Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: PW6pjyv02h.exe, 00000000.00000002.1477022288.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013CD000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457290521.000000000133D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: PW6pjyv02h.exe, 00000000.00000002.1476663384.000000000133A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privac |
Source: PW6pjyv02h.exe, 00000000.00000002.1477022288.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013CD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: PW6pjyv02h.exe, 00000000.00000002.1477022288.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013CD000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457290521.000000000133D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://broadcast.st.dl.eccdnx.com |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013CD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/fatalerror.css?v=OFUqlcDNiD6y&l=engli |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: PW6pjyv02h.exe, 00000000.00000002.1477022288.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013CD000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457290521.000000000133D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013CD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: PW6pjyv02h.exe, 00000000.00000002.1477022288.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013CD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013CD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=FRRi |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://player.vimeo.com |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: PW6pjyv02h.exe, 00000000.00000002.1477022288.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013CD000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457290521.000000000133D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.000000000133D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: PW6pjyv02h.exe, 00000000.00000002.1477022288.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476663384.000000000133A000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013CD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001366000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476819907.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001366000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900 |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: PW6pjyv02h.exe, 00000000.00000002.1476819907.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/; |
Source: PW6pjyv02h.exe, 00000000.00000002.1476819907.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: PW6pjyv02h.exe, 00000000.00000002.1477022288.00000000013DE000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013CD000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457290521.000000000133D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013D3000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457076938.00000000013CD000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457290521.000000000133D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: PW6pjyv02h.exe, 00000000.00000003.1457290521.0000000001344000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000002.1476883415.0000000001399000.00000004.00000020.00020000.00000000.sdmp, PW6pjyv02h.exe, 00000000.00000003.1457116057.0000000001399000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00818600 | 0_2_00818600 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0081B1AF | 0_2_0081B1AF |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0083C09E | 0_2_0083C09E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A20B4 | 0_2_008A20B4 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0089E0C8 | 0_2_0089E0C8 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009040D8 | 0_2_009040D8 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0083A0CA | 0_2_0083A0CA |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008780CC | 0_2_008780CC |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009500DB | 0_2_009500DB |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009160C3 | 0_2_009160C3 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0083C0E6 | 0_2_0083C0E6 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008260E9 | 0_2_008260E9 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00928012 | 0_2_00928012 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0089200A | 0_2_0089200A |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F000A | 0_2_008F000A |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008DA01B | 0_2_008DA01B |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0093600E | 0_2_0093600E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008C0023 | 0_2_008C0023 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D003C | 0_2_008D003C |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008BA03F | 0_2_008BA03F |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00894034 | 0_2_00894034 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0092A042 | 0_2_0092A042 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0091C07A | 0_2_0091C07A |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0083E180 | 0_2_0083E180 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0091A18F | 0_2_0091A18F |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008C41A6 | 0_2_008C41A6 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008381CC | 0_2_008381CC |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A41DD | 0_2_008A41DD |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D61DA | 0_2_008D61DA |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009121C8 | 0_2_009121C8 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009421C8 | 0_2_009421C8 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009D81C0 | 0_2_009D81C0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008B01F4 | 0_2_008B01F4 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0089C10E | 0_2_0089C10E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0092E118 | 0_2_0092E118 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008FE12F | 0_2_008FE12F |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00882125 | 0_2_00882125 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008BC148 | 0_2_008BC148 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0083C09E | 0_2_0083C09E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008B616B | 0_2_008B616B |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00816160 | 0_2_00816160 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0088016C | 0_2_0088016C |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0090A174 | 0_2_0090A174 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00828169 | 0_2_00828169 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0089A176 | 0_2_0089A176 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008AE28D | 0_2_008AE28D |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008B22AD | 0_2_008B22AD |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008C62AB | 0_2_008C62AB |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0088E2BF | 0_2_0088E2BF |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0087E2BE | 0_2_0087E2BE |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0094C2C5 | 0_2_0094C2C5 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008342D0 | 0_2_008342D0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0092C2C7 | 0_2_0092C2C7 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009142C8 | 0_2_009142C8 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008982ED | 0_2_008982ED |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008BA20F | 0_2_008BA20F |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00940202 | 0_2_00940202 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A6213 | 0_2_008A6213 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008C2211 | 0_2_008C2211 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008FA212 | 0_2_008FA212 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0082E220 | 0_2_0082E220 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008DC23C | 0_2_008DC23C |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008BE239 | 0_2_008BE239 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0093022E | 0_2_0093022E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0089A249 | 0_2_0089A249 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00926257 | 0_2_00926257 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008B8269 | 0_2_008B8269 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00814270 | 0_2_00814270 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D2274 | 0_2_008D2274 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00924391 | 0_2_00924391 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00882382 | 0_2_00882382 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0088C3B9 | 0_2_0088C3B9 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009443A0 | 0_2_009443A0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E43B9 | 0_2_008E43B9 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009183A8 | 0_2_009183A8 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008743CF | 0_2_008743CF |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F63C7 | 0_2_008F63C7 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008383D8 | 0_2_008383D8 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008923D6 | 0_2_008923D6 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008BE3E8 | 0_2_008BE3E8 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008863E0 | 0_2_008863E0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00A303CB | 0_2_00A303CB |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00888307 | 0_2_00888307 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00908300 | 0_2_00908300 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0087C31B | 0_2_0087C31B |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0090C321 | 0_2_0090C321 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009CE320 | 0_2_009CE320 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008FC330 | 0_2_008FC330 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D834C | 0_2_008D834C |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0094E346 | 0_2_0094E346 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0088A35D | 0_2_0088A35D |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00872362 | 0_2_00872362 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008EC368 | 0_2_008EC368 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0091E379 | 0_2_0091E379 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008B0360 | 0_2_008B0360 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00922379 | 0_2_00922379 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00936378 | 0_2_00936378 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0092036B | 0_2_0092036B |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0089C49E | 0_2_0089C49E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008304C6 | 0_2_008304C6 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A04C0 | 0_2_008A04C0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008C04C6 | 0_2_008C04C6 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0087A4E7 | 0_2_0087A4E7 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008324E0 | 0_2_008324E0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008DC4EE | 0_2_008DC4EE |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A24EF | 0_2_008A24EF |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E64FB | 0_2_008E64FB |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0092E411 | 0_2_0092E411 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00902419 | 0_2_00902419 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F041A | 0_2_008F041A |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008CC416 | 0_2_008CC416 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0091440D | 0_2_0091440D |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0087642B | 0_2_0087642B |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0089443B | 0_2_0089443B |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0084A440 | 0_2_0084A440 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0089E442 | 0_2_0089E442 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00850460 | 0_2_00850460 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008FE580 | 0_2_008FE580 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00892599 | 0_2_00892599 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008DA592 | 0_2_008DA592 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0084C5A0 | 0_2_0084C5A0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E05A2 | 0_2_008E05A2 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009165A0 | 0_2_009165A0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009045A6 | 0_2_009045A6 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008805B6 | 0_2_008805B6 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009505AA | 0_2_009505AA |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A45C1 | 0_2_008A45C1 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0084A5D4 | 0_2_0084A5D4 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008EC5D7 | 0_2_008EC5D7 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008BA5EF | 0_2_008BA5EF |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008B65E5 | 0_2_008B65E5 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008165F0 | 0_2_008165F0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F8503 | 0_2_008F8503 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0087852E | 0_2_0087852E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00884539 | 0_2_00884539 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0083C53C | 0_2_0083C53C |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008BC546 | 0_2_008BC546 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008DE543 | 0_2_008DE543 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00834560 | 0_2_00834560 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0093C578 | 0_2_0093C578 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0081E687 | 0_2_0081E687 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0091068F | 0_2_0091068F |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E46BA | 0_2_008E46BA |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E26BB | 0_2_008E26BB |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009326A8 | 0_2_009326A8 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008EE6B0 | 0_2_008EE6B0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D46C9 | 0_2_008D46C9 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0094E6D2 | 0_2_0094E6D2 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009206DC | 0_2_009206DC |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008346D0 | 0_2_008346D0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008886E1 | 0_2_008886E1 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0087E6E8 | 0_2_0087E6E8 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008506F0 | 0_2_008506F0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A6609 | 0_2_008A6609 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F2618 | 0_2_008F2618 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0089C622 | 0_2_0089C622 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0082E630 | 0_2_0082E630 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00898635 | 0_2_00898635 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A8635 | 0_2_008A8635 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008B264D | 0_2_008B264D |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0092C655 | 0_2_0092C655 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008EA645 | 0_2_008EA645 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0094A647 | 0_2_0094A647 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00848650 | 0_2_00848650 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D6659 | 0_2_008D6659 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00926649 | 0_2_00926649 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008C466A | 0_2_008C466A |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00936784 | 0_2_00936784 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008827A9 | 0_2_008827A9 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D67AB | 0_2_008D67AB |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009027BF | 0_2_009027BF |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008B27B9 | 0_2_008B27B9 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009487A1 | 0_2_009487A1 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0092E7D4 | 0_2_0092E7D4 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0090A7DA | 0_2_0090A7DA |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009307C9 | 0_2_009307C9 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0094A7E8 | 0_2_0094A7E8 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0090E704 | 0_2_0090E704 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0087C727 | 0_2_0087C727 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00944739 | 0_2_00944739 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00940725 | 0_2_00940725 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00914725 | 0_2_00914725 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F6733 | 0_2_008F6733 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00822750 | 0_2_00822750 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00874767 | 0_2_00874767 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D876C | 0_2_008D876C |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00884889 | 0_2_00884889 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E4883 | 0_2_008E4883 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00938881 | 0_2_00938881 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F689A | 0_2_008F689A |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0082C8A0 | 0_2_0082C8A0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0091E8BD | 0_2_0091E8BD |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008488B0 | 0_2_008488B0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008B68BE | 0_2_008B68BE |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0094C8A1 | 0_2_0094C8A1 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0091A8A7 | 0_2_0091A8A7 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009CC8A2 | 0_2_009CC8A2 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008AC8C7 | 0_2_008AC8C7 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A080E | 0_2_008A080E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008B0819 | 0_2_008B0819 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008CC82C | 0_2_008CC82C |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0087A821 | 0_2_0087A821 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0095483E | 0_2_0095483E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0092883C | 0_2_0092883C |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008CE834 | 0_2_008CE834 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0081C840 | 0_2_0081C840 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008FC840 | 0_2_008FC840 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008C085F | 0_2_008C085F |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008EA85D | 0_2_008EA85D |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00888853 | 0_2_00888853 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008FE851 | 0_2_008FE851 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00924877 | 0_2_00924877 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0091A99F | 0_2_0091A99F |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00932987 | 0_2_00932987 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00890993 | 0_2_00890993 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008BA996 | 0_2_008BA996 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008EC9A7 | 0_2_008EC9A7 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0089A9BE | 0_2_0089A9BE |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009169D8 | 0_2_009169D8 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008B49C6 | 0_2_008B49C6 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E89D1 | 0_2_008E89D1 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008509E0 | 0_2_008509E0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0083C9EB | 0_2_0083C9EB |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F89E5 | 0_2_008F89E5 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009229E5 | 0_2_009229E5 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00836910 | 0_2_00836910 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00946930 | 0_2_00946930 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A293B | 0_2_008A293B |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D093E | 0_2_008D093E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A894B | 0_2_008A894B |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008BE958 | 0_2_008BE958 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008DA96D | 0_2_008DA96D |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E096E | 0_2_008E096E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0082E960 | 0_2_0082E960 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D4966 | 0_2_008D4966 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00908963 | 0_2_00908963 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00876978 | 0_2_00876978 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00892976 | 0_2_00892976 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00932AB9 | 0_2_00932AB9 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00944AAC | 0_2_00944AAC |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00878ABB | 0_2_00878ABB |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00940AA9 | 0_2_00940AA9 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00838ABC | 0_2_00838ABC |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00914AD6 | 0_2_00914AD6 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00898AC7 | 0_2_00898AC7 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00910AC9 | 0_2_00910AC9 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0090EAF0 | 0_2_0090EAF0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008C6AF1 | 0_2_008C6AF1 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00942A16 | 0_2_00942A16 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008C0A0A | 0_2_008C0A0A |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F2A00 | 0_2_008F2A00 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008C8A1A | 0_2_008C8A1A |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A6A1D | 0_2_008A6A1D |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D6A2B | 0_2_008D6A2B |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00948A22 | 0_2_00948A22 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0084CA40 | 0_2_0084CA40 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0092AA5E | 0_2_0092AA5E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00896A51 | 0_2_00896A51 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00904A73 | 0_2_00904A73 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0087CA60 | 0_2_0087CA60 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0082EB80 | 0_2_0082EB80 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008C2B8F | 0_2_008C2B8F |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A2B8E | 0_2_008A2B8E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008EEB8B | 0_2_008EEB8B |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0090CB99 | 0_2_0090CB99 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00814BA0 | 0_2_00814BA0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0088ABAC | 0_2_0088ABAC |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00908BBD | 0_2_00908BBD |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00874BA8 | 0_2_00874BA8 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00924BA8 | 0_2_00924BA8 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00906BAC | 0_2_00906BAC |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00938BAD | 0_2_00938BAD |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008DEBC1 | 0_2_008DEBC1 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00948BD9 | 0_2_00948BD9 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008FEBEB | 0_2_008FEBEB |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00912BF6 | 0_2_00912BF6 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D8B02 | 0_2_008D8B02 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00828B1B | 0_2_00828B1B |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008CCB3F | 0_2_008CCB3F |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00936B27 | 0_2_00936B27 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00886B3D | 0_2_00886B3D |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0081AB40 | 0_2_0081AB40 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00928B43 | 0_2_00928B43 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0091CB4C | 0_2_0091CB4C |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D2B53 | 0_2_008D2B53 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0094EB77 | 0_2_0094EB77 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00926B7F | 0_2_00926B7F |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0093EB62 | 0_2_0093EB62 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008FCC9A | 0_2_008FCC9A |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F4CAE | 0_2_008F4CAE |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00824CA0 | 0_2_00824CA0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00918CB5 | 0_2_00918CB5 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D0CC7 | 0_2_008D0CC7 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0093CCF5 | 0_2_0093CCF5 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00934CFA | 0_2_00934CFA |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D8CFE | 0_2_008D8CFE |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0094CC5A | 0_2_0094CC5A |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008AAC5F | 0_2_008AAC5F |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00872C79 | 0_2_00872C79 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00890D8D | 0_2_00890D8D |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008DADAE | 0_2_008DADAE |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E2DA1 | 0_2_008E2DA1 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008C4DCC | 0_2_008C4DCC |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00904DD7 | 0_2_00904DD7 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0084CDF0 | 0_2_0084CDF0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009CADE2 | 0_2_009CADE2 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009D4D17 | 0_2_009D4D17 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00850D20 | 0_2_00850D20 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A0D20 | 0_2_008A0D20 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00836D2E | 0_2_00836D2E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F0D21 | 0_2_008F0D21 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008ACD36 | 0_2_008ACD36 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0089ED41 | 0_2_0089ED41 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0083CD4C | 0_2_0083CD4C |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00880D5D | 0_2_00880D5D |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0083CD5E | 0_2_0083CD5E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E6D61 | 0_2_008E6D61 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00924D61 | 0_2_00924D61 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008C0D7A | 0_2_008C0D7A |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00900E86 | 0_2_00900E86 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00848EA0 | 0_2_00848EA0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00920EBC | 0_2_00920EBC |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008ECEBE | 0_2_008ECEBE |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00812EB0 | 0_2_00812EB0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0082AEB0 | 0_2_0082AEB0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00882EBA | 0_2_00882EBA |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008ACEC7 | 0_2_008ACEC7 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008C6EDA | 0_2_008C6EDA |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0094CEC3 | 0_2_0094CEC3 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0089EED3 | 0_2_0089EED3 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0090CECF | 0_2_0090CECF |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00870EE2 | 0_2_00870EE2 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008CAEEB | 0_2_008CAEEB |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F8EE4 | 0_2_008F8EE4 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D2EE1 | 0_2_008D2EE1 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00932EE1 | 0_2_00932EE1 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A2E0C | 0_2_008A2E0C |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F4E09 | 0_2_008F4E09 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A8E03 | 0_2_008A8E03 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0087CE09 | 0_2_0087CE09 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0088EE1D | 0_2_0088EE1D |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008FAE13 | 0_2_008FAE13 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008B6E2E | 0_2_008B6E2E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0088CE3B | 0_2_0088CE3B |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A6E3F | 0_2_008A6E3F |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008BEE31 | 0_2_008BEE31 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0081CE45 | 0_2_0081CE45 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0083EE63 | 0_2_0083EE63 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00894E61 | 0_2_00894E61 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008C8E67 | 0_2_008C8E67 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008BCE66 | 0_2_008BCE66 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00832E6D | 0_2_00832E6D |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00830E6C | 0_2_00830E6C |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00940E63 | 0_2_00940E63 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00906F9D | 0_2_00906F9D |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00948F9B | 0_2_00948F9B |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00944F85 | 0_2_00944F85 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008AEFA5 | 0_2_008AEFA5 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0094EFA7 | 0_2_0094EFA7 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00932FAD | 0_2_00932FAD |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D4FCF | 0_2_008D4FCF |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00946FC0 | 0_2_00946FC0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008DEFD5 | 0_2_008DEFD5 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008EAFD6 | 0_2_008EAFD6 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008C2FE4 | 0_2_008C2FE4 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E4FF9 | 0_2_008E4FF9 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00878F09 | 0_2_00878F09 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0090EF26 | 0_2_0090EF26 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0091EF2E | 0_2_0091EF2E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00886F4A | 0_2_00886F4A |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00872F48 | 0_2_00872F48 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00826F52 | 0_2_00826F52 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00936F79 | 0_2_00936F79 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0094AF65 | 0_2_0094AF65 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0087AF73 | 0_2_0087AF73 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008FCF79 | 0_2_008FCF79 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F2F74 | 0_2_008F2F74 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0089D08C | 0_2_0089D08C |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00919088 | 0_2_00919088 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A90CB | 0_2_008A90CB |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E10CC | 0_2_008E10CC |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008870DD | 0_2_008870DD |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008850EF | 0_2_008850EF |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009270EB | 0_2_009270EB |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E70F0 | 0_2_008E70F0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009350EC | 0_2_009350EC |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0094D0EB | 0_2_0094D0EB |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0082D003 | 0_2_0082D003 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00871000 | 0_2_00871000 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00943003 | 0_2_00943003 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F7010 | 0_2_008F7010 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0081D021 | 0_2_0081D021 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0091503A | 0_2_0091503A |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0090903E | 0_2_0090903E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008AB069 | 0_2_008AB069 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008FB07F | 0_2_008FB07F |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0093B063 | 0_2_0093B063 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00941061 | 0_2_00941061 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A3071 | 0_2_008A3071 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00905191 | 0_2_00905191 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008BF181 | 0_2_008BF181 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0084F18B | 0_2_0084F18B |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008EF19A | 0_2_008EF19A |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008791AD | 0_2_008791AD |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008391AE | 0_2_008391AE |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008911A4 | 0_2_008911A4 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0089B1B0 | 0_2_0089B1B0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F31B6 | 0_2_008F31B6 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009211D4 | 0_2_009211D4 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008711D4 | 0_2_008711D4 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009251CA | 0_2_009251CA |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008771D9 | 0_2_008771D9 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008CF126 | 0_2_008CF126 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0088913F | 0_2_0088913F |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008BD141 | 0_2_008BD141 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00911143 | 0_2_00911143 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008B515F | 0_2_008B515F |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008DD179 | 0_2_008DD179 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008FF173 | 0_2_008FF173 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00849280 | 0_2_00849280 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008812CB | 0_2_008812CB |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008B72C2 | 0_2_008B72C2 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D92C0 | 0_2_008D92C0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009172CF | 0_2_009172CF |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008772E1 | 0_2_008772E1 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008932EE | 0_2_008932EE |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D72E1 | 0_2_008D72E1 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008C92F4 | 0_2_008C92F4 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E32F5 | 0_2_008E32F5 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009292EE | 0_2_009292EE |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0092321F | 0_2_0092321F |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00939230 | 0_2_00939230 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009C9238 | 0_2_009C9238 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00821227 | 0_2_00821227 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0087D229 | 0_2_0087D229 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E5249 | 0_2_008E5249 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0090B25C | 0_2_0090B25C |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0087F251 | 0_2_0087F251 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F5256 | 0_2_008F5256 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009D3276 | 0_2_009D3276 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008BB265 | 0_2_008BB265 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A727B | 0_2_008A727B |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0092B264 | 0_2_0092B264 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A1274 | 0_2_008A1274 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D33B7 | 0_2_008D33B7 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008DF3B3 | 0_2_008DF3B3 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0081F3C0 | 0_2_0081F3C0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008173D0 | 0_2_008173D0 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E13E5 | 0_2_008E13E5 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009493E2 | 0_2_009493E2 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0091D3E9 | 0_2_0091D3E9 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00819310 | 0_2_00819310 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0090F302 | 0_2_0090F302 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00913306 | 0_2_00913306 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0087331C | 0_2_0087331C |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F7312 | 0_2_008F7312 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00875323 | 0_2_00875323 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00831340 | 0_2_00831340 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0083D34A | 0_2_0083D34A |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F9344 | 0_2_008F9344 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008CD340 | 0_2_008CD340 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009D7353 | 0_2_009D7353 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0090735E | 0_2_0090735E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00925343 | 0_2_00925343 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00931346 | 0_2_00931346 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F1359 | 0_2_008F1359 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008B936E | 0_2_008B936E |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00939375 | 0_2_00939375 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0083F377 | 0_2_0083F377 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00891373 | 0_2_00891373 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0093548A | 0_2_0093548A |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008994A2 | 0_2_008994A2 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009414D2 | 0_2_009414D2 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008EF4C2 | 0_2_008EF4C2 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009094CD | 0_2_009094CD |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008854E7 | 0_2_008854E7 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0081D4F3 | 0_2_0081D4F3 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008774FE | 0_2_008774FE |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_009214EC | 0_2_009214EC |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0094B415 | 0_2_0094B415 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008AF419 | 0_2_008AF419 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0089F432 | 0_2_0089F432 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00837440 | 0_2_00837440 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008D5442 | 0_2_008D5442 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008A3451 | 0_2_008A3451 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00927474 | 0_2_00927474 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0082747D | 0_2_0082747D |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00915596 | 0_2_00915596 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E35D5 | 0_2_008E35D5 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E15E3 | 0_2_008E15E3 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008815E5 | 0_2_008815E5 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0090F5E3 | 0_2_0090F5E3 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008E951F | 0_2_008E951F |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0091150D | 0_2_0091150D |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0093755A | 0_2_0093755A |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0088D55F | 0_2_0088D55F |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008F9557 | 0_2_008F9557 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_0091954B | 0_2_0091954B |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_00947566 | 0_2_00947566 |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | Code function: 0_2_008CF68D | 0_2_008CF68D |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9D7D29 second address: 9D7D34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9D7D34 second address: 9D7D3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9D7D3A second address: 9D7D3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9D7D3E second address: 9D7D42 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9DCC57 second address: 9DCC62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9DCC62 second address: 9DCC6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 pushad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9DCC6C second address: 9DCC7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F416957980Bh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9DD2F2 second address: 9DD2F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9DD2F8 second address: 9DD2FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9DD2FC second address: 9DD306 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007F4169565786h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9DD306 second address: 9DD31B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F416957980Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9DD31B second address: 9DD334 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4169565795h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E0565 second address: 9E057D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F416957980Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 push edi 0x00000011 pop edi 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E057D second address: 9E0593 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F416956578Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E0593 second address: 9E0597 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E0597 second address: 9E05CB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [eax] 0x00000009 jmp 00007F4169565797h 0x0000000e mov dword ptr [esp+04h], eax 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F416956578Dh 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E05CB second address: 9E0650 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F416957980Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push edx 0x0000000d pop edx 0x0000000e popad 0x0000000f popad 0x00000010 pop eax 0x00000011 and ecx, dword ptr [ebp+122D255Ch] 0x00000017 push 00000003h 0x00000019 push 00000000h 0x0000001b push ebp 0x0000001c call 00007F4169579808h 0x00000021 pop ebp 0x00000022 mov dword ptr [esp+04h], ebp 0x00000026 add dword ptr [esp+04h], 00000014h 0x0000002e inc ebp 0x0000002f push ebp 0x00000030 ret 0x00000031 pop ebp 0x00000032 ret 0x00000033 mov dword ptr [ebp+122D1DD6h], ecx 0x00000039 push 00000000h 0x0000003b push 00000003h 0x0000003d mov dword ptr [ebp+122D1C71h], ebx 0x00000043 call 00007F4169579809h 0x00000048 pushad 0x00000049 jmp 00007F4169579815h 0x0000004e jmp 00007F4169579810h 0x00000053 popad 0x00000054 push eax 0x00000055 push eax 0x00000056 push edx 0x00000057 push eax 0x00000058 push edx 0x00000059 pushad 0x0000005a popad 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E0650 second address: 9E0656 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E0656 second address: 9E068B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4169579811h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F4169579818h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E068B second address: 9E0695 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F4169565786h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E0695 second address: 9E0701 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F4169579810h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [eax] 0x0000000c jno 00007F416957980Eh 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 push esi 0x00000017 jmp 00007F416957980Ah 0x0000001c pop esi 0x0000001d pop eax 0x0000001e sub di, BB51h 0x00000023 lea ebx, dword ptr [ebp+1244B416h] 0x00000029 sub dword ptr [ebp+122D3C9Ch], ecx 0x0000002f xchg eax, ebx 0x00000030 jmp 00007F416957980Eh 0x00000035 push eax 0x00000036 push eax 0x00000037 push edx 0x00000038 pushad 0x00000039 pushad 0x0000003a popad 0x0000003b jmp 00007F4169579810h 0x00000040 popad 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E0756 second address: 9E075A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E075A second address: 9E0770 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 pushad 0x00000009 pushad 0x0000000a ja 00007F4169579806h 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E0770 second address: 9E0799 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 nop 0x00000009 jg 00007F416956578Ch 0x0000000f push 00000000h 0x00000011 call 00007F4169565789h 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 ja 00007F4169565786h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E0799 second address: 9E079D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E079D second address: 9E07D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F416956578Dh 0x0000000b popad 0x0000000c push eax 0x0000000d jmp 00007F416956578Dh 0x00000012 mov eax, dword ptr [esp+04h] 0x00000016 pushad 0x00000017 jmp 00007F416956578Bh 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E07D3 second address: 9E07D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E07D7 second address: 9E07FB instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [eax] 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c jmp 00007F4169565797h 0x00000011 pop edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E07FB second address: 9E081F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c pushad 0x0000000d pushad 0x0000000e jmp 00007F4169579810h 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E081F second address: 9E08A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F4169565786h 0x0000000a popad 0x0000000b popad 0x0000000c pop eax 0x0000000d pushad 0x0000000e mov edx, dword ptr [ebp+122D2C0Bh] 0x00000014 popad 0x00000015 jne 00007F416956578Bh 0x0000001b push 00000003h 0x0000001d mov dword ptr [ebp+122D362Bh], edx 0x00000023 push 00000000h 0x00000025 push 00000000h 0x00000027 push edx 0x00000028 call 00007F4169565788h 0x0000002d pop edx 0x0000002e mov dword ptr [esp+04h], edx 0x00000032 add dword ptr [esp+04h], 00000019h 0x0000003a inc edx 0x0000003b push edx 0x0000003c ret 0x0000003d pop edx 0x0000003e ret 0x0000003f mov dword ptr [ebp+122D3680h], edi 0x00000045 jp 00007F416956578Ch 0x0000004b mov dword ptr [ebp+122D2C3Bh], eax 0x00000051 push 00000003h 0x00000053 push ecx 0x00000054 movzx esi, di 0x00000057 pop esi 0x00000058 call 00007F4169565789h 0x0000005d push eax 0x0000005e push edx 0x0000005f pushad 0x00000060 pushad 0x00000061 popad 0x00000062 jmp 00007F4169565793h 0x00000067 popad 0x00000068 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E08A5 second address: 9E08AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E08AB second address: 9E08EA instructions: 0x00000000 rdtsc 0x00000002 jns 00007F4169565786h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jno 00007F4169565792h 0x00000013 mov eax, dword ptr [esp+04h] 0x00000017 push edx 0x00000018 jmp 00007F416956578Eh 0x0000001d pop edx 0x0000001e mov eax, dword ptr [eax] 0x00000020 push eax 0x00000021 push edx 0x00000022 jc 00007F4169565788h 0x00000028 push eax 0x00000029 pop eax 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E08EA second address: 9E0955 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F4169579814h 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f jg 00007F416957981Dh 0x00000015 pop eax 0x00000016 push 00000000h 0x00000018 push edx 0x00000019 call 00007F4169579808h 0x0000001e pop edx 0x0000001f mov dword ptr [esp+04h], edx 0x00000023 add dword ptr [esp+04h], 00000016h 0x0000002b inc edx 0x0000002c push edx 0x0000002d ret 0x0000002e pop edx 0x0000002f ret 0x00000030 mov di, bx 0x00000033 lea ebx, dword ptr [ebp+1244B41Fh] 0x00000039 movzx edi, dx 0x0000003c xchg eax, ebx 0x0000003d pushad 0x0000003e pushad 0x0000003f push eax 0x00000040 push edx 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E0A55 second address: 9E0AE8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4169565793h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a mov dword ptr [esp+04h], eax 0x0000000e pushad 0x0000000f push edx 0x00000010 push edi 0x00000011 pop edi 0x00000012 pop edx 0x00000013 je 00007F416956578Ch 0x00000019 jns 00007F4169565786h 0x0000001f popad 0x00000020 pop eax 0x00000021 and si, 07B1h 0x00000026 push 00000003h 0x00000028 mov dword ptr [ebp+122D1CAFh], ecx 0x0000002e push 00000000h 0x00000030 push 00000003h 0x00000032 push 00000000h 0x00000034 push edi 0x00000035 call 00007F4169565788h 0x0000003a pop edi 0x0000003b mov dword ptr [esp+04h], edi 0x0000003f add dword ptr [esp+04h], 0000001Ch 0x00000047 inc edi 0x00000048 push edi 0x00000049 ret 0x0000004a pop edi 0x0000004b ret 0x0000004c jmp 00007F416956578Dh 0x00000051 movzx esi, si 0x00000054 call 00007F4169565789h 0x00000059 jc 00007F4169565790h 0x0000005f pushad 0x00000060 pushad 0x00000061 popad 0x00000062 jne 00007F4169565786h 0x00000068 popad 0x00000069 push eax 0x0000006a push eax 0x0000006b push eax 0x0000006c push edx 0x0000006d pushad 0x0000006e popad 0x0000006f rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E0AE8 second address: 9E0AF9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E0AF9 second address: 9E0AFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E0AFD second address: 9E0B03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E0B03 second address: 9E0B09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9E0B09 second address: 9E0B91 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a push ecx 0x0000000b jns 00007F416957980Ch 0x00000011 pop ecx 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 jmp 00007F416957980Eh 0x0000001b pop eax 0x0000001c sub dword ptr [ebp+122D3671h], esi 0x00000022 lea ebx, dword ptr [ebp+1244B42Ah] 0x00000028 push 00000000h 0x0000002a push edx 0x0000002b call 00007F4169579808h 0x00000030 pop edx 0x00000031 mov dword ptr [esp+04h], edx 0x00000035 add dword ptr [esp+04h], 00000019h 0x0000003d inc edx 0x0000003e push edx 0x0000003f ret 0x00000040 pop edx 0x00000041 ret 0x00000042 or si, 0806h 0x00000047 jnc 00007F416957980Ah 0x0000004d xchg eax, ebx 0x0000004e jmp 00007F4169579817h 0x00000053 push eax 0x00000054 push eax 0x00000055 push edx 0x00000056 pushad 0x00000057 pushad 0x00000058 popad 0x00000059 push edx 0x0000005a pop edx 0x0000005b popad 0x0000005c rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9F14BA second address: 9F14C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9F14C0 second address: 9F14CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F4169579806h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9F14CA second address: 9F14CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9F14CE second address: 9F14E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F416957980Ah 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9FF3F7 second address: 9FF40C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F4169565786h 0x0000000a push edx 0x0000000b pop edx 0x0000000c popad 0x0000000d push edx 0x0000000e push eax 0x0000000f pop eax 0x00000010 pop edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9FF58A second address: 9FF58E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9FF58E second address: 9FF596 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9FF596 second address: 9FF5BD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F416957980Ah 0x00000008 jmp 00007F416957980Fh 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9FF5BD second address: 9FF5C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9FF5C3 second address: 9FF5DE instructions: 0x00000000 rdtsc 0x00000002 ja 00007F4169579806h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edi 0x0000000d jmp 00007F416957980Bh 0x00000012 pushad 0x00000013 popad 0x00000014 pop edi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9FF5DE second address: 9FF5E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9FF5E3 second address: 9FF5FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4169579812h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9FF8DB second address: 9FF8DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9FF8DF second address: 9FF8E9 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F4169579806h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9FFA4F second address: 9FFA55 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9FFA55 second address: 9FFA5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F4169579806h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9FFBAB second address: 9FFBB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9FFFA5 second address: 9FFFA9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A002C5 second address: A002C9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A00BB4 second address: A00BD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4169579811h 0x00000009 jne 00007F4169579806h 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A00BD0 second address: A00BEC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4169565794h 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A00BEC second address: A00BF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A00E9F second address: A00EA9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007F4169565786h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0101B second address: A01020 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A01020 second address: A01032 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jp 00007F4169565786h 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c jne 00007F4169565786h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A01032 second address: A01036 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A012C6 second address: A012CB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0370B second address: A03711 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A03711 second address: A0373A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F4169565799h 0x0000000f push eax 0x00000010 push edx 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 push eax 0x00000014 pop eax 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0373A second address: A03740 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9C8D99 second address: 9C8D9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9C8D9F second address: 9C8DA3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9C8DA3 second address: 9C8DD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F416956578Ah 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jno 00007F416956578Ah 0x00000012 push eax 0x00000013 jnl 00007F4169565786h 0x00000019 pop eax 0x0000001a pushad 0x0000001b pushad 0x0000001c popad 0x0000001d jno 00007F4169565786h 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0B3DA second address: A0B3EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F416957980Bh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0B62D second address: A0B631 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0B631 second address: A0B635 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0B635 second address: A0B65E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4169565791h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007F416956578Fh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0B65E second address: A0B664 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0B8EC second address: A0B8F6 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F416956578Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0BB7A second address: A0BBB5 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F416957980Ch 0x00000008 jne 00007F4169579806h 0x0000000e jmp 00007F416957980Fh 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push ecx 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F4169579819h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0D1B1 second address: A0D1B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0D6BD second address: A0D6C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0D8D1 second address: A0D8D7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0D8D7 second address: A0D8DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0DDCE second address: A0DDD2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0DE39 second address: A0DE3D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0DE3D second address: A0DE43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0DE43 second address: A0DE89 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 pop eax 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ebx 0x0000000b push 00000000h 0x0000000d push eax 0x0000000e call 00007F4169579808h 0x00000013 pop eax 0x00000014 mov dword ptr [esp+04h], eax 0x00000018 add dword ptr [esp+04h], 0000001Ah 0x00000020 inc eax 0x00000021 push eax 0x00000022 ret 0x00000023 pop eax 0x00000024 ret 0x00000025 add esi, dword ptr [ebp+122D2D01h] 0x0000002b nop 0x0000002c pushad 0x0000002d push eax 0x0000002e push edx 0x0000002f jmp 00007F416957980Fh 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0DE89 second address: A0DE96 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F4169565786h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0E31C second address: A0E327 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007F4169579806h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0E327 second address: A0E341 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F416956578Eh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0E341 second address: A0E345 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0E345 second address: A0E34B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0F2C9 second address: A0F2CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0F12B second address: A0F131 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0F2CF second address: A0F315 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b mov edi, dword ptr [ebp+122D2FB5h] 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push esi 0x00000018 call 00007F4169579808h 0x0000001d pop esi 0x0000001e mov dword ptr [esp+04h], esi 0x00000022 add dword ptr [esp+04h], 00000017h 0x0000002a inc esi 0x0000002b push esi 0x0000002c ret 0x0000002d pop esi 0x0000002e ret 0x0000002f ja 00007F416957980Ch 0x00000035 push eax 0x00000036 push esi 0x00000037 push eax 0x00000038 push edx 0x00000039 push eax 0x0000003a push edx 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0F315 second address: A0F319 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0F319 second address: A0F31D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A102A5 second address: A102B3 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F4169565786h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A10AA3 second address: A10AA9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A10AA9 second address: A10ABE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jnp 00007F4169565788h 0x00000010 pushad 0x00000011 popad 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A12A09 second address: A12A0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A171E6 second address: A171F5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F416956578Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A171F5 second address: A17213 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 jno 00007F4169579806h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f jg 00007F4169579814h 0x00000015 pushad 0x00000016 jno 00007F4169579806h 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A1872C second address: A18750 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4169565798h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jns 00007F4169565786h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A18750 second address: A18772 instructions: 0x00000000 rdtsc 0x00000002 je 00007F4169579806h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c jbe 00007F4169579820h 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F416957980Eh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A13ED4 second address: A13EF7 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F4169565786h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F4169565793h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A13EF7 second address: A13F01 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F4169579806h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A13F01 second address: A13F07 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A1B7D8 second address: A1B7E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F4169579806h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9D12A8 second address: 9D12C9 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F416956578Ch 0x00000008 jmp 00007F416956578Ch 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9D12C9 second address: 9D12CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A18901 second address: A18905 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A17AC4 second address: A17AC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A1DD22 second address: A1DD94 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007F416956578Ch 0x0000000c popad 0x0000000d mov dword ptr [esp], eax 0x00000010 push 00000000h 0x00000012 push ebx 0x00000013 call 00007F4169565788h 0x00000018 pop ebx 0x00000019 mov dword ptr [esp+04h], ebx 0x0000001d add dword ptr [esp+04h], 00000019h 0x00000025 inc ebx 0x00000026 push ebx 0x00000027 ret 0x00000028 pop ebx 0x00000029 ret 0x0000002a mov bh, 51h 0x0000002c mov di, dx 0x0000002f push 00000000h 0x00000031 mov dword ptr [ebp+122D2C45h], ecx 0x00000037 push 00000000h 0x00000039 push 00000000h 0x0000003b push ecx 0x0000003c call 00007F4169565788h 0x00000041 pop ecx 0x00000042 mov dword ptr [esp+04h], ecx 0x00000046 add dword ptr [esp+04h], 00000014h 0x0000004e inc ecx 0x0000004f push ecx 0x00000050 ret 0x00000051 pop ecx 0x00000052 ret 0x00000053 mov dword ptr [ebp+122D3151h], edx 0x00000059 xchg eax, esi 0x0000005a pushad 0x0000005b push edi 0x0000005c pushad 0x0000005d popad 0x0000005e pop edi 0x0000005f push eax 0x00000060 push edx 0x00000061 pushad 0x00000062 popad 0x00000063 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A1DD94 second address: A1DD98 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A1BFE4 second address: A1C058 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F4169565788h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f mov edi, dword ptr [ebp+1246C8C8h] 0x00000015 push dword ptr fs:[00000000h] 0x0000001c mov ebx, dword ptr [ebp+122D2EEDh] 0x00000022 mov dword ptr fs:[00000000h], esp 0x00000029 push 00000000h 0x0000002b push esi 0x0000002c call 00007F4169565788h 0x00000031 pop esi 0x00000032 mov dword ptr [esp+04h], esi 0x00000036 add dword ptr [esp+04h], 00000016h 0x0000003e inc esi 0x0000003f push esi 0x00000040 ret 0x00000041 pop esi 0x00000042 ret 0x00000043 je 00007F416956578Ah 0x00000049 mov bx, 4187h 0x0000004d mov eax, dword ptr [ebp+122D0C51h] 0x00000053 add dword ptr [ebp+1246D45Fh], ecx 0x00000059 push FFFFFFFFh 0x0000005b cld 0x0000005c push eax 0x0000005d push eax 0x0000005e push edx 0x0000005f push ecx 0x00000060 jmp 00007F416956578Fh 0x00000065 pop ecx 0x00000066 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A20E51 second address: A20E55 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A20E55 second address: A20E61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 pushad 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A1FEA7 second address: A1FEB1 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F416957980Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A20E61 second address: A20E70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F4169565786h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A20E70 second address: A20EAA instructions: 0x00000000 rdtsc 0x00000002 jc 00007F4169579806h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c or ebx, 2B4D11ACh 0x00000012 add dword ptr [ebp+122D252Dh], esi 0x00000018 push 00000000h 0x0000001a xor edi, dword ptr [ebp+122D2F15h] 0x00000020 push 00000000h 0x00000022 xchg eax, esi 0x00000023 pushad 0x00000024 jmp 00007F4169579813h 0x00000029 pushad 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A20EAA second address: A20EB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A20EB0 second address: A20ECA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F4169579811h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A21E87 second address: A21E8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A21E8B second address: A21F0F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 push ecx 0x00000009 mov dword ptr [ebp+1246C8D2h], edi 0x0000000f pop ebx 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push esi 0x00000015 call 00007F4169579808h 0x0000001a pop esi 0x0000001b mov dword ptr [esp+04h], esi 0x0000001f add dword ptr [esp+04h], 00000019h 0x00000027 inc esi 0x00000028 push esi 0x00000029 ret 0x0000002a pop esi 0x0000002b ret 0x0000002c and ebx, 2A997FF4h 0x00000032 xor bx, DB89h 0x00000037 push 00000000h 0x00000039 push 00000000h 0x0000003b push esi 0x0000003c call 00007F4169579808h 0x00000041 pop esi 0x00000042 mov dword ptr [esp+04h], esi 0x00000046 add dword ptr [esp+04h], 00000014h 0x0000004e inc esi 0x0000004f push esi 0x00000050 ret 0x00000051 pop esi 0x00000052 ret 0x00000053 sub edi, dword ptr [ebp+122D2D91h] 0x00000059 xchg eax, esi 0x0000005a push eax 0x0000005b jnc 00007F4169579808h 0x00000061 pop eax 0x00000062 push eax 0x00000063 push eax 0x00000064 push edx 0x00000065 jmp 00007F4169579814h 0x0000006a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A24DF0 second address: A24DF6 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A220FE second address: A22102 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A23008 second address: A2302B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4169565798h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A22102 second address: A22108 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A2302B second address: A23040 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F416956578Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A26CE4 second address: A26CE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A26CE8 second address: A26CEE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A26CEE second address: A26D0A instructions: 0x00000000 rdtsc 0x00000002 js 00007F4169579808h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F416957980Dh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A26D0A second address: A26D65 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F4169565788h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b push ebx 0x0000000c sub di, 5063h 0x00000011 pop edi 0x00000012 mov edi, dword ptr [ebp+122D2F1Dh] 0x00000018 push 00000000h 0x0000001a push 00000000h 0x0000001c push ecx 0x0000001d call 00007F4169565788h 0x00000022 pop ecx 0x00000023 mov dword ptr [esp+04h], ecx 0x00000027 add dword ptr [esp+04h], 0000001Ah 0x0000002f inc ecx 0x00000030 push ecx 0x00000031 ret 0x00000032 pop ecx 0x00000033 ret 0x00000034 sub ebx, dword ptr [ebp+122D2DFDh] 0x0000003a push 00000000h 0x0000003c mov ebx, dword ptr [ebp+122D3442h] 0x00000042 xchg eax, esi 0x00000043 push eax 0x00000044 push edx 0x00000045 jc 00007F416956578Ch 0x0000004b jnl 00007F4169565786h 0x00000051 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A26D65 second address: A26D6A instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A26066 second address: A2606C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A2606C second address: A26070 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A26E90 second address: A26E9B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007F4169565786h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A26E9B second address: A26F48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a mov edi, dword ptr [ebp+122D2CE9h] 0x00000010 push dword ptr fs:[00000000h] 0x00000017 mov dword ptr [ebp+1246D63Bh], edx 0x0000001d mov dword ptr fs:[00000000h], esp 0x00000024 push 00000000h 0x00000026 push eax 0x00000027 call 00007F4169579808h 0x0000002c pop eax 0x0000002d mov dword ptr [esp+04h], eax 0x00000031 add dword ptr [esp+04h], 0000001Ch 0x00000039 inc eax 0x0000003a push eax 0x0000003b ret 0x0000003c pop eax 0x0000003d ret 0x0000003e mov edi, dword ptr [ebp+122D2C79h] 0x00000044 mov eax, dword ptr [ebp+122D1511h] 0x0000004a push 00000000h 0x0000004c push eax 0x0000004d call 00007F4169579808h 0x00000052 pop eax 0x00000053 mov dword ptr [esp+04h], eax 0x00000057 add dword ptr [esp+04h], 00000014h 0x0000005f inc eax 0x00000060 push eax 0x00000061 ret 0x00000062 pop eax 0x00000063 ret 0x00000064 call 00007F4169579814h 0x00000069 pop edi 0x0000006a push FFFFFFFFh 0x0000006c mov ebx, dword ptr [ebp+122D2B8Bh] 0x00000072 nop 0x00000073 pushad 0x00000074 push edx 0x00000075 push edi 0x00000076 pop edi 0x00000077 pop edx 0x00000078 push eax 0x00000079 push edx 0x0000007a jmp 00007F4169579818h 0x0000007f rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A27DF1 second address: A27DF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A27DF5 second address: A27DF9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A27EC5 second address: A27EC9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A27EC9 second address: A27ED7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007F416957980Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A2CE5A second address: A2CE77 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4169565791h 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a pop edx 0x0000000b jl 00007F4169565786h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A305F6 second address: A305FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A301E7 second address: A301ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A301ED second address: A301F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A301F6 second address: A301FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A301FC second address: A3023E instructions: 0x00000000 rdtsc 0x00000002 js 00007F4169579806h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e jmp 00007F4169579814h 0x00000013 pop eax 0x00000014 jno 00007F416957981Fh 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A37C7F second address: A37C85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A38FA2 second address: A38FB0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A38FB0 second address: A38FB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A38FB5 second address: A38FBA instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A38FBA second address: A38FEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b pushad 0x0000000c jc 00007F416956579Eh 0x00000012 jmp 00007F4169565798h 0x00000017 push eax 0x00000018 push edx 0x00000019 pop edx 0x0000001a pop eax 0x0000001b popad 0x0000001c mov eax, dword ptr [eax] 0x0000001e push esi 0x0000001f push ecx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A39144 second address: A3914F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push edi 0x0000000a pop edi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A3914F second address: A39193 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b jmp 00007F4169565791h 0x00000010 mov eax, dword ptr [eax] 0x00000012 jmp 00007F416956578Fh 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b pushad 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007F4169565790h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A3D373 second address: A3D378 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A3D378 second address: A3D37E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A3D37E second address: A3D384 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A3D4F5 second address: A3D504 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edi 0x00000004 pop edi 0x00000005 ja 00007F4169565786h 0x0000000b pop eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A4117D second address: A411A2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edi 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F4169579817h 0x00000011 push edi 0x00000012 pop edi 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A411A2 second address: A411B6 instructions: 0x00000000 rdtsc 0x00000002 je 00007F4169565786h 0x00000008 jl 00007F4169565786h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A411B6 second address: A411BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A411BA second address: A411BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A14E16 second address: A14E1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A14EDB second address: A14EF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4169565791h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A15165 second address: A15169 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A15169 second address: A1516F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A1516F second address: A15174 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A15808 second address: A1588F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 nop 0x00000006 push 00000000h 0x00000008 push edx 0x00000009 call 00007F4169565788h 0x0000000e pop edx 0x0000000f mov dword ptr [esp+04h], edx 0x00000013 add dword ptr [esp+04h], 0000001Bh 0x0000001b inc edx 0x0000001c push edx 0x0000001d ret 0x0000001e pop edx 0x0000001f ret 0x00000020 pushad 0x00000021 jbe 00007F416956578Ch 0x00000027 mov edx, dword ptr [ebp+122D2C99h] 0x0000002d adc ax, 4656h 0x00000032 popad 0x00000033 lea eax, dword ptr [ebp+1247F4F0h] 0x00000039 sub edi, 288E57BDh 0x0000003f nop 0x00000040 push edi 0x00000041 jmp 00007F4169565792h 0x00000046 pop edi 0x00000047 push eax 0x00000048 jmp 00007F4169565791h 0x0000004d nop 0x0000004e mov edi, dword ptr [ebp+122D2D31h] 0x00000054 lea eax, dword ptr [ebp+1247F4ACh] 0x0000005a mov dx, DE00h 0x0000005e nop 0x0000005f push eax 0x00000060 push edx 0x00000061 push eax 0x00000062 push edx 0x00000063 push esi 0x00000064 pop esi 0x00000065 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A1588F second address: A15895 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A15895 second address: 9F6286 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F416956578Ah 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F416956578Bh 0x00000011 nop 0x00000012 mov edx, dword ptr [ebp+122D3689h] 0x00000018 call dword ptr [ebp+122D1CFAh] 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007F416956578Bh 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9F6286 second address: 9F628A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9F628A second address: 9F6290 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A4142C second address: A41432 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A41432 second address: A4143C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A4143C second address: A41440 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A41873 second address: A41877 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A41877 second address: A418C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 ja 00007F416957981Ah 0x0000000e pop ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 jmp 00007F416957980Ch 0x00000017 pushad 0x00000018 popad 0x00000019 push edi 0x0000001a pop edi 0x0000001b popad 0x0000001c jmp 00007F4169579817h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A41E1A second address: A41E21 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A41E21 second address: A41E29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A44F49 second address: A44F51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A49380 second address: A4938A instructions: 0x00000000 rdtsc 0x00000002 ja 00007F4169579806h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A498D6 second address: A498DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A49E84 second address: A49EA7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F416957980Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c pop edx 0x0000000d jp 00007F4169579808h 0x00000013 push eax 0x00000014 push edx 0x00000015 jl 00007F4169579806h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A49EA7 second address: A49EAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A49EAB second address: A49EE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 jl 00007F416957981Ah 0x0000000e jmp 00007F4169579814h 0x00000013 jnp 00007F4169579808h 0x00000019 push esi 0x0000001a pop esi 0x0000001b push eax 0x0000001c push edx 0x0000001d push ebx 0x0000001e pop ebx 0x0000001f jmp 00007F416957980Eh 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A4FE5C second address: A4FE60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A4FE60 second address: A4FE82 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jl 00007F4169579806h 0x0000000d jmp 00007F4169579813h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9CC3D6 second address: 9CC3DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9CC3DC second address: 9CC3E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A4F201 second address: A4F208 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A4F4A9 second address: A4F4B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jnp 00007F4169579806h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A4E684 second address: A4E68A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A59693 second address: A5969B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A5969B second address: A596A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007F4169565786h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A5921D second address: A59221 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A59221 second address: A59227 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A59227 second address: A59242 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F4169579811h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A59242 second address: A59248 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A5BAA5 second address: A5BAAF instructions: 0x00000000 rdtsc 0x00000002 js 00007F4169579806h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A6224C second address: A6226D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4169565799h 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b push edi 0x0000000c pop edi 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A6226D second address: A6228A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F416957980Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jbe 00007F416957980Ch 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A60AB8 second address: A60ABC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A60C00 second address: A60C04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A60E7B second address: A60E92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnc 00007F4169565792h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A60E92 second address: A60EE1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 jmp 00007F4169579816h 0x0000000a jp 00007F4169579806h 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 push eax 0x00000014 jmp 00007F416957980Bh 0x00000019 pop eax 0x0000001a pop edx 0x0000001b pop eax 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 popad 0x00000022 jmp 00007F4169579816h 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A60EE1 second address: A60F08 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F4169565786h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F4169565799h 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A60F08 second address: A60F0C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A60F0C second address: A60F18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F4169565786h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A614B8 second address: A614CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4169579810h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A614CE second address: A614D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A614D2 second address: A614E0 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A614E0 second address: A614F5 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F4169565786h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jo 00007F41695657AEh 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A614F5 second address: A6150A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F416957980Ah 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A6150A second address: A61510 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A61510 second address: A61514 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A61F82 second address: A61F9A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F416956578Ah 0x00000007 jno 00007F4169565786h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A61F9A second address: A61F9E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A6602E second address: A66032 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A66032 second address: A6604C instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F416957980Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a jno 00007F4169579806h 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A65377 second address: A6537B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A6537B second address: A65387 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b pop edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A65387 second address: A65391 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F4169565786h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A65606 second address: A65612 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F4169579806h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A65761 second address: A6578B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 jmp 00007F4169565790h 0x0000000c push eax 0x0000000d pop eax 0x0000000e jmp 00007F4169565790h 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A658F5 second address: A6590D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F4169579806h 0x0000000a jmp 00007F416957980Eh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A6590D second address: A65911 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A65BE8 second address: A65BEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A65BEC second address: A65BF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A65BF0 second address: A65C14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4169579819h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A65C14 second address: A65C1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A70028 second address: A70042 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007F4169579811h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A70042 second address: A70051 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop eax 0x00000006 push esi 0x00000007 jl 00007F416956579Dh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A70051 second address: A7006F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4169579811h 0x00000009 push ebx 0x0000000a jng 00007F4169579806h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A7060D second address: A70613 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A70613 second address: A70617 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A70617 second address: A70631 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F416956578Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jno 00007F4169565786h 0x00000010 push eax 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A70631 second address: A7063F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jng 00007F4169579806h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A70E66 second address: A70E88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4169565798h 0x00000009 pop edx 0x0000000a pushad 0x0000000b push eax 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A70E88 second address: A70E97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F4169579806h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A70E97 second address: A70E9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A70E9D second address: A70EA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A7141A second address: A7141E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A7141E second address: A71428 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A71428 second address: A7142C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A75A0A second address: A75A0E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A75A0E second address: A75A25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 jmp 00007F416956578Ch 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A74C36 second address: A74C43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jng 00007F416957980Ch 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A74FF1 second address: A74FF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A74FF5 second address: A74FF9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A752AB second address: A752AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A752AF second address: A752B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A752B5 second address: A752C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ecx 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop ecx 0x0000000b push edi 0x0000000c push edx 0x0000000d pop edx 0x0000000e pop edi 0x0000000f push ebx 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A7542D second address: A7544F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push esi 0x00000004 pop esi 0x00000005 pushad 0x00000006 popad 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F4169579818h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A75719 second address: A7571D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A7571D second address: A7572C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F416957980Bh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A7A255 second address: A7A26A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4169565791h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A7A26A second address: A7A26E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A7A26E second address: A7A282 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F416956578Eh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A7FE64 second address: A7FEBA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F4169579819h 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e jmp 00007F416957980Dh 0x00000013 js 00007F4169579806h 0x00000019 popad 0x0000001a popad 0x0000001b push edi 0x0000001c pushad 0x0000001d push edx 0x0000001e pop edx 0x0000001f push edi 0x00000020 pop edi 0x00000021 popad 0x00000022 pushad 0x00000023 push ebx 0x00000024 pop ebx 0x00000025 jmp 00007F4169579813h 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A80038 second address: A8005E instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jbe 00007F4169565786h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jns 00007F4169565786h 0x00000013 pushad 0x00000014 popad 0x00000015 jmp 00007F416956578Ah 0x0000001a pushad 0x0000001b popad 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A8005E second address: A80062 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A804BF second address: A804C9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A804C9 second address: A804DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F416957980Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A804DB second address: A804EB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F416956578Ah 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A804EB second address: A804F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A804F3 second address: A804F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A804F7 second address: A804FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A804FB second address: A8051D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F4169565795h 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A8051D second address: A80548 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4169579815h 0x00000009 jne 00007F4169579806h 0x0000000f jmp 00007F416957980Bh 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A80548 second address: A8054F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A8054F second address: A8056D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4169579816h 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A806B1 second address: A806CA instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 jno 00007F4169565788h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push edi 0x0000000f push eax 0x00000010 push edx 0x00000011 jc 00007F4169565786h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A806CA second address: A806CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A80983 second address: A80987 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A80987 second address: A8098B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A8098B second address: A80991 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A80991 second address: A809A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4169579814h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A80AEE second address: A80B1F instructions: 0x00000000 rdtsc 0x00000002 jns 00007F4169565786h 0x00000008 jmp 00007F4169565792h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 jmp 00007F416956578Fh 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A80B1F second address: A80B2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F4169579806h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A80B2A second address: A80B39 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F416956578Ah 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A80B39 second address: A80B3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A814BD second address: A814D8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4169565796h 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A81BBF second address: A81BEA instructions: 0x00000000 rdtsc 0x00000002 je 00007F4169579806h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F4169579814h 0x0000000f pop ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 push ecx 0x00000013 pushad 0x00000014 popad 0x00000015 jnp 00007F4169579806h 0x0000001b pop ecx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A81BEA second address: A81BF1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A81BF1 second address: A81BFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A81BFC second address: A81C00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A8916D second address: A89177 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007F4169579806h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A88ABE second address: A88AC2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A88AC2 second address: A88AC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A88AC8 second address: A88AE1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F416956578Eh 0x00000007 pushad 0x00000008 jno 00007F4169565786h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A88AE1 second address: A88AF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F4169579806h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 jno 00007F4169579806h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A88AF9 second address: A88AFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A88AFD second address: A88B31 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007F4169579815h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F4169579817h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A88B31 second address: A88B3B instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F4169565786h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A88C8E second address: A88C9C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F416957980Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9CDE76 second address: 9CDE85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push esi 0x00000006 pop esi 0x00000007 jnp 00007F4169565786h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: 9CDE85 second address: 9CDEBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop ebx 0x00000008 push ecx 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007F4169579812h 0x00000011 jmp 00007F4169579817h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A99A02 second address: A99A08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A99A08 second address: A99A24 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F4169579812h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A99A24 second address: A99A28 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A9C564 second address: A9C58D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 jmp 00007F4169579819h 0x0000000c pushad 0x0000000d jbe 00007F4169579806h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A9C58D second address: A9C593 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A9BFB8 second address: A9BFC5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jp 00007F4169579806h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A9BFC5 second address: A9BFDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 jc 00007F416956579Eh 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 je 00007F4169565786h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A9C167 second address: A9C179 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d pushad 0x0000000e popad 0x0000000f push esi 0x00000010 pop esi 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A9E29F second address: A9E2A7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A9E2A7 second address: A9E2B3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A9E2B3 second address: A9E2B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AA9BEA second address: AA9BEE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AA9BEE second address: AA9C01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F416956578Bh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AAB26C second address: AAB272 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AAB272 second address: AAB28D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jp 00007F4169565786h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jno 00007F4169565786h 0x00000015 js 00007F4169565786h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AB1CFC second address: AB1D1F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007F4169579808h 0x0000000c popad 0x0000000d pushad 0x0000000e pushad 0x0000000f jmp 00007F4169579810h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AB1D1F second address: AB1D32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F416956578Ah 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AB1D32 second address: AB1D36 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AB1D36 second address: AB1D48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jl 00007F4169565786h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AB1D48 second address: AB1D4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AB4072 second address: AB409E instructions: 0x00000000 rdtsc 0x00000002 jo 00007F4169565786h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edi 0x0000000c pop edi 0x0000000d pop eax 0x0000000e ja 00007F4169565788h 0x00000014 popad 0x00000015 push esi 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a jmp 00007F4169565790h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AB5690 second address: AB5694 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AB5694 second address: AB569A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AB569A second address: AB56A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F4169579806h 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AB56A6 second address: AB56AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AB56AA second address: AB56C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F4169579806h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007F416957980Bh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AB7AB3 second address: AB7AB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AB7AB8 second address: AB7ABD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: ABBD3B second address: ABBD3F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: ABBD3F second address: ABBD59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F4169579812h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: ABBD59 second address: ABBD6D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F416956578Eh 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: ABBD6D second address: ABBD71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: ABC44B second address: ABC475 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F4169565786h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007F4169565798h 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 push esi 0x00000015 pop esi 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: ABC475 second address: ABC493 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F4169579818h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: ABC5E7 second address: ABC5F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F4169565786h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: ABC5F3 second address: ABC623 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push esi 0x00000008 jp 00007F416957980Ch 0x0000000e pushad 0x0000000f jmp 00007F4169579815h 0x00000014 push esi 0x00000015 pop esi 0x00000016 push esi 0x00000017 pop esi 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: ABC78E second address: ABC798 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F4169565786h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: ABC798 second address: ABC79D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: ABC79D second address: ABC7A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AC0A40 second address: AC0A4E instructions: 0x00000000 rdtsc 0x00000002 jg 00007F4169579806h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push esi 0x0000000d pop esi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AD0CC0 second address: AD0CD8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F416956578Fh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AD0CD8 second address: AD0CDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AD0CDC second address: AD0CE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AD0CE0 second address: AD0D05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jl 00007F416957980Eh 0x0000000f pushad 0x00000010 popad 0x00000011 jo 00007F4169579806h 0x00000017 pushad 0x00000018 pushad 0x00000019 popad 0x0000001a jo 00007F4169579806h 0x00000020 pushad 0x00000021 popad 0x00000022 push eax 0x00000023 pop eax 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AD0B06 second address: AD0B0C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AD0B0C second address: AD0B2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 jmp 00007F4169579813h 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e pop edi 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AD0B2D second address: AD0B31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: ADF696 second address: ADF69C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: ADF69C second address: ADF6A1 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: ADF6A1 second address: ADF6A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AF5845 second address: AF584D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AF4946 second address: AF4952 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F416957980Eh 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AF4A88 second address: AF4AA1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F416956578Fh 0x00000007 jl 00007F416956578Ch 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AF4BC8 second address: AF4BE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4169579819h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AF4BE7 second address: AF4C00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F4169565786h 0x0000000a popad 0x0000000b push esi 0x0000000c jg 00007F4169565786h 0x00000012 jnc 00007F4169565786h 0x00000018 pop esi 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AF4C00 second address: AF4C27 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4169579814h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jp 00007F416957981Eh 0x0000000f pushad 0x00000010 jns 00007F4169579806h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AF831B second address: AF831F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AF831F second address: AF832C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AF832C second address: AF8330 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AF8330 second address: AF8334 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AF83C9 second address: AF83CD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AF83CD second address: AF83D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AF83D3 second address: AF8429 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b mov dword ptr [ebp+1244B2E1h], edx 0x00000011 push 00000004h 0x00000013 movsx edx, cx 0x00000016 call 00007F4169565789h 0x0000001b jmp 00007F4169565799h 0x00000020 push eax 0x00000021 push eax 0x00000022 push edx 0x00000023 push edi 0x00000024 jmp 00007F4169565799h 0x00000029 pop edi 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AF8429 second address: AF8452 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F416957980Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d pushad 0x0000000e pushad 0x0000000f push esi 0x00000010 pop esi 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 js 00007F4169579808h 0x0000001a popad 0x0000001b mov eax, dword ptr [eax] 0x0000001d pushad 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AF9982 second address: AF99B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop esi 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d jmp 00007F4169565797h 0x00000012 pop ebx 0x00000013 push edi 0x00000014 jbe 00007F4169565786h 0x0000001a je 00007F4169565786h 0x00000020 pop edi 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AF99B5 second address: AF99BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AF99BB second address: AF99BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AF99BF second address: AF99C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AFB653 second address: AFB65C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AFB65C second address: AFB660 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AFB660 second address: AFB666 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AFB220 second address: AFB228 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AFB228 second address: AFB234 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F4169565786h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AFB234 second address: AFB23A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AFD095 second address: AFD0B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4169565796h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jnp 00007F4169565786h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: AFD0B8 second address: AFD0BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0FE73 second address: A0FE79 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PW6pjyv02h.exe | RDTSC instruction interceptor: First address: A0FE79 second address: A0FE7F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |