address: 5959C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5959C3 second address: 5959CD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007FB9E4B29216h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5F4262 second address: 5F426C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007FB9E5277416h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5F426C second address: 5F428A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B29221h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 pop ecx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5F5384 second address: 5F538A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5F538A second address: 5F538F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5FDDD4 second address: 5FDDF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB9E527741Bh 0x00000009 pop ebx 0x0000000a jmp 00007FB9E5277420h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5FDDF4 second address: 5FDE08 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FB9E4B29218h 0x00000008 push eax 0x00000009 push edx 0x0000000a ja 00007FB9E4B29216h 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5FDE08 second address: 5FDE25 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jbe 00007FB9E527741Eh 0x0000000f push eax 0x00000010 push edx 0x00000011 push esi 0x00000012 pop esi 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5FDE25 second address: 5FDE29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5FE2B2 second address: 5FE2BE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5FE2BE second address: 5FE2C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5FE2C4 second address: 5FE2C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5FE2C8 second address: 5FE329 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B29228h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jg 00007FB9E4B29216h 0x00000010 jmp 00007FB9E4B2921Ah 0x00000015 jo 00007FB9E4B29216h 0x0000001b jmp 00007FB9E4B2921Ah 0x00000020 popad 0x00000021 popad 0x00000022 jo 00007FB9E4B2924Ah 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007FB9E4B29228h 0x0000002f pushad 0x00000030 popad 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5FE329 second address: 5FE32D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5FE32D second address: 5FE33D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007FB9E4B2921Eh 0x0000000c push esi 0x0000000d pop esi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60307F second address: 603084 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 603084 second address: 603089 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 603089 second address: 6030A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FB9E5277425h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6030A8 second address: 6030D5 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FB9E4B2921Ch 0x00000008 jno 00007FB9E4B29216h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 pushad 0x00000015 pushad 0x00000016 push ebx 0x00000017 pop ebx 0x00000018 pushad 0x00000019 popad 0x0000001a popad 0x0000001b pushad 0x0000001c push esi 0x0000001d pop esi 0x0000001e pushad 0x0000001f popad 0x00000020 popad 0x00000021 popad 0x00000022 mov eax, dword ptr [eax] 0x00000024 push ebx 0x00000025 push eax 0x00000026 push edx 0x00000027 je 00007FB9E4B29216h 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6032D6 second address: 6032DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6032DA second address: 6032F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 jbe 00007FB9E4B29218h 0x0000000f push esi 0x00000010 pop esi 0x00000011 push eax 0x00000012 push edx 0x00000013 jnp 00007FB9E4B29216h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6032F3 second address: 603312 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E5277421h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 603312 second address: 603319 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 603319 second address: 60333F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jg 00007FB9E5277416h 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e pushad 0x0000000f push eax 0x00000010 jmp 00007FB9E527741Dh 0x00000015 pop eax 0x00000016 push eax 0x00000017 push edx 0x00000018 jng 00007FB9E5277416h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60343F second address: 603449 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FB9E4B2921Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 603449 second address: 438963 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 xor dword ptr [esp], 4F745BB7h 0x0000000d jno 00007FB9E5277425h 0x00000013 push dword ptr [ebp+122D104Dh] 0x00000019 jmp 00007FB9E5277429h 0x0000001e call dword ptr [ebp+122D1F6Ah] 0x00000024 pushad 0x00000025 pushad 0x00000026 mov cl, 4Ch 0x00000028 sub dword ptr [ebp+122D30A0h], eax 0x0000002e popad 0x0000002f xor eax, eax 0x00000031 add dword ptr [ebp+122D30A0h], edi 0x00000037 mov edx, dword ptr [esp+28h] 0x0000003b jno 00007FB9E527742Ch 0x00000041 mov dword ptr [ebp+122D290Eh], eax 0x00000047 jmp 00007FB9E5277428h 0x0000004c mov esi, 0000003Ch 0x00000051 jmp 00007FB9E5277426h 0x00000056 jmp 00007FB9E527741Ch 0x0000005b add esi, dword ptr [esp+24h] 0x0000005f jmp 00007FB9E5277427h 0x00000064 lodsw 0x00000066 pushad 0x00000067 push eax 0x00000068 push edi 0x00000069 pop esi 0x0000006a pop esi 0x0000006b jmp 00007FB9E527741Fh 0x00000070 popad 0x00000071 cld 0x00000072 add eax, dword ptr [esp+24h] 0x00000076 sub dword ptr [ebp+122D30A0h], edi 0x0000007c mov ebx, dword ptr [esp+24h] 0x00000080 xor dword ptr [ebp+122D30A0h], esi 0x00000086 push eax 0x00000087 jo 00007FB9E5277420h 0x0000008d push eax 0x0000008e push edx 0x0000008f pushad 0x00000090 popad 0x00000091 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 609DA9 second address: 609DAD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 609DAD second address: 609DB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 609DB3 second address: 609DC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 jc 00007FB9E4B29216h 0x0000000d push eax 0x0000000e pop eax 0x0000000f pop edi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 608AEC second address: 608B32 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FB9E5277416h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jl 00007FB9E527742Eh 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 jmp 00007FB9E5277426h 0x00000017 pop edi 0x00000018 pushad 0x00000019 jmp 00007FB9E5277429h 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 608B32 second address: 608B3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6090AA second address: 6090B4 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FB9E5277416h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6090B4 second address: 6090C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007FB9E4B29216h 0x00000009 jnc 00007FB9E4B29216h 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 609206 second address: 609238 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FB9E5277423h 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e jns 00007FB9E527741Eh 0x00000014 push eax 0x00000015 push edx 0x00000016 jbe 00007FB9E5277416h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 609238 second address: 60923C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60923C second address: 609262 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FB9E5277416h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jg 00007FB9E5277416h 0x00000016 pushad 0x00000017 popad 0x00000018 jmp 00007FB9E527741Dh 0x0000001d popad 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 609262 second address: 609272 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push edx 0x00000006 pop edx 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 609272 second address: 609276 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 609692 second address: 6096AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB9E4B2921Eh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e push edx 0x0000000f pop edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6096AB second address: 6096AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 609C27 second address: 609C32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FB9E4B29216h 0x0000000a pop edi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 609C32 second address: 609C59 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FB9E527741Ch 0x00000008 pushad 0x00000009 jmp 00007FB9E5277426h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 609C59 second address: 609C5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60F5FF second address: 60F606 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60E060 second address: 60E078 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FB9E4B2921Ah 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f pop edx 0x00000010 push esi 0x00000011 pushad 0x00000012 popad 0x00000013 pop esi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60E078 second address: 60E07E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60E07E second address: 60E084 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60E471 second address: 60E478 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60E478 second address: 60E480 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60E480 second address: 60E4CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 jl 00007FB9E527743Eh 0x0000000d jmp 00007FB9E5277421h 0x00000012 jmp 00007FB9E5277427h 0x00000017 jp 00007FB9E527741Ch 0x0000001d pushad 0x0000001e jmp 00007FB9E527741Bh 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60E8FD second address: 60E91D instructions: 0x00000000 rdtsc 0x00000002 jng 00007FB9E4B29216h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FB9E4B29224h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60E91D second address: 60E921 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60EAC8 second address: 60EACC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60EBF4 second address: 60EBFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60EBFE second address: 60EC04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60ED4A second address: 60ED6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edi 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FB9E5277428h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60ED6B second address: 60ED6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60ED6F second address: 60ED75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60ED75 second address: 60ED83 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FB9E4B29218h 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60ED83 second address: 60ED87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 60F009 second address: 60F011 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 612C6F second address: 612C9B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E527741Bh 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007FB9E5277428h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 612C9B second address: 612CCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB9E4B29227h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f pop eax 0x00000010 jmp 00007FB9E4B2921Dh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 618364 second address: 618388 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FB9E5277416h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 pop edx 0x00000012 push edx 0x00000013 ja 00007FB9E5277416h 0x00000019 push ecx 0x0000001a pop ecx 0x0000001b pop edx 0x0000001c jbe 00007FB9E527741Ch 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 618388 second address: 618391 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 618391 second address: 6183D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FB9E5277422h 0x0000000b jng 00007FB9E5277416h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FB9E527741Ch 0x00000019 jmp 00007FB9E5277428h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6183D6 second address: 6183F4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B29220h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jl 00007FB9E4B29216h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6183F4 second address: 6183F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6183F8 second address: 618402 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 618402 second address: 618408 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 61716A second address: 617189 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007FB9E4B29226h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 61780F second address: 61781A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 61781A second address: 61782D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B2921Fh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 617B22 second address: 617B3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB9E5277426h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 617B3C second address: 617B40 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 617B40 second address: 617B5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FB9E5277416h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FB9E5277421h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6180B4 second address: 6180BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6180BF second address: 6180CB instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 61B9F0 second address: 61B9FC instructions: 0x00000000 rdtsc 0x00000002 jno 00007FB9E4B29216h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D66EA second address: 5D6739 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FB9E527741Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b mov ecx, dword ptr [ebp+122D1F73h] 0x00000011 lea eax, dword ptr [ebp+12471488h] 0x00000017 push 00000000h 0x00000019 push ebp 0x0000001a call 00007FB9E5277418h 0x0000001f pop ebp 0x00000020 mov dword ptr [esp+04h], ebp 0x00000024 add dword ptr [esp+04h], 0000001Dh 0x0000002c inc ebp 0x0000002d push ebp 0x0000002e ret 0x0000002f pop ebp 0x00000030 ret 0x00000031 or dword ptr [ebp+122D20D4h], edx 0x00000037 nop 0x00000038 push eax 0x00000039 push edx 0x0000003a push edx 0x0000003b pushad 0x0000003c popad 0x0000003d pop edx 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D6739 second address: 5D6740 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D6740 second address: 5BB9E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jmp 00007FB9E5277420h 0x0000000d nop 0x0000000e push 00000000h 0x00000010 push ecx 0x00000011 call 00007FB9E5277418h 0x00000016 pop ecx 0x00000017 mov dword ptr [esp+04h], ecx 0x0000001b add dword ptr [esp+04h], 0000001Ah 0x00000023 inc ecx 0x00000024 push ecx 0x00000025 ret 0x00000026 pop ecx 0x00000027 ret 0x00000028 mov edx, dword ptr [ebp+122D32F1h] 0x0000002e call dword ptr [ebp+122D32CFh] 0x00000034 je 00007FB9E5277432h 0x0000003a jl 00007FB9E527741Eh 0x00000040 push eax 0x00000041 push edx 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D6D21 second address: 5D6D27 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D6D27 second address: 5D6D58 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FB9E5277418h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e pushad 0x0000000f jbe 00007FB9E5277416h 0x00000015 jnp 00007FB9E5277416h 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FB9E5277423h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D6D58 second address: 438963 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FB9E4B29216h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c pushad 0x0000000d mov ax, 96C0h 0x00000011 mov ebx, dword ptr [ebp+122D1962h] 0x00000017 popad 0x00000018 adc edx, 4209E63Ch 0x0000001e push dword ptr [ebp+122D104Dh] 0x00000024 movsx edx, si 0x00000027 call dword ptr [ebp+122D1F6Ah] 0x0000002d pushad 0x0000002e pushad 0x0000002f mov cl, 4Ch 0x00000031 sub dword ptr [ebp+122D30A0h], eax 0x00000037 popad 0x00000038 xor eax, eax 0x0000003a add dword ptr [ebp+122D30A0h], edi 0x00000040 mov edx, dword ptr [esp+28h] 0x00000044 jno 00007FB9E4B2922Ch 0x0000004a mov dword ptr [ebp+122D290Eh], eax 0x00000050 jmp 00007FB9E4B29228h 0x00000055 mov esi, 0000003Ch 0x0000005a jmp 00007FB9E4B29226h 0x0000005f jmp 00007FB9E4B2921Ch 0x00000064 add esi, dword ptr [esp+24h] 0x00000068 jmp 00007FB9E4B29227h 0x0000006d lodsw 0x0000006f pushad 0x00000070 push eax 0x00000071 push edi 0x00000072 pop esi 0x00000073 pop esi 0x00000074 jmp 00007FB9E4B2921Fh 0x00000079 popad 0x0000007a cld 0x0000007b add eax, dword ptr [esp+24h] 0x0000007f sub dword ptr [ebp+122D30A0h], edi 0x00000085 mov ebx, dword ptr [esp+24h] 0x00000089 xor dword ptr [ebp+122D30A0h], esi 0x0000008f push eax 0x00000090 jo 00007FB9E4B29220h 0x00000096 push eax 0x00000097 push edx 0x00000098 pushad 0x00000099 popad 0x0000009a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D6DE4 second address: 5D6E24 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E5277428h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebx 0x0000000a xor dword ptr [esp], 0E89ABD9h 0x00000011 push F246C21Fh 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FB9E5277423h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D6E24 second address: 5D6E38 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B29220h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D6E38 second address: 5D6E3E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D7946 second address: 5D7953 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D7953 second address: 5D7958 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D7958 second address: 5D7991 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 jmp 00007FB9E4B29222h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 pushad 0x00000012 jmp 00007FB9E4B29222h 0x00000017 je 00007FB9E4B2921Ch 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D7991 second address: 5D79B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov eax, dword ptr [eax] 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FB9E5277426h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D79B0 second address: 5D79BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007FB9E4B29216h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5D7B10 second address: 5BC576 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 mov dword ptr [esp], eax 0x0000000a push esi 0x0000000b pop edx 0x0000000c call dword ptr [ebp+122D1D66h] 0x00000012 jmp 00007FB9E527741Dh 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FB9E5277425h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 61BCB2 second address: 61BCB7 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 61BF5C second address: 61BF7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FB9E5277426h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 61BF7B second address: 61BF95 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FB9E4B29216h 0x00000008 jmp 00007FB9E4B29220h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 61BF95 second address: 61BF9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 61C0D8 second address: 61C0FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FB9E4B29216h 0x0000000a ja 00007FB9E4B29216h 0x00000010 jno 00007FB9E4B29216h 0x00000016 popad 0x00000017 jnl 00007FB9E4B2921Ch 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 61C0FB second address: 61C10B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB9E527741Ah 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 61C526 second address: 61C52B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 61C52B second address: 61C533 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 621316 second address: 62131C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 623261 second address: 623266 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 623407 second address: 623418 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 js 00007FB9E4B29216h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 623418 second address: 62341C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6262DE second address: 626311 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B29225h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a jnp 00007FB9E4B29216h 0x00000010 jmp 00007FB9E4B2921Ch 0x00000015 pop esi 0x00000016 popad 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 62BC13 second address: 62BC1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 62BC1B second address: 62BC21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 62C2BD second address: 62C2E3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007FB9E5277428h 0x0000000d push eax 0x0000000e push edx 0x0000000f push ecx 0x00000010 pushad 0x00000011 popad 0x00000012 pop ecx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 62C2E3 second address: 62C2F6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B2921Ch 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 62CC21 second address: 62CC2B instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FB9E527741Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 634984 second address: 63498E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FB9E4B29216h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 634357 second address: 63435D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 63BD25 second address: 63BD36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FB9E4B29216h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 639E3E second address: 639E48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FB9E5277416h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 639E48 second address: 639E55 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FB9E4B29216h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 63A12B second address: 63A12F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 63AC6F second address: 63AC7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FB9E4B29216h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 63AC7E second address: 63AC82 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 63AC82 second address: 63AC8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FB9E4B29216h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 63AC8E second address: 63AC99 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jno 00007FB9E5277416h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 63B4BB second address: 63B4C1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 63B77E second address: 63B799 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FB9E5277416h 0x00000008 jns 00007FB9E5277416h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pop ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jno 00007FB9E5277416h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 63B799 second address: 63B79F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 63B79F second address: 63B7A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 63B7A5 second address: 63B7AE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 63FB3E second address: 63FB42 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 63FB42 second address: 63FB59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jng 00007FB9E4B2921Ch 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 63FFA4 second address: 63FFAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 63FFAF second address: 63FFB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 63FFB3 second address: 63FFB7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6400F3 second address: 640112 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edi 0x00000007 pushad 0x00000008 popad 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FB9E4B29221h 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 640112 second address: 640135 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push esi 0x00000008 pop esi 0x00000009 jmp 00007FB9E5277428h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6404F8 second address: 640519 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B2921Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e jmp 00007FB9E4B2921Dh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 645140 second address: 64516C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB9E5277427h 0x00000009 jmp 00007FB9E5277421h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 64516C second address: 64517C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a je 00007FB9E4B29216h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 64D9B2 second address: 64D9B8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 64D9B8 second address: 64D9CA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB9E4B2921Dh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 64C2B9 second address: 64C2C0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 64C438 second address: 64C453 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 jmp 00007FB9E4B29224h 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 64C6F7 second address: 64C716 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jne 00007FB9E527742Ah 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d jmp 00007FB9E5277422h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 64C716 second address: 64C725 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B2921Ah 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 64C871 second address: 64C877 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 64C877 second address: 64C896 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB9E4B29229h 0x00000009 push eax 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 654387 second address: 6543A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 jmp 00007FB9E5277421h 0x0000000c popad 0x0000000d jnp 00007FB9E527741Ch 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 653D84 second address: 653D8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 653F36 second address: 653F3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 653F3A second address: 653F5B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007FB9E4B29221h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push esi 0x0000000c push edx 0x0000000d pop edx 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 653F5B second address: 653F61 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 65F9F1 second address: 65F9F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 65F9F7 second address: 65FA53 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E5277421h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jmp 00007FB9E527741Fh 0x00000011 jmp 00007FB9E5277427h 0x00000016 jmp 00007FB9E527741Fh 0x0000001b popad 0x0000001c jno 00007FB9E527741Eh 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 65FA53 second address: 65FA6E instructions: 0x00000000 rdtsc 0x00000002 je 00007FB9E4B2922Dh 0x00000008 jmp 00007FB9E4B29221h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 65FBB4 second address: 65FBBA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 65FBBA second address: 65FBBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 65FBBE second address: 65FBC4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 65FBC4 second address: 65FBD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b jns 00007FB9E4B29216h 0x00000011 pop edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 65FBD6 second address: 65FBE8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E527741Dh 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 661EFA second address: 661EFE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 66BD1E second address: 66BD22 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 66BD22 second address: 66BD42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 pushad 0x00000008 popad 0x00000009 pop esi 0x0000000a pushad 0x0000000b jg 00007FB9E4B2921Ah 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 jg 00007FB9E4B29216h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 66BD42 second address: 66BD50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FB9E5277416h 0x0000000a popad 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 66D363 second address: 66D3A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jmp 00007FB9E4B29222h 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jmp 00007FB9E4B2921Eh 0x00000013 push esi 0x00000014 pop esi 0x00000015 jo 00007FB9E4B29216h 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e jc 00007FB9E4B29216h 0x00000024 jmp 00007FB9E4B2921Ah 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 66D3A7 second address: 66D3B3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 je 00007FB9E5277416h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 66D3B3 second address: 66D3BD instructions: 0x00000000 rdtsc 0x00000002 js 00007FB9E4B2921Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 678172 second address: 678178 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 678178 second address: 6781C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FB9E4B29229h 0x00000008 js 00007FB9E4B29216h 0x0000000e pop eax 0x0000000f jmp 00007FB9E4B2921Dh 0x00000014 pop edx 0x00000015 pop eax 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b jmp 00007FB9E4B29222h 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6781C1 second address: 6781D4 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FB9E5277416h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jnp 00007FB9E5277416h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6781D4 second address: 6781E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jnp 00007FB9E4B29216h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 67B69D second address: 67B6A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 681034 second address: 681050 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FB9E4B29222h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 681050 second address: 681054 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 681054 second address: 681076 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B29224h 0x00000007 jmp 00007FB9E4B2921Ah 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 681076 second address: 68108F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB9E5277425h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 67FA7E second address: 67FA95 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007FB9E4B2921Eh 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 67FE63 second address: 67FE6A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 68038B second address: 68038F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 68038F second address: 680393 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 680393 second address: 6803AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007FB9E4B29223h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6803AE second address: 6803B3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6803B3 second address: 6803BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 680D44 second address: 680D60 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FB9E5277426h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 683D59 second address: 683D63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FB9E4B29216h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 683D63 second address: 683D67 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 683D67 second address: 683D70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6838F9 second address: 6838FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 683A31 second address: 683A36 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 683A36 second address: 683A64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB9E5277422h 0x00000009 popad 0x0000000a pushad 0x0000000b jmp 00007FB9E527741Dh 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push edi 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6854CA second address: 6854DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B2921Ch 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6854DC second address: 6854E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6854E0 second address: 6854E4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 68F27A second address: 68F28A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 js 00007FB9E5277418h 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 69E61E second address: 69E624 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 69E624 second address: 69E635 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB9E527741Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6A39C2 second address: 6A39C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6A3605 second address: 6A360B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6B8A15 second address: 6B8A19 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6B78A8 second address: 6B78AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6B78AD second address: 6B78C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB9E4B2921Eh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6B78C1 second address: 6B78C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6B78C5 second address: 6B78D3 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007FB9E4B29235h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6B7A3E second address: 6B7A5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB9E527741Fh 0x00000009 popad 0x0000000a jc 00007FB9E527742Dh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6B7BCC second address: 6B7BF3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FB9E4B2921Fh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c jmp 00007FB9E4B29220h 0x00000011 pop ecx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6BCC8E second address: 6BCC98 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007FB9E5277416h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6BCC98 second address: 6BCCC5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B29221h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FB9E4B29222h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6BCD52 second address: 6BCD56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6BCD56 second address: 6BCD61 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007FB9E4B29216h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6BCFEA second address: 6BCFF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6BCFF0 second address: 6BD002 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6BD002 second address: 6BD006 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6BD006 second address: 6BD010 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FB9E4B29216h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6BD010 second address: 6BD043 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jno 00007FB9E5277416h 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e jmp 00007FB9E5277424h 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 pushad 0x00000018 jp 00007FB9E5277418h 0x0000001e pushad 0x0000001f popad 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 6BEAB2 second address: 6BEAB6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5DC17C second address: 5DC182 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 5DC363 second address: 5DC367 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E304D6 second address: 4E304DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E304DA second address: 4E304E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E304E0 second address: 4E304E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E304E6 second address: 4E304EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E30568 second address: 4E3056E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E3056E second address: 4E30577 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, D0C3h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E5052E second address: 4E50597 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E5277421h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jmp 00007FB9E5277427h 0x00000010 mov eax, 4990348Fh 0x00000015 popad 0x00000016 xchg eax, ebp 0x00000017 jmp 00007FB9E5277422h 0x0000001c mov ebp, esp 0x0000001e pushad 0x0000001f call 00007FB9E527741Eh 0x00000024 movzx ecx, di 0x00000027 pop ebx 0x00000028 mov bx, ax 0x0000002b popad 0x0000002c xchg eax, ecx 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 mov cl, dh 0x00000032 pushad 0x00000033 popad 0x00000034 popad 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E50597 second address: 4E5059D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E5059D second address: 4E505A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E505A1 second address: 4E505A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E505A5 second address: 4E505B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E505B2 second address: 4E505C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov edx, ecx 0x00000006 popad 0x00000007 mov cl, 71h 0x00000009 popad 0x0000000a xchg eax, ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E505C3 second address: 4E505C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E505C7 second address: 4E505CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E505CD second address: 4E505E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB9E5277420h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E505E1 second address: 4E506F2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B2921Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c jmp 00007FB9E4B29226h 0x00000011 push eax 0x00000012 pushad 0x00000013 mov di, 1964h 0x00000017 call 00007FB9E4B2921Dh 0x0000001c pushfd 0x0000001d jmp 00007FB9E4B29220h 0x00000022 sub ah, 00000018h 0x00000025 jmp 00007FB9E4B2921Bh 0x0000002a popfd 0x0000002b pop eax 0x0000002c popad 0x0000002d xchg eax, esi 0x0000002e pushad 0x0000002f pushfd 0x00000030 jmp 00007FB9E4B29225h 0x00000035 xor cx, E5B6h 0x0000003a jmp 00007FB9E4B29221h 0x0000003f popfd 0x00000040 pushfd 0x00000041 jmp 00007FB9E4B29220h 0x00000046 add ecx, 107F58D8h 0x0000004c jmp 00007FB9E4B2921Bh 0x00000051 popfd 0x00000052 popad 0x00000053 lea eax, dword ptr [ebp-04h] 0x00000056 jmp 00007FB9E4B29226h 0x0000005b nop 0x0000005c jmp 00007FB9E4B29220h 0x00000061 push eax 0x00000062 jmp 00007FB9E4B2921Bh 0x00000067 nop 0x00000068 pushad 0x00000069 pushfd 0x0000006a jmp 00007FB9E4B29224h 0x0000006f and ch, FFFFFFC8h 0x00000072 jmp 00007FB9E4B2921Bh 0x00000077 popfd 0x00000078 push eax 0x00000079 push edx 0x0000007a mov dx, cx 0x0000007d rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E50804 second address: 4E5083F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB9E527741Fh 0x00000008 mov di, ax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop esi 0x0000000f pushad 0x00000010 movzx ecx, di 0x00000013 jmp 00007FB9E527741Dh 0x00000018 popad 0x00000019 leave 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007FB9E527741Dh 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E5083F second address: 4E50845 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E50845 second address: 4E402A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E5277423h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b retn 0004h 0x0000000e nop 0x0000000f sub esp, 04h 0x00000012 xor ebx, ebx 0x00000014 cmp eax, 00000000h 0x00000017 je 00007FB9E527757Ah 0x0000001d mov dword ptr [esp], 0000000Dh 0x00000024 call 00007FB9E9CA3789h 0x00000029 mov edi, edi 0x0000002b jmp 00007FB9E5277425h 0x00000030 xchg eax, ebp 0x00000031 jmp 00007FB9E527741Eh 0x00000036 push eax 0x00000037 pushad 0x00000038 movsx edx, cx 0x0000003b pushfd 0x0000003c jmp 00007FB9E527741Ah 0x00000041 jmp 00007FB9E5277425h 0x00000046 popfd 0x00000047 popad 0x00000048 xchg eax, ebp 0x00000049 pushad 0x0000004a call 00007FB9E527741Ch 0x0000004f pushfd 0x00000050 jmp 00007FB9E5277422h 0x00000055 add esi, 60399A68h 0x0000005b jmp 00007FB9E527741Bh 0x00000060 popfd 0x00000061 pop eax 0x00000062 pushfd 0x00000063 jmp 00007FB9E5277429h 0x00000068 and ax, 0486h 0x0000006d jmp 00007FB9E5277421h 0x00000072 popfd 0x00000073 popad 0x00000074 mov ebp, esp 0x00000076 push eax 0x00000077 push edx 0x00000078 push eax 0x00000079 push edx 0x0000007a jmp 00007FB9E5277428h 0x0000007f rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E402A9 second address: 4E402B8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B2921Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E402B8 second address: 4E402E7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E5277429h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub esp, 2Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FB9E527741Dh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E402E7 second address: 4E4030C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ch, bh 0x00000005 movzx eax, bx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FB9E4B29227h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E4042C second address: 4E40432 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E40432 second address: 4E40436 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E40436 second address: 4E4046C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007FB9E5277610h 0x0000000e jmp 00007FB9E5277427h 0x00000013 lea ecx, dword ptr [ebp-14h] 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 mov edi, 7AA75D16h 0x0000001e mov edx, 253434A2h 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E4046C second address: 4E4047F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB9E4B2921Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E4047F second address: 4E40483 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E40519 second address: 4E4053A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 push eax 0x00000007 jmp 00007FB9E4B2921Eh 0x0000000c nop 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 mov eax, edi 0x00000012 mov edi, 7AACE9FCh 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E40571 second address: 4E40577 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E40577 second address: 4E4057C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E4057C second address: 4E405FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 call 00007FB9E527741Eh 0x00000009 pop ecx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d test eax, eax 0x0000000f pushad 0x00000010 mov edx, eax 0x00000012 popad 0x00000013 jg 00007FBA574C530Ah 0x00000019 pushad 0x0000001a pushfd 0x0000001b jmp 00007FB9E5277422h 0x00000020 jmp 00007FB9E5277425h 0x00000025 popfd 0x00000026 push esi 0x00000027 jmp 00007FB9E5277427h 0x0000002c pop eax 0x0000002d popad 0x0000002e js 00007FB9E527746Ch 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 jmp 00007FB9E5277421h 0x0000003d rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E405FD second address: 4E40601 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E40601 second address: 4E40607 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E4078C second address: 4E407A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B29229h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E407A9 second address: 4E40809 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 7E8CAD32h 0x00000008 jmp 00007FB9E5277423h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov esi, eax 0x00000012 pushad 0x00000013 jmp 00007FB9E527741Bh 0x00000018 popad 0x00000019 test esi, esi 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e pushfd 0x0000001f jmp 00007FB9E527741Bh 0x00000024 xor esi, 1E851C8Eh 0x0000002a jmp 00007FB9E5277429h 0x0000002f popfd 0x00000030 push eax 0x00000031 push edx 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E40809 second address: 4E4080E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E4080E second address: 4E4081C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB9E527741Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E4081C second address: 4E40820 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E40820 second address: 4E40073 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007FBA574C5243h 0x0000000e xor eax, eax 0x00000010 jmp 00007FB9E5250B4Ah 0x00000015 pop esi 0x00000016 pop edi 0x00000017 pop ebx 0x00000018 leave 0x00000019 retn 0004h 0x0000001c nop 0x0000001d sub esp, 04h 0x00000020 mov esi, eax 0x00000022 xor ebx, ebx 0x00000024 cmp esi, 00000000h 0x00000027 je 00007FB9E5277555h 0x0000002d call 00007FB9E9CA345Ch 0x00000032 mov edi, edi 0x00000034 jmp 00007FB9E5277427h 0x00000039 xchg eax, ebp 0x0000003a pushad 0x0000003b pushfd 0x0000003c jmp 00007FB9E5277424h 0x00000041 sbb si, 4C58h 0x00000046 jmp 00007FB9E527741Bh 0x0000004b popfd 0x0000004c pushfd 0x0000004d jmp 00007FB9E5277428h 0x00000052 sbb ax, D6B8h 0x00000057 jmp 00007FB9E527741Bh 0x0000005c popfd 0x0000005d popad 0x0000005e push eax 0x0000005f push eax 0x00000060 push edx 0x00000061 push eax 0x00000062 push edx 0x00000063 push eax 0x00000064 push edx 0x00000065 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E40073 second address: 4E40077 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E40077 second address: 4E4007D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E4007D second address: 4E400B8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B2921Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FB9E4B2921Eh 0x0000000f mov ebp, esp 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FB9E4B29227h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E400B8 second address: 4E400D9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov cx, bx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FB9E5277423h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E4015A second address: 4E4015E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E4015E second address: 4E401B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushfd 0x00000007 jmp 00007FB9E5277426h 0x0000000c adc ax, DF58h 0x00000011 jmp 00007FB9E527741Bh 0x00000016 popfd 0x00000017 popad 0x00000018 leave 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c call 00007FB9E527741Bh 0x00000021 pop esi 0x00000022 jmp 00007FB9E5277429h 0x00000027 popad 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E40CD9 second address: 4E40D37 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B2921Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d jmp 00007FB9E4B29229h 0x00000012 mov eax, dword ptr [eax] 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 mov di, cx 0x0000001a pushfd 0x0000001b jmp 00007FB9E4B29226h 0x00000020 sub eax, 5F7E9E38h 0x00000026 jmp 00007FB9E4B2921Bh 0x0000002b popfd 0x0000002c popad 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E40D37 second address: 4E40DE3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E5277429h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007FB9E5277427h 0x00000014 sub cl, 0000005Eh 0x00000017 jmp 00007FB9E5277429h 0x0000001c popfd 0x0000001d call 00007FB9E5277420h 0x00000022 call 00007FB9E5277422h 0x00000027 pop esi 0x00000028 pop edx 0x00000029 popad 0x0000002a pop eax 0x0000002b jmp 00007FB9E527741Eh 0x00000030 call 00007FBA574BC1C6h 0x00000035 push 77082B70h 0x0000003a push dword ptr fs:[00000000h] 0x00000041 mov eax, dword ptr [esp+10h] 0x00000045 mov dword ptr [esp+10h], ebp 0x00000049 lea ebp, dword ptr [esp+10h] 0x0000004d sub esp, eax 0x0000004f push ebx 0x00000050 push esi 0x00000051 push edi 0x00000052 mov eax, dword ptr [770E4538h] 0x00000057 xor dword ptr [ebp-04h], eax 0x0000005a xor eax, ebp 0x0000005c push eax 0x0000005d mov dword ptr [ebp-18h], esp 0x00000060 push dword ptr [ebp-08h] 0x00000063 mov eax, dword ptr [ebp-04h] 0x00000066 mov dword ptr [ebp-04h], FFFFFFFEh 0x0000006d mov dword ptr [ebp-08h], eax 0x00000070 lea eax, dword ptr [ebp-10h] 0x00000073 mov dword ptr fs:[00000000h], eax 0x00000079 ret 0x0000007a jmp 00007FB9E5277420h 0x0000007f sub esi, esi 0x00000081 push eax 0x00000082 push edx 0x00000083 pushad 0x00000084 pushad 0x00000085 popad 0x00000086 mov si, 36DFh 0x0000008a popad 0x0000008b rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E40DE3 second address: 4E40E09 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B29225h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [ebp-1Ch], esi 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov bx, 16DEh 0x00000013 push ebx 0x00000014 pop eax 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E40E5B second address: 4E40E60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E40E60 second address: 4E40EC5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B29227h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test al, al 0x0000000b jmp 00007FB9E4B29226h 0x00000010 je 00007FBA56D5CD08h 0x00000016 pushad 0x00000017 push ecx 0x00000018 mov di, 0AE0h 0x0000001c pop ebx 0x0000001d mov ax, 2E55h 0x00000021 popad 0x00000022 cmp dword ptr [ebp+08h], 00002000h 0x00000029 push eax 0x0000002a push edx 0x0000002b jmp 00007FB9E4B29227h 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E50882 second address: 4E50886 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E50886 second address: 4E5090C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov ax, F5F5h 0x0000000a popad 0x0000000b push eax 0x0000000c jmp 00007FB9E4B2921Bh 0x00000011 xchg eax, ebp 0x00000012 jmp 00007FB9E4B29226h 0x00000017 mov ebp, esp 0x00000019 jmp 00007FB9E4B29220h 0x0000001e xchg eax, esi 0x0000001f jmp 00007FB9E4B29220h 0x00000024 push eax 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 jmp 00007FB9E4B2921Ch 0x0000002d pushfd 0x0000002e jmp 00007FB9E4B29222h 0x00000033 adc ax, 4938h 0x00000038 jmp 00007FB9E4B2921Bh 0x0000003d popfd 0x0000003e popad 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E5090C second address: 4E50931 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edi, ax 0x00000006 mov dx, ax 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, esi 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FB9E5277424h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E50931 second address: 4E50935 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E50935 second address: 4E5093B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E5093B second address: 4E509E0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, 73F788E3h 0x00000008 call 00007FB9E4B29228h 0x0000000d pop eax 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 mov esi, dword ptr [ebp+0Ch] 0x00000014 pushad 0x00000015 pushfd 0x00000016 jmp 00007FB9E4B29227h 0x0000001b jmp 00007FB9E4B29223h 0x00000020 popfd 0x00000021 mov ch, 53h 0x00000023 popad 0x00000024 test esi, esi 0x00000026 pushad 0x00000027 call 00007FB9E4B29221h 0x0000002c jmp 00007FB9E4B29220h 0x00000031 pop eax 0x00000032 movsx edi, cx 0x00000035 popad 0x00000036 je 00007FBA56D56C12h 0x0000003c pushad 0x0000003d mov bx, cx 0x00000040 mov cx, 76EBh 0x00000044 popad 0x00000045 cmp dword ptr [770E459Ch], 05h 0x0000004c push eax 0x0000004d push edx 0x0000004e jmp 00007FB9E4B2921Dh 0x00000053 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E509E0 second address: 4E50A2E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FB9E5277427h 0x00000009 adc ax, 9F3Eh 0x0000000e jmp 00007FB9E5277429h 0x00000013 popfd 0x00000014 mov ecx, 7572E287h 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c je 00007FBA574BCE8Bh 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 pushad 0x00000027 popad 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E50A2E second address: 4E50A32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E50A32 second address: 4E50A38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E50A38 second address: 4E50A6D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB9E4B2921Ch 0x00000008 call 00007FB9E4B29222h 0x0000000d pop eax 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push esp 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FB9E4B2921Dh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E50A6D second address: 4E50AA1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E5277421h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], esi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FB9E5277428h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E50AA1 second address: 4E50AB0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E4B2921Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E50B06 second address: 4E50B0A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E50B0A second address: 4E50B10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E50B10 second address: 4E50B30 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB9E527741Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FB9E527741Bh 0x0000000f xchg eax, esi 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hx0wBsOjkQ.exe | RDTSC instruction interceptor: First address: 4E50B30 second address: 4E50B37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |