Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov edx, ebx | 0_2_00BD8600 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then lea esi, dword ptr [eax+00000270h] | 0_2_00BD8A50 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax-16h] | 0_2_00C11720 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov byte ptr [ebx], al | 0_2_00BFC09E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov byte ptr [ebx], al | 0_2_00BFC0E6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov byte ptr [ebx], al | 0_2_00BFE0DA |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h | 0_2_00BF81CC |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov eax, dword ptr [00C16130h] | 0_2_00BE8169 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov byte ptr [ebx], al | 0_2_00BFC09E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx ebx, byte ptr [edx] | 0_2_00C06210 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h | 0_2_00BF83D8 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h | 0_2_00C10340 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov ecx, eax | 0_2_00BEC300 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx edx, byte ptr [eax+edi-74D5A7FEh] | 0_2_00BFC465 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov byte ptr [ebx], al | 0_2_00BFC465 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov edi, ecx | 0_2_00BFA5B6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h | 0_2_00BF8528 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax-16h] | 0_2_00C106F0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov eax, ebx | 0_2_00BEC8A0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx esi, byte ptr [esp+eax-000000BEh] | 0_2_00BEC8A0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx ebx, byte ptr [esp+edx+0Ah] | 0_2_00BEC8A0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax-2E3D7ACEh] | 0_2_00BEC8A0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h | 0_2_00BF2830 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then push esi | 0_2_00BDC805 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov byte ptr [edi], al | 0_2_00BFC850 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx esi, byte ptr [esp+ecx+04h] | 0_2_00C0C830 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h | 0_2_00C0C990 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h | 0_2_00BF89E9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov ebx, dword ptr [edi+04h] | 0_2_00BFAAC0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then cmp dword ptr [ecx+ebx*8], 385488F2h | 0_2_00C0CA40 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax-6E2DD57Fh] | 0_2_00BEEB80 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov edx, ecx | 0_2_00BE8B1B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax+0Ah] | 0_2_00BDAB40 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h | 0_2_00BE4CA0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov edi, dword ptr [esi+30h] | 0_2_00BDCC7A |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx esi, byte ptr [ebp+eax-46h] | 0_2_00C0EDC1 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 2213E57Fh | 0_2_00C0CDF0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx esi, byte ptr [esp+ecx-3ECB279Fh] | 0_2_00C0CDF0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 2213E57Fh | 0_2_00C0CDF0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 7F7BECC6h | 0_2_00C0CDF0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov edx, ecx | 0_2_00BF6D2E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx edx, byte ptr [esp+ecx-16h] | 0_2_00C10D20 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx eax, byte ptr [ebp+edi+00000090h] | 0_2_00BD2EB0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov ecx, eax | 0_2_00BF2E6D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then jmp edx | 0_2_00BF2E6D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx ecx, byte ptr [edx+eax] | 0_2_00BF2E6D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov word ptr [eax], cx | 0_2_00BE6F52 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov esi, ecx | 0_2_00BF90D0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx ebx, byte ptr [esp+ecx-16h] | 0_2_00C11160 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov ecx, eax | 0_2_00BFD116 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov ecx, eax | 0_2_00BFD17D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then cmp byte ptr [esi+ebx], 00000000h | 0_2_00BFB170 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then add eax, dword ptr [esp+ecx*4+24h] | 0_2_00BD73D0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx ecx, word ptr [edi+esi*4] | 0_2_00BD73D0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov byte ptr [ebx], al | 0_2_00BFD34A |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov word ptr [eax], cx | 0_2_00BE747D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov word ptr [edx], di | 0_2_00BE747D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov eax, ebx | 0_2_00BF7440 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+09AD4080h] | 0_2_00BF7440 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx ecx, byte ptr [esi+eax+61765397h] | 0_2_00BEB57D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov dword ptr [esp+20h], eax | 0_2_00BD9780 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then jmp edx | 0_2_00BF37D6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then jmp eax | 0_2_00BF9739 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+20h] | 0_2_00BF7740 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov ecx, eax | 0_2_00BED8AC |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov ecx, eax | 0_2_00BED8AC |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov edx, ecx | 0_2_00BEB8F6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov edx, ecx | 0_2_00BEB8F6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov ecx, eax | 0_2_00BED8D8 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov ecx, eax | 0_2_00BED8D8 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then jmp edx | 0_2_00BF39B9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then movzx ecx, byte ptr [edx+eax] | 0_2_00BF39B9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov byte ptr [edi], al | 0_2_00BFB980 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov word ptr [eax], cx | 0_2_00BF1A10 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then dec edx | 0_2_00C0FA20 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then dec edx | 0_2_00C0FB10 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov byte ptr [ebx], al | 0_2_00BFDDFF |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then dec edx | 0_2_00C0FD70 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov edx, ecx | 0_2_00BF9E80 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov byte ptr [ebx], al | 0_2_00BFDE07 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then dec edx | 0_2_00C0FE00 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov edi, dword ptr [esp+28h] | 0_2_00BF5F1B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 4x nop then mov ecx, eax | 0_2_00BFBF13 |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507122537.0000000000839000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507122537.0000000000839000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507122537.0000000000839000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e75 |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.j8 |
Source: SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://broadcast.st.dl.eccdnx.com |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/G |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507122537.0000000000839000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap& |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis |
Source: SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008B7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.000000000083C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507122537.0000000000839000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1498608261.0000000000875000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javas |
Source: SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javasc |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507122537.0000000000839000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507122537.0000000000839000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507122537.0000000000839000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=FRRi |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=oOCAGrkRfpQ6&l=e |
Source: SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/sha |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hambu |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_respog |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498608261.0000000000875000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1506859295.0000000000875000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507293215.0000000000875000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1498608261.0000000000875000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/% |
Source: SPzPNCzcCy.exe, 00000000.00000002.1507231085.0000000000842000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506758867.0000000000842000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/900N |
Source: SPzPNCzcCy.exe, 00000000.00000003.1506859295.0000000000875000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507293215.0000000000875000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1498608261.0000000000875000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api |
Source: SPzPNCzcCy.exe, 00000000.00000003.1506859295.0000000000875000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507293215.0000000000875000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1498608261.0000000000875000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/pi |
Source: SPzPNCzcCy.exe, 00000000.00000002.1507231085.0000000000842000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506758867.0000000000842000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/pi~ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1506758867.000000000085B000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507293215.000000000086B000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1498608261.000000000086B000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506859295.000000000086A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com:443/api |
Source: SPzPNCzcCy.exe, 00000000.00000003.1506758867.000000000085B000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507293215.000000000086B000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506859295.000000000086A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com:443/apirofiles/76561199724331900 |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://player.vimeo.com |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/7 |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507122537.0000000000839000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000842000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.000000000085A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900 |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.000000000083C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507122537.0000000000839000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1498608261.0000000000875000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008B7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000842000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900N |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000842000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/~ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469820615.000000000086A000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.000000000085A000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1498608261.000000000086B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com:443/profiles/76561199724331900 |
Source: SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampo |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampoL |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowere |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered. |
Source: SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/; |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb |
Source: SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/aD |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507122537.0000000000839000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1498592931.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506718311.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000002.1507389062.00000000008C0000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506913663.00000000008BF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469449204.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1506668483.00000000008C5000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469577517.00000000008C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000876000.00000004.00000020.00020000.00000000.sdmp, SPzPNCzcCy.exe, 00000000.00000003.1469644594.0000000000887000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BD8600 | 0_2_00BD8600 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BDB100 | 0_2_00BDB100 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CDE0DB | 0_2_00CDE0DB |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C540D2 | 0_2_00C540D2 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BFC09E | 0_2_00BFC09E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CCC0E9 | 0_2_00CCC0E9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C920E3 | 0_2_00C920E3 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CFC0FF | 0_2_00CFC0FF |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CD40FF | 0_2_00CD40FF |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF80FD | 0_2_00CF80FD |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C760F4 | 0_2_00C760F4 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C68086 | 0_2_00C68086 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D14096 | 0_2_00D14096 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C4E089 | 0_2_00C4E089 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BE60E9 | 0_2_00BE60E9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BFC0E6 | 0_2_00BFC0E6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C6C0A5 | 0_2_00C6C0A5 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C700B6 | 0_2_00C700B6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C380BE | 0_2_00C380BE |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C7C04E | 0_2_00C7C04E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC6040 | 0_2_00CC6040 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE2057 | 0_2_00CE2057 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D1E078 | 0_2_00D1E078 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C90071 | 0_2_00C90071 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C94018 | 0_2_00C94018 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D16006 | 0_2_00D16006 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C7A024 | 0_2_00C7A024 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C9C02A | 0_2_00C9C02A |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE002A | 0_2_00CE002A |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D9202B | 0_2_00D9202B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C4403A | 0_2_00C4403A |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CBA1CF | 0_2_00CBA1CF |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C821CF | 0_2_00C821CF |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC81E6 | 0_2_00CC81E6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C841FF | 0_2_00C841FF |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C8E1F1 | 0_2_00C8E1F1 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BFE180 | 0_2_00BFE180 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C86186 | 0_2_00C86186 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C5A198 | 0_2_00C5A198 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA81A2 | 0_2_00CA81A2 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BF81CC | 0_2_00BF81CC |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C401BF | 0_2_00C401BF |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA2153 | 0_2_00CA2153 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA0156 | 0_2_00CA0156 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C5C16E | 0_2_00C5C16E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB8172 | 0_2_00CB8172 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C4C17F | 0_2_00C4C17F |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB0176 | 0_2_00CB0176 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C80119 | 0_2_00C80119 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BE8169 | 0_2_00BE8169 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA4113 | 0_2_00CA4113 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BD6160 | 0_2_00BD6160 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BFC09E | 0_2_00BFC09E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C9A12D | 0_2_00C9A12D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D08129 | 0_2_00D08129 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C962C8 | 0_2_00C962C8 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC02C9 | 0_2_00CC02C9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C442E8 | 0_2_00C442E8 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C602F7 | 0_2_00C602F7 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C522F7 | 0_2_00C522F7 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC428B | 0_2_00CC428B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C8A2AA | 0_2_00C8A2AA |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C3A2A5 | 0_2_00C3A2A5 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CBE2A7 | 0_2_00CBE2A7 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BF42D0 | 0_2_00BF42D0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CEA2B7 | 0_2_00CEA2B7 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB62B1 | 0_2_00CB62B1 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CD02B3 | 0_2_00CD02B3 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BEE220 | 0_2_00BEE220 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C50204 | 0_2_00C50204 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BD4270 | 0_2_00BD4270 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D12203 | 0_2_00D12203 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CDE215 | 0_2_00CDE215 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D1A22D | 0_2_00D1A22D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C783CB | 0_2_00C783CB |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE03DE | 0_2_00CE03DE |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF43D0 | 0_2_00CF43D0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CEC3E0 | 0_2_00CEC3E0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C4A3FE | 0_2_00C4A3FE |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE4387 | 0_2_00CE4387 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C82398 | 0_2_00C82398 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CAC3AC | 0_2_00CAC3AC |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BF83D8 | 0_2_00BF83D8 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C74357 | 0_2_00C74357 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D0E343 | 0_2_00D0E343 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D04376 | 0_2_00D04376 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CD630E | 0_2_00CD630E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C46317 | 0_2_00C46317 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA6323 | 0_2_00CA6323 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C72328 | 0_2_00C72328 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D9C4DC | 0_2_00D9C4DC |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE64C6 | 0_2_00CE64C6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CBA4D2 | 0_2_00CBA4D2 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C8E4E6 | 0_2_00C8E4E6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB84F6 | 0_2_00CB84F6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CD6487 | 0_2_00CD6487 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C48495 | 0_2_00C48495 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BF24E0 | 0_2_00BF24E0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C3E4A5 | 0_2_00C3E4A5 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC24B8 | 0_2_00CC24B8 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BF04C6 | 0_2_00BF04C6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF44B0 | 0_2_00CF44B0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C0A440 | 0_2_00C0A440 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CCE44F | 0_2_00CCE44F |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D0C445 | 0_2_00D0C445 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C10460 | 0_2_00C10460 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D06478 | 0_2_00D06478 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CFA466 | 0_2_00CFA466 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C8A467 | 0_2_00C8A467 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C34473 | 0_2_00C34473 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C5C476 | 0_2_00C5C476 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CAA47C | 0_2_00CAA47C |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C80470 | 0_2_00C80470 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C4E414 | 0_2_00C4E414 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC6412 | 0_2_00CC6412 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C5E42D | 0_2_00C5E42D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB2424 | 0_2_00CB2424 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB443A | 0_2_00CB443A |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB6431 | 0_2_00CB6431 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE25DE | 0_2_00CE25DE |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C0A5D4 | 0_2_00C0A5D4 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA25ED | 0_2_00CA25ED |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C385F8 | 0_2_00C385F8 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB05F6 | 0_2_00CB05F6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C4258D | 0_2_00C4258D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BD65F0 | 0_2_00BD65F0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C0C5A0 | 0_2_00C0C5A0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C325AE | 0_2_00C325AE |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB25B0 | 0_2_00CB25B0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BFC53C | 0_2_00BFC53C |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CFC545 | 0_2_00CFC545 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C92578 | 0_2_00C92578 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C7657D | 0_2_00C7657D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BF4560 | 0_2_00BF4560 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C90528 | 0_2_00C90528 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C4C52B | 0_2_00C4C52B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C7A537 | 0_2_00C7A537 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C5A536 | 0_2_00C5A536 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CD86D4 | 0_2_00CD86D4 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C966EB | 0_2_00C966EB |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C526EE | 0_2_00C526EE |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C106F0 | 0_2_00C106F0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C7E6F1 | 0_2_00C7E6F1 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE86F9 | 0_2_00CE86F9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF26F6 | 0_2_00CF26F6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BDE687 | 0_2_00BDE687 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D0069E | 0_2_00D0069E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF0691 | 0_2_00CF0691 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BF46D0 | 0_2_00BF46D0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CDE6B4 | 0_2_00CDE6B4 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BEE630 | 0_2_00BEE630 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C08650 | 0_2_00C08650 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB8652 | 0_2_00CB8652 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CD4653 | 0_2_00CD4653 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C74665 | 0_2_00C74665 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA0669 | 0_2_00CA0669 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF666B | 0_2_00CF666B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C6866D | 0_2_00C6866D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C6C66D | 0_2_00C6C66D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D12615 | 0_2_00D12615 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C9C600 | 0_2_00C9C600 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C8861C | 0_2_00C8861C |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C3A61F | 0_2_00C3A61F |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CDC621 | 0_2_00CDC621 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C9E626 | 0_2_00C9E626 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C66638 | 0_2_00C66638 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C3C7C1 | 0_2_00C3C7C1 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C847C6 | 0_2_00C847C6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC07DA | 0_2_00CC07DA |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C947F1 | 0_2_00C947F1 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D0A790 | 0_2_00D0A790 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C8278C | 0_2_00C8278C |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C6078C | 0_2_00C6078C |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C50789 | 0_2_00C50789 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA479E | 0_2_00CA479E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C80796 | 0_2_00C80796 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC47AE | 0_2_00CC47AE |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE07BC | 0_2_00CE07BC |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D10747 | 0_2_00D10747 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC2768 | 0_2_00CC2768 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C9877C | 0_2_00C9877C |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB077D | 0_2_00CB077D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CEA719 | 0_2_00CEA719 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C5471D | 0_2_00C5471D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C5671E | 0_2_00C5671E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BE2750 | 0_2_00BE2750 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CD28C9 | 0_2_00CD28C9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C3E8CD | 0_2_00C3E8CD |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE48DC | 0_2_00CE48DC |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C488D3 | 0_2_00C488D3 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BEC8A0 | 0_2_00BEC8A0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CAA898 | 0_2_00CAA898 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE68AC | 0_2_00CE68AC |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C088B0 | 0_2_00C088B0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C5C8B4 | 0_2_00C5C8B4 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C7C841 | 0_2_00C7C841 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CDE840 | 0_2_00CDE840 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C5A854 | 0_2_00C5A854 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C4E850 | 0_2_00C4E850 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CEE853 | 0_2_00CEE853 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C52874 | 0_2_00C52874 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF0872 | 0_2_00CF0872 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C4A804 | 0_2_00C4A804 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C5E805 | 0_2_00C5E805 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC6803 | 0_2_00CC6803 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CAC820 | 0_2_00CAC820 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CBC825 | 0_2_00CBC825 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BDC840 | 0_2_00BDC840 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB89C4 | 0_2_00CB89C4 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CBE9D0 | 0_2_00CBE9D0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C3A9DD | 0_2_00C3A9DD |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C669E6 | 0_2_00C669E6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C109E0 | 0_2_00C109E0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C4A986 | 0_2_00C4A986 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C34986 | 0_2_00C34986 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C4C988 | 0_2_00C4C988 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BFC9EB | 0_2_00BFC9EB |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C9A99E | 0_2_00C9A99E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C68998 | 0_2_00C68998 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C929A9 | 0_2_00C929A9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C569BA | 0_2_00C569BA |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C76946 | 0_2_00C76946 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C36956 | 0_2_00C36956 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C4296C | 0_2_00C4296C |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BF6910 | 0_2_00BF6910 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF290E | 0_2_00CF290E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C9C918 | 0_2_00C9C918 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC691D | 0_2_00CC691D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CCA918 | 0_2_00CCA918 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D10904 | 0_2_00D10904 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C86912 | 0_2_00C86912 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BEE960 | 0_2_00BEE960 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA093B | 0_2_00CA093B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB693F | 0_2_00CB693F |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BF8ABC | 0_2_00BF8ABC |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CDAAC9 | 0_2_00CDAAC9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C6CACA | 0_2_00C6CACA |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C8CAD3 | 0_2_00C8CAD3 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C80AFA | 0_2_00C80AFA |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CD8AF8 | 0_2_00CD8AF8 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC0A8D | 0_2_00CC0A8D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C40A91 | 0_2_00C40A91 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D12A87 | 0_2_00D12A87 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D14ABC | 0_2_00D14ABC |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CAEAB7 | 0_2_00CAEAB7 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C6AAB9 | 0_2_00C6AAB9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C0CA40 | 0_2_00C0CA40 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C90A4D | 0_2_00C90A4D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C94A6A | 0_2_00C94A6A |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C74A6B | 0_2_00C74A6B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C5EA74 | 0_2_00C5EA74 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D00A65 | 0_2_00D00A65 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CBCA7C | 0_2_00CBCA7C |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CDCA0B | 0_2_00CDCA0B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE8A00 | 0_2_00CE8A00 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D1AA31 | 0_2_00D1AA31 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C44BC9 | 0_2_00C44BC9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BD4BA0 | 0_2_00BD4BA0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF4BD2 | 0_2_00CF4BD2 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C82BFB | 0_2_00C82BFB |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BEEB80 | 0_2_00BEEB80 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C54B87 | 0_2_00C54B87 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C92BA9 | 0_2_00C92BA9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CFEBA5 | 0_2_00CFEBA5 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C52B49 | 0_2_00C52B49 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D0AB73 | 0_2_00D0AB73 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BE8B1B | 0_2_00BE8B1B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C78B60 | 0_2_00C78B60 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C5EB68 | 0_2_00C5EB68 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA8B7A | 0_2_00CA8B7A |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA6B74 | 0_2_00CA6B74 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CFCB1E | 0_2_00CFCB1E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C60B13 | 0_2_00C60B13 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C88B21 | 0_2_00C88B21 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CECB3D | 0_2_00CECB3D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BDAB40 | 0_2_00BDAB40 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CCCB31 | 0_2_00CCCB31 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C4CCC1 | 0_2_00C4CCC1 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C98CC0 | 0_2_00C98CC0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C36CCF | 0_2_00C36CCF |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF0CDC | 0_2_00CF0CDC |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BE4CA0 | 0_2_00BE4CA0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C6ECEA | 0_2_00C6ECEA |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C86CF0 | 0_2_00C86CF0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE4CF2 | 0_2_00CE4CF2 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CDEC85 | 0_2_00CDEC85 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CD0C9F | 0_2_00CD0C9F |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CBAC9E | 0_2_00CBAC9E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D0EC86 | 0_2_00D0EC86 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C7CC9B | 0_2_00C7CC9B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C5ECA7 | 0_2_00C5ECA7 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE6CA7 | 0_2_00CE6CA7 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CBCCA0 | 0_2_00CBCCA0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CCECA7 | 0_2_00CCECA7 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA4CB1 | 0_2_00CA4CB1 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C8CC49 | 0_2_00C8CC49 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C40C41 | 0_2_00C40C41 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB2C59 | 0_2_00CB2C59 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C72C50 | 0_2_00C72C50 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CACC6F | 0_2_00CACC6F |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CEEC66 | 0_2_00CEEC66 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CAAC78 | 0_2_00CAAC78 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C5AC73 | 0_2_00C5AC73 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C5CC0F | 0_2_00C5CC0F |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE0C2A | 0_2_00CE0C2A |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C74C21 | 0_2_00C74C21 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D16C38 | 0_2_00D16C38 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C50C34 | 0_2_00C50C34 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D10DD5 | 0_2_00D10DD5 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C46DE5 | 0_2_00C46DE5 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C0CDF0 | 0_2_00C0CDF0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB8D83 | 0_2_00CB8D83 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C38D91 | 0_2_00C38D91 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C34DA2 | 0_2_00C34DA2 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C7EDA8 | 0_2_00C7EDA8 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C8EDB2 | 0_2_00C8EDB2 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C3ADB8 | 0_2_00C3ADB8 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C92DB7 | 0_2_00C92DB7 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C42D46 | 0_2_00C42D46 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BF6D2E | 0_2_00BF6D2E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D04D45 | 0_2_00D04D45 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C62D66 | 0_2_00C62D66 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C64D63 | 0_2_00C64D63 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF4D65 | 0_2_00CF4D65 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C4AD68 | 0_2_00C4AD68 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CBED72 | 0_2_00CBED72 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C48D7B | 0_2_00C48D7B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C76D18 | 0_2_00C76D18 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C10D20 | 0_2_00C10D20 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BFCD5E | 0_2_00BFCD5E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C9AD21 | 0_2_00C9AD21 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BFCD4C | 0_2_00BFCD4C |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C90ECA | 0_2_00C90ECA |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BD2EB0 | 0_2_00BD2EB0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BEAEB0 | 0_2_00BEAEB0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D18ECA | 0_2_00D18ECA |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC0ED3 | 0_2_00CC0ED3 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C88EE9 | 0_2_00C88EE9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CAEEE9 | 0_2_00CAEEE9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C86EE3 | 0_2_00C86EE3 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C32EF4 | 0_2_00C32EF4 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C54E8D | 0_2_00C54E8D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C08EA0 | 0_2_00C08EA0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C48EA4 | 0_2_00C48EA4 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D14EB4 | 0_2_00D14EB4 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D00EB7 | 0_2_00D00EB7 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB6E48 | 0_2_00CB6E48 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF2E58 | 0_2_00CF2E58 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D0EE6D | 0_2_00D0EE6D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CCAE0D | 0_2_00CCAE0D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D1AE12 | 0_2_00D1AE12 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C7CE02 | 0_2_00C7CE02 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D06E15 | 0_2_00D06E15 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CFEE01 | 0_2_00CFEE01 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BF2E6D | 0_2_00BF2E6D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BF0E6C | 0_2_00BF0E6C |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BFEE63 | 0_2_00BFEE63 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CD2E24 | 0_2_00CD2E24 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BDCE45 | 0_2_00BDCE45 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C9EE34 | 0_2_00C9EE34 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D04FD0 | 0_2_00D04FD0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA8FCB | 0_2_00CA8FCB |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C30FC4 | 0_2_00C30FC4 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00DA2FCE | 0_2_00DA2FCE |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC4FD5 | 0_2_00CC4FD5 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CFAFE9 | 0_2_00CFAFE9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C3CFF6 | 0_2_00C3CFF6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CECF9E | 0_2_00CECF9E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB8F90 | 0_2_00CB8F90 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D0AFA2 | 0_2_00D0AFA2 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C34F61 | 0_2_00C34F61 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF6F60 | 0_2_00CF6F60 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CD4F0D | 0_2_00CD4F0D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB4F13 | 0_2_00CB4F13 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C84F13 | 0_2_00C84F13 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB0F22 | 0_2_00CB0F22 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BE6F52 | 0_2_00BE6F52 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C76F29 | 0_2_00C76F29 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC2F39 | 0_2_00CC2F39 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA6F3D | 0_2_00CA6F3D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C7F0C3 | 0_2_00C7F0C3 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CFD0C3 | 0_2_00CFD0C3 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB30E6 | 0_2_00CB30E6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C990BD | 0_2_00C990BD |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C9D047 | 0_2_00C9D047 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C75051 | 0_2_00C75051 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BDD021 | 0_2_00BDD021 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D17072 | 0_2_00D17072 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BED003 | 0_2_00BED003 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC7073 | 0_2_00CC7073 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C61005 | 0_2_00C61005 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CAB013 | 0_2_00CAB013 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C4F01B | 0_2_00C4F01B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE102A | 0_2_00CE102A |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C45035 | 0_2_00C45035 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D15020 | 0_2_00D15020 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C5903D | 0_2_00C5903D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C8B1CC | 0_2_00C8B1CC |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB71C6 | 0_2_00CB71C6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BF91AE | 0_2_00BF91AE |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D091C6 | 0_2_00D091C6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C8D1DF | 0_2_00C8D1DF |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C631DF | 0_2_00C631DF |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C6F180 | 0_2_00C6F180 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C3918A | 0_2_00C3918A |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C0F18B | 0_2_00C0F18B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D0D186 | 0_2_00D0D186 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C7D1A1 | 0_2_00C7D1A1 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE9150 | 0_2_00CE9150 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C3D163 | 0_2_00C3D163 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF717F | 0_2_00CF717F |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CD7173 | 0_2_00CD7173 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C5B115 | 0_2_00C5B115 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C8311A | 0_2_00C8311A |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C4D110 | 0_2_00C4D110 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CBD129 | 0_2_00CBD129 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D9713D | 0_2_00D9713D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C51123 | 0_2_00C51123 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C8F13A | 0_2_00C8F13A |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CD9130 | 0_2_00CD9130 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C9F2C3 | 0_2_00C9F2C3 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CBD2D6 | 0_2_00CBD2D6 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C552E3 | 0_2_00C552E3 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C09280 | 0_2_00C09280 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF9282 | 0_2_00CF9282 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C67296 | 0_2_00C67296 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C9B298 | 0_2_00C9B298 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C4B2AF | 0_2_00C4B2AF |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BE1227 | 0_2_00BE1227 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CDF26E | 0_2_00CDF26E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA327B | 0_2_00CA327B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CAF27C | 0_2_00CAF27C |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C53272 | 0_2_00C53272 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA720C | 0_2_00CA720C |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C47213 | 0_2_00C47213 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CFF215 | 0_2_00CFF215 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D13233 | 0_2_00D13233 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C3F23A | 0_2_00C3F23A |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C5D23C | 0_2_00C5D23C |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C81231 | 0_2_00C81231 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D013D4 | 0_2_00D013D4 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D7D3D0 | 0_2_00D7D3D0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D0F3DC | 0_2_00D0F3DC |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D0B3C8 | 0_2_00D0B3C8 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C533E9 | 0_2_00C533E9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CFB3FD | 0_2_00CFB3FD |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C753F3 | 0_2_00C753F3 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA938B | 0_2_00CA938B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC138A | 0_2_00CC138A |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C91381 | 0_2_00C91381 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC5382 | 0_2_00CC5382 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA7397 | 0_2_00CA7397 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C833AE | 0_2_00C833AE |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C6B3A1 | 0_2_00C6B3A1 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BD73D0 | 0_2_00BD73D0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C593B3 | 0_2_00C593B3 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BDF3C0 | 0_2_00BDF3C0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C45346 | 0_2_00C45346 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CCB34B | 0_2_00CCB34B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C73351 | 0_2_00C73351 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BD9310 | 0_2_00BD9310 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CCD37C | 0_2_00CCD37C |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CFF37B | 0_2_00CFF37B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BFF377 | 0_2_00BFF377 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CCF31C | 0_2_00CCF31C |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF3314 | 0_2_00CF3314 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D03330 | 0_2_00D03330 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D1B33E | 0_2_00D1B33E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF733F | 0_2_00CF733F |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BFD34A | 0_2_00BFD34A |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BF1340 | 0_2_00BF1340 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF54C4 | 0_2_00CF54C4 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00DA14F9 | 0_2_00DA14F9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D094FA | 0_2_00D094FA |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D174E4 | 0_2_00D174E4 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C7B4FA | 0_2_00C7B4FA |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BDD4F3 | 0_2_00BDD4F3 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C7F488 | 0_2_00C7F488 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CD9499 | 0_2_00CD9499 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C414A5 | 0_2_00C414A5 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC94A1 | 0_2_00CC94A1 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE74BF | 0_2_00CE74BF |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CF144B | 0_2_00CF144B |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CB945E | 0_2_00CB945E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C97469 | 0_2_00C97469 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE340C | 0_2_00CE340C |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BE747D | 0_2_00BE747D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00D1941D | 0_2_00D1941D |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CA142A | 0_2_00CA142A |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE942F | 0_2_00CE942F |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CDF42E | 0_2_00CDF42E |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CED428 | 0_2_00CED428 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CFD426 | 0_2_00CFD426 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00BF7440 | 0_2_00BF7440 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CE95C0 | 0_2_00CE95C0 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C315D9 | 0_2_00C315D9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CC75FF | 0_2_00CC75FF |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00E4D5A5 | 0_2_00E4D5A5 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00C7D581 | 0_2_00C7D581 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | Code function: 0_2_00CD55A9 | 0_2_00CD55A9 |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: C2945B second address: C29465 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F8348D94566h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: C28D00 second address: C28D05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DA90ED second address: DA90F2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DA90F2 second address: DA9119 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jno 00007F834854C576h 0x0000000c jmp 00007F834854C587h 0x00000011 popad 0x00000012 push ebx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DA9119 second address: DA9158 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 jne 00007F8348D94568h 0x0000000e pushad 0x0000000f jmp 00007F8348D94579h 0x00000014 jmp 00007F8348D9456Fh 0x00000019 popad 0x0000001a pushad 0x0000001b pushad 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: D8FFE8 second address: D8FFEC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: D8FFEC second address: D8FFF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DA8226 second address: DA822C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DA83AC second address: DA83B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DA83B2 second address: DA83BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jo 00007F834854C582h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DA83BF second address: DA83C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DAAB0D second address: DAAB13 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DAAB13 second address: DAAB8D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b movsx ecx, cx 0x0000000e push 00000000h 0x00000010 jmp 00007F8348D9456Bh 0x00000015 call 00007F8348D94569h 0x0000001a jl 00007F8348D94570h 0x00000020 pushad 0x00000021 push ebx 0x00000022 pop ebx 0x00000023 jnc 00007F8348D94566h 0x00000029 popad 0x0000002a push eax 0x0000002b je 00007F8348D94572h 0x00000031 ja 00007F8348D9456Ch 0x00000037 mov eax, dword ptr [esp+04h] 0x0000003b pushad 0x0000003c push esi 0x0000003d jmp 00007F8348D94574h 0x00000042 pop esi 0x00000043 push eax 0x00000044 push edx 0x00000045 jmp 00007F8348D94576h 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DAAB8D second address: DAABF3 instructions: 0x00000000 rdtsc 0x00000002 je 00007F834854C576h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov eax, dword ptr [eax] 0x0000000d pushad 0x0000000e push esi 0x0000000f push edx 0x00000010 pop edx 0x00000011 pop esi 0x00000012 jo 00007F834854C578h 0x00000018 push ebx 0x00000019 pop ebx 0x0000001a popad 0x0000001b mov dword ptr [esp+04h], eax 0x0000001f jl 00007F834854C582h 0x00000025 jno 00007F834854C57Ch 0x0000002b pop eax 0x0000002c mov edi, edx 0x0000002e push 00000003h 0x00000030 mov edi, 6C5DF652h 0x00000035 push 00000000h 0x00000037 mov edx, dword ptr [ebp+122D39EEh] 0x0000003d push 00000003h 0x0000003f jmp 00007F834854C586h 0x00000044 push E101FEB3h 0x00000049 push eax 0x0000004a push edx 0x0000004b push esi 0x0000004c push ebx 0x0000004d pop ebx 0x0000004e pop esi 0x0000004f rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DAABF3 second address: DAAC82 instructions: 0x00000000 rdtsc 0x00000002 js 00007F8348D9457Dh 0x00000008 jmp 00007F8348D94577h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f xor dword ptr [esp], 2101FEB3h 0x00000016 push 00000000h 0x00000018 push ecx 0x00000019 call 00007F8348D94568h 0x0000001e pop ecx 0x0000001f mov dword ptr [esp+04h], ecx 0x00000023 add dword ptr [esp+04h], 00000018h 0x0000002b inc ecx 0x0000002c push ecx 0x0000002d ret 0x0000002e pop ecx 0x0000002f ret 0x00000030 lea ebx, dword ptr [ebp+124559FAh] 0x00000036 push 00000000h 0x00000038 push edi 0x00000039 call 00007F8348D94568h 0x0000003e pop edi 0x0000003f mov dword ptr [esp+04h], edi 0x00000043 add dword ptr [esp+04h], 0000001Bh 0x0000004b inc edi 0x0000004c push edi 0x0000004d ret 0x0000004e pop edi 0x0000004f ret 0x00000050 xchg eax, ebx 0x00000051 pushad 0x00000052 pushad 0x00000053 push esi 0x00000054 pop esi 0x00000055 jmp 00007F8348D94574h 0x0000005a popad 0x0000005b push eax 0x0000005c push edx 0x0000005d push eax 0x0000005e pop eax 0x0000005f rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DAAC82 second address: DAAC96 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b jo 00007F834854C576h 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DAAC96 second address: DAACAF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8348D94575h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DAAD31 second address: DAAD37 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DAAD37 second address: DAAD3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DAAF01 second address: DAAF08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DAB01D second address: DAB021 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DAB021 second address: DAB025 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DAB025 second address: DAB041 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F8348D9456Fh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DAB041 second address: DAB046 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DAB046 second address: DAB04C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DAB04C second address: DAB08B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pop eax 0x00000008 push 00000000h 0x0000000a push ebx 0x0000000b call 00007F834854C578h 0x00000010 pop ebx 0x00000011 mov dword ptr [esp+04h], ebx 0x00000015 add dword ptr [esp+04h], 00000019h 0x0000001d inc ebx 0x0000001e push ebx 0x0000001f ret 0x00000020 pop ebx 0x00000021 ret 0x00000022 mov dword ptr [ebp+122D1E6Dh], eax 0x00000028 lea ebx, dword ptr [ebp+12455A0Eh] 0x0000002e xchg eax, ebx 0x0000002f push ebx 0x00000030 jp 00007F834854C57Ch 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DBCAEB second address: DBCAF1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: D988A0 second address: D988A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: D988A4 second address: D988AE instructions: 0x00000000 rdtsc 0x00000002 jne 00007F8348D94566h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCBE17 second address: DCBE1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCBE1F second address: DCBE24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCC0F0 second address: DCC0F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCC62F second address: DCC644 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8348D9456Ch 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCCBB6 second address: DCCBC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push edi 0x00000007 pop edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCCBC0 second address: DCCBC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCCBC4 second address: DCCBF2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F834854C582h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pushad 0x0000000b jmp 00007F834854C57Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 je 00007F834854C576h 0x00000018 push ecx 0x00000019 pop ecx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCCD36 second address: DCCD3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCCD3C second address: DCCD40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCCD40 second address: DCCD44 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCCD44 second address: DCCD4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCCD4A second address: DCCD54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCCD54 second address: DCCD5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCD2CA second address: DCD2CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCD44E second address: DCD458 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCD458 second address: DCD45E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCD45E second address: DCD462 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCD5D7 second address: DCD606 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop ecx 0x00000007 jmp 00007F8348D9456Fh 0x0000000c jne 00007F8348D94568h 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 push edi 0x00000018 jne 00007F8348D94566h 0x0000001e js 00007F8348D94566h 0x00000024 pop edi 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCDA2F second address: DCDA34 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DCDA34 second address: DCDA81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F8348D94566h 0x0000000a push edx 0x0000000b pop edx 0x0000000c popad 0x0000000d pushad 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 push edi 0x00000011 pop edi 0x00000012 jmp 00007F8348D94574h 0x00000017 jmp 00007F8348D94575h 0x0000001c popad 0x0000001d pop edx 0x0000001e pop eax 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007F8348D9456Dh 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: D8E4EC second address: D8E4F6 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F834854C582h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DD2BBC second address: DD2BC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DD323A second address: DD323F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DD323F second address: DD3245 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DD5F13 second address: DD5F17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DD5F17 second address: DD5F38 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007F8348D94571h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jc 00007F8348D9457Ah 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DD5F38 second address: DD5F3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DDB52E second address: DDB534 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DDB534 second address: DDB538 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DDB538 second address: DDB53C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DDB53C second address: DDB571 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c pushad 0x0000000d jmp 00007F834854C583h 0x00000012 jbe 00007F834854C57Ch 0x00000018 jnl 00007F834854C576h 0x0000001e popad 0x0000001f mov eax, dword ptr [eax] 0x00000021 push eax 0x00000022 push edx 0x00000023 push edx 0x00000024 pushad 0x00000025 popad 0x00000026 pop edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DDB571 second address: DDB59F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F8348D94578h 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 jns 00007F8348D94566h 0x00000018 push eax 0x00000019 pop eax 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DDC0E9 second address: DDC0EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DDC3DF second address: DDC3E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DDDBE8 second address: DDDBEF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: D96BA8 second address: D96BAE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: D96BAE second address: D96BC7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F834854C585h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DDE236 second address: DDE23B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DDE9D4 second address: DDE9DF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007F834854C576h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE10A6 second address: DE10C7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8348D94575h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pushad 0x0000000f popad 0x00000010 pop ebx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE10C7 second address: DE10CD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE10CD second address: DE112F instructions: 0x00000000 rdtsc 0x00000002 jne 00007F8348D94566h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d jno 00007F8348D94571h 0x00000013 or dword ptr [ebp+1245C26Eh], eax 0x00000019 push 00000000h 0x0000001b push 00000000h 0x0000001d push ebp 0x0000001e call 00007F8348D94568h 0x00000023 pop ebp 0x00000024 mov dword ptr [esp+04h], ebp 0x00000028 add dword ptr [esp+04h], 00000017h 0x00000030 inc ebp 0x00000031 push ebp 0x00000032 ret 0x00000033 pop ebp 0x00000034 ret 0x00000035 push 00000000h 0x00000037 mov di, cx 0x0000003a xchg eax, ebx 0x0000003b jmp 00007F8348D94571h 0x00000040 push eax 0x00000041 push edi 0x00000042 push eax 0x00000043 push edx 0x00000044 push eax 0x00000045 pop eax 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE3165 second address: DE3169 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE84DD second address: DE84E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE198C second address: DE1991 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE1991 second address: DE199E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE199E second address: DE19A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE39C6 second address: DE39CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DEB84F second address: DEB857 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DEB857 second address: DEB879 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F8348D94579h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE77C9 second address: DE77CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE8658 second address: DE865D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE96B4 second address: DE96C0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push ebx 0x00000009 push ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE77CF second address: DE77E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d jng 00007F8348D94574h 0x00000013 push eax 0x00000014 push edx 0x00000015 push ebx 0x00000016 pop ebx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE865D second address: DE8663 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE96C0 second address: DE9733 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop ebx 0x00000006 nop 0x00000007 mov di, cx 0x0000000a push dword ptr fs:[00000000h] 0x00000011 push 00000000h 0x00000013 push ebp 0x00000014 call 00007F8348D94568h 0x00000019 pop ebp 0x0000001a mov dword ptr [esp+04h], ebp 0x0000001e add dword ptr [esp+04h], 0000001Ah 0x00000026 inc ebp 0x00000027 push ebp 0x00000028 ret 0x00000029 pop ebp 0x0000002a ret 0x0000002b pushad 0x0000002c or eax, dword ptr [ebp+122D1E1Fh] 0x00000032 mov ecx, 54C7CD53h 0x00000037 popad 0x00000038 add di, 9EE6h 0x0000003d mov dword ptr fs:[00000000h], esp 0x00000044 mov dword ptr [ebp+12450028h], edx 0x0000004a mov eax, dword ptr [ebp+122D0FF5h] 0x00000050 mov edi, dword ptr [ebp+12450130h] 0x00000056 push FFFFFFFFh 0x00000058 push eax 0x00000059 push eax 0x0000005a push edx 0x0000005b jg 00007F8348D94570h 0x00000061 jmp 00007F8348D9456Ah 0x00000066 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DEBA6E second address: DEBA75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DEC9D5 second address: DEC9DF instructions: 0x00000000 rdtsc 0x00000002 jo 00007F8348D94566h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE8663 second address: DE8710 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 mov edi, dword ptr [ebp+124534B3h] 0x0000000e push dword ptr fs:[00000000h] 0x00000015 push 00000000h 0x00000017 push edi 0x00000018 call 00007F834854C578h 0x0000001d pop edi 0x0000001e mov dword ptr [esp+04h], edi 0x00000022 add dword ptr [esp+04h], 00000017h 0x0000002a inc edi 0x0000002b push edi 0x0000002c ret 0x0000002d pop edi 0x0000002e ret 0x0000002f mov dword ptr [ebp+12450130h], esi 0x00000035 mov dword ptr fs:[00000000h], esp 0x0000003c call 00007F834854C585h 0x00000041 mov ebx, dword ptr [ebp+12463089h] 0x00000047 pop ebx 0x00000048 ja 00007F834854C57Ch 0x0000004e mov eax, dword ptr [ebp+122D0C35h] 0x00000054 mov di, ax 0x00000057 push FFFFFFFFh 0x00000059 push 00000000h 0x0000005b push ebp 0x0000005c call 00007F834854C578h 0x00000061 pop ebp 0x00000062 mov dword ptr [esp+04h], ebp 0x00000066 add dword ptr [esp+04h], 00000018h 0x0000006e inc ebp 0x0000006f push ebp 0x00000070 ret 0x00000071 pop ebp 0x00000072 ret 0x00000073 jmp 00007F834854C57Fh 0x00000078 nop 0x00000079 push edx 0x0000007a push eax 0x0000007b push edx 0x0000007c jl 00007F834854C576h 0x00000082 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE9733 second address: DE973D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007F8348D94566h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DEBA75 second address: DEBA7A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DEC9DF second address: DEC9EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 js 00007F8348D94566h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DED870 second address: DED87B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edi 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DEE9E2 second address: DEE9E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DEBA7A second address: DEBA96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F834854C582h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DEC9EA second address: DEC9F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d pop ebx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DEE9E6 second address: DEE9FF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F834854C585h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DED87B second address: DED8F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edi 0x00000006 nop 0x00000007 mov edi, dword ptr [ebp+122D39D2h] 0x0000000d push dword ptr fs:[00000000h] 0x00000014 jmp 00007F8348D9456Ch 0x00000019 mov dword ptr fs:[00000000h], esp 0x00000020 push 00000000h 0x00000022 push edx 0x00000023 call 00007F8348D94568h 0x00000028 pop edx 0x00000029 mov dword ptr [esp+04h], edx 0x0000002d add dword ptr [esp+04h], 00000016h 0x00000035 inc edx 0x00000036 push edx 0x00000037 ret 0x00000038 pop edx 0x00000039 ret 0x0000003a sbb di, 2E9Bh 0x0000003f mov eax, dword ptr [ebp+122D067Dh] 0x00000045 push FFFFFFFFh 0x00000047 mov ebx, dword ptr [ebp+122D1C8Ah] 0x0000004d push eax 0x0000004e push eax 0x0000004f push edx 0x00000050 ja 00007F8348D9457Dh 0x00000056 jmp 00007F8348D94577h 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DEBA96 second address: DEBA9B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DED8F3 second address: DED90F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8348D94578h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DF1856 second address: DF18D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F834854C580h 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e push 00000000h 0x00000010 push edx 0x00000011 call 00007F834854C578h 0x00000016 pop edx 0x00000017 mov dword ptr [esp+04h], edx 0x0000001b add dword ptr [esp+04h], 00000018h 0x00000023 inc edx 0x00000024 push edx 0x00000025 ret 0x00000026 pop edx 0x00000027 ret 0x00000028 mov bh, 85h 0x0000002a push 00000000h 0x0000002c mov dword ptr [ebp+122D1E72h], edi 0x00000032 push 00000000h 0x00000034 push 00000000h 0x00000036 push ebx 0x00000037 call 00007F834854C578h 0x0000003c pop ebx 0x0000003d mov dword ptr [esp+04h], ebx 0x00000041 add dword ptr [esp+04h], 00000016h 0x00000049 inc ebx 0x0000004a push ebx 0x0000004b ret 0x0000004c pop ebx 0x0000004d ret 0x0000004e call 00007F834854C583h 0x00000053 mov dword ptr [ebp+12450028h], ecx 0x00000059 pop ebx 0x0000005a xchg eax, esi 0x0000005b pushad 0x0000005c push eax 0x0000005d push edx 0x0000005e push eax 0x0000005f push edx 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DF18D9 second address: DF18DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DF18DD second address: DF18E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DF18E1 second address: DF18F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e js 00007F8348D94570h 0x00000014 push eax 0x00000015 push edx 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DF090B second address: DF090F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DEFB71 second address: DEFB7B instructions: 0x00000000 rdtsc 0x00000002 jng 00007F8348D94566h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DF29B7 second address: DF29C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e push eax 0x0000000f pop eax 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DF2B03 second address: DF2B0F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 pushad 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DF4AF8 second address: DF4AFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DF4AFC second address: DF4B18 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F8348D94566h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F8348D9456Eh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DF8838 second address: DF884B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F834854C576h 0x0000000a pushad 0x0000000b popad 0x0000000c jc 00007F834854C576h 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DF5AB7 second address: DF5ABB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DF5ABB second address: DF5AC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DF5AC1 second address: DF5AC6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DFB30B second address: DFB325 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F834854C581h 0x00000008 pushad 0x00000009 push esi 0x0000000a pop esi 0x0000000b push edx 0x0000000c pop edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DFB325 second address: DFB344 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 jp 00007F8348D945A3h 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F8348D9456Eh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DFB344 second address: DFB348 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DFB348 second address: DFB366 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F8348D94573h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E03451 second address: E0345F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007F834854C578h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E02B7B second address: E02B7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E02B7F second address: E02B85 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E02B85 second address: E02B8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E02B8B second address: E02BA3 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jl 00007F834854C576h 0x00000009 jns 00007F834854C576h 0x0000000f pop esi 0x00000010 push eax 0x00000011 push edx 0x00000012 jns 00007F834854C576h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E02FA5 second address: E02FA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E02FA9 second address: E02FAF instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E02FAF second address: E02FB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E05848 second address: E0586E instructions: 0x00000000 rdtsc 0x00000002 ja 00007F834854C582h 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F834854C57Eh 0x0000000f push edi 0x00000010 pop edi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E0586E second address: E05872 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E05872 second address: E05878 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E0F672 second address: E0F676 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: D9C012 second address: D9C032 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F834854C582h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: D9C032 second address: D9C03D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jl 00007F8348D94566h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: D9C03D second address: D9C043 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E0E478 second address: E0E47E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E0E9F7 second address: E0EA03 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F834854C576h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E0EA03 second address: E0EA07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E0EA07 second address: E0EA0D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E0EA0D second address: E0EA1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jne 00007F8348D94566h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E0EB6D second address: E0EB71 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E0ECC8 second address: E0ECE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F8348D94571h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E0ECE0 second address: E0ECE6 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E0EE29 second address: E0EE35 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 js 00007F8348D94566h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E0EE35 second address: E0EE3B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E0F22D second address: E0F273 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F8348D94572h 0x0000000a pushad 0x0000000b jmp 00007F8348D9456Fh 0x00000010 push eax 0x00000011 pushad 0x00000012 popad 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F8348D94579h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E0F530 second address: E0F536 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E16F5F second address: E16F65 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E15DFC second address: E15E0E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F834854C57Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E15E0E second address: E15E14 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E15F99 second address: E15FAA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F834854C576h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e pop edi 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E15FAA second address: E15FC5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F8348D94575h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E15993 second address: E15997 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E15997 second address: E159B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8348D9456Eh 0x00000007 jl 00007F8348D94566h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E159B3 second address: E159B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E159B7 second address: E159D6 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jmp 00007F8348D9456Fh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jg 00007F8348D9456Eh 0x00000011 push eax 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E169E0 second address: E169E6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E16C5F second address: E16C8A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8348D9456Fh 0x00000009 jmp 00007F8348D94578h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E16C8A second address: E16C8E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E1859C second address: E185A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E185A0 second address: E185B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F834854C57Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pushad 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E185B3 second address: E185D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8348D94575h 0x00000009 pop ecx 0x0000000a push ecx 0x0000000b jo 00007F8348D94566h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E1D517 second address: E1D527 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a je 00007F834854C576h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E1D527 second address: E1D531 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F8348D94566h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E1D531 second address: E1D538 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E1E1FB second address: E1E21A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8348D94575h 0x00000009 jl 00007F8348D94566h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E1E21A second address: E1E247 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F834854C582h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e jmp 00007F834854C57Eh 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E1E247 second address: E1E24D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E222B7 second address: E222BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E222BC second address: E222C3 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E25EDC second address: E25EE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E25EE5 second address: E25EFF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8348D94576h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE4318 second address: DE4332 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c jmp 00007F834854C57Bh 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE4410 second address: DE4425 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F8348D9456Eh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE4980 second address: DE498F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edi 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE498F second address: DE49BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 mov eax, dword ptr [eax] 0x00000009 pushad 0x0000000a jo 00007F8348D94578h 0x00000010 jmp 00007F8348D94572h 0x00000015 push edi 0x00000016 push ebx 0x00000017 pop ebx 0x00000018 pop edi 0x00000019 popad 0x0000001a mov dword ptr [esp+04h], eax 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE49BF second address: DE49C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE49C6 second address: DE4A17 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop eax 0x00000009 push 00000000h 0x0000000b push edx 0x0000000c call 00007F8348D94568h 0x00000011 pop edx 0x00000012 mov dword ptr [esp+04h], edx 0x00000016 add dword ptr [esp+04h], 00000017h 0x0000001e inc edx 0x0000001f push edx 0x00000020 ret 0x00000021 pop edx 0x00000022 ret 0x00000023 sub dword ptr [ebp+122D2BFEh], edx 0x00000029 jg 00007F8348D94568h 0x0000002f mov dh, 4Ah 0x00000031 push 06BACF5Fh 0x00000036 push eax 0x00000037 push eax 0x00000038 push edx 0x00000039 jmp 00007F8348D94573h 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE4B03 second address: DE4B07 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE4B07 second address: DE4B0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE4B0D second address: DE4B17 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F834854C57Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE4B7F second address: DE4B8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 pushad 0x00000007 jng 00007F8348D9456Ch 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE4B8E second address: DE4BAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F834854C57Ch 0x0000000a popad 0x0000000b xchg eax, esi 0x0000000c or dx, 7597h 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE4BAB second address: DE4BB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE4C9C second address: DE4CD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 popad 0x0000000a popad 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f jo 00007F834854C58Dh 0x00000015 jmp 00007F834854C587h 0x0000001a mov eax, dword ptr [eax] 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f jne 00007F834854C576h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE4CD3 second address: DE4CD7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE4CD7 second address: DE4CFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 pushad 0x00000008 popad 0x00000009 pop ecx 0x0000000a popad 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f push ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F834854C585h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE4DE5 second address: DE4DF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F8348D94566h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE52FF second address: DE531A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F834854C586h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE531A second address: DE5320 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE546E second address: DE5472 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE55FE second address: DE5602 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE5602 second address: DE5606 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE56D5 second address: DE576D instructions: 0x00000000 rdtsc 0x00000002 jng 00007F8348D94566h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F8348D94575h 0x0000000f popad 0x00000010 mov dword ptr [esp], eax 0x00000013 push 00000000h 0x00000015 push eax 0x00000016 call 00007F8348D94568h 0x0000001b pop eax 0x0000001c mov dword ptr [esp+04h], eax 0x00000020 add dword ptr [esp+04h], 0000001Dh 0x00000028 inc eax 0x00000029 push eax 0x0000002a ret 0x0000002b pop eax 0x0000002c ret 0x0000002d mov edi, dword ptr [ebp+122D2655h] 0x00000033 mov dword ptr [ebp+122D1E34h], edx 0x00000039 lea eax, dword ptr [ebp+1248F013h] 0x0000003f mov ecx, 35ABB171h 0x00000044 mov ecx, dword ptr [ebp+122D3A26h] 0x0000004a push eax 0x0000004b js 00007F8348D9456Eh 0x00000051 jno 00007F8348D94568h 0x00000057 mov dword ptr [esp], eax 0x0000005a jmp 00007F8348D9456Ah 0x0000005f lea eax, dword ptr [ebp+1248EFCFh] 0x00000065 add edi, dword ptr [ebp+122D1E17h] 0x0000006b nop 0x0000006c jc 00007F8348D94574h 0x00000072 push eax 0x00000073 push edx 0x00000074 push ebx 0x00000075 pop ebx 0x00000076 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE576D second address: DE5771 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E2663F second address: E2665A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F8348D94573h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E2665A second address: E2665F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E2C5DC second address: E2C5E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E2C26F second address: E2C2CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b jmp 00007F834854C586h 0x00000010 jmp 00007F834854C57Fh 0x00000015 jmp 00007F834854C589h 0x0000001a popad 0x0000001b push esi 0x0000001c jmp 00007F834854C57Fh 0x00000021 pop esi 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E2C2CA second address: E2C304 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8348D94574h 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007F8348D94578h 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E2C304 second address: E2C312 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F834854C57Ah 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E2F85D second address: E2F868 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E2F868 second address: E2F873 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F834854C576h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E2F3FA second address: E2F41F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8348D94570h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a jl 00007F8348D94586h 0x00000010 push eax 0x00000011 push edx 0x00000012 push esi 0x00000013 pop esi 0x00000014 jnl 00007F8348D94566h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E33C87 second address: E33CAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F834854C588h 0x0000000c jne 00007F834854C576h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E33CAC second address: E33CB0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E33595 second address: E335C5 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jmp 00007F834854C57Ah 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebx 0x0000000c jg 00007F834854C576h 0x00000012 pop ebx 0x00000013 push esi 0x00000014 pushad 0x00000015 popad 0x00000016 push ebx 0x00000017 pop ebx 0x00000018 pop esi 0x00000019 popad 0x0000001a pushad 0x0000001b jmp 00007F834854C57Ch 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E3A0C4 second address: E3A0D7 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 pushad 0x00000008 pushad 0x00000009 jne 00007F8348D94566h 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E3A0D7 second address: E3A0DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DA100B second address: DA1019 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 jnp 00007F8348D94566h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E38BC2 second address: E38BD1 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F834854C576h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E38E61 second address: E38E65 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E39011 second address: E3901B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E3901B second address: E39021 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE50E3 second address: DE5109 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F834854C57Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push ebx 0x0000000c pushad 0x0000000d jmp 00007F834854C581h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE5109 second address: DE5162 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 nop 0x00000007 jg 00007F8348D94574h 0x0000000d mov dword ptr [ebp+122D1E3Dh], eax 0x00000013 mov ebx, dword ptr [ebp+1248F00Eh] 0x00000019 jnc 00007F8348D94568h 0x0000001f add eax, ebx 0x00000021 push 00000000h 0x00000023 push ecx 0x00000024 call 00007F8348D94568h 0x00000029 pop ecx 0x0000002a mov dword ptr [esp+04h], ecx 0x0000002e add dword ptr [esp+04h], 00000014h 0x00000036 inc ecx 0x00000037 push ecx 0x00000038 ret 0x00000039 pop ecx 0x0000003a ret 0x0000003b sub ecx, 3C5F5104h 0x00000041 nop 0x00000042 push eax 0x00000043 push edx 0x00000044 pushad 0x00000045 push eax 0x00000046 push edx 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE5162 second address: DE516D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F834854C576h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE516D second address: DE51D2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8348D9456Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jmp 00007F8348D9456Dh 0x00000010 push ebx 0x00000011 jmp 00007F8348D94576h 0x00000016 pop ebx 0x00000017 popad 0x00000018 nop 0x00000019 mov di, ax 0x0000001c push 00000004h 0x0000001e jnp 00007F8348D9456Ch 0x00000024 add dword ptr [ebp+122D207Ch], edx 0x0000002a nop 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e push edx 0x0000002f jmp 00007F8348D94575h 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE51D2 second address: DE51D6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DE51D6 second address: DE51DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E39DE7 second address: E39DF5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E39DF5 second address: E39DF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E39DF9 second address: E39E37 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jnl 00007F834854C594h 0x0000000f js 00007F834854C578h 0x00000015 pushad 0x00000016 popad 0x00000017 push ebx 0x00000018 jno 00007F834854C576h 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E3F363 second address: E3F36C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E3F36C second address: E3F384 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F834854C576h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jno 00007F834854C57Ch 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E3E6E8 second address: E3E6EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E3E6EC second address: E3E6F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E3E853 second address: E3E862 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jp 00007F8348D94566h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E3E862 second address: E3E87E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F834854C588h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E3E87E second address: E3E88E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 pop edx 0x00000008 jo 00007F8348D9456Ch 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E3EB40 second address: E3EB46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E3EB46 second address: E3EB4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E3EB4A second address: E3EB70 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F834854C583h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jnp 00007F834854C57Ah 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E3EF2F second address: E3EF35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E3EF35 second address: E3EF5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F834854C57Ch 0x00000009 popad 0x0000000a push ebx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d jmp 00007F834854C585h 0x00000012 pop ebx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E3EF5F second address: E3EF6D instructions: 0x00000000 rdtsc 0x00000002 je 00007F8348D94568h 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E3EF6D second address: E3EF73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E3EF73 second address: E3EF77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E483EF second address: E483F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E483F3 second address: E483F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: D9A41F second address: D9A424 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: D9A424 second address: D9A432 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F8348D94568h 0x00000008 push eax 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: D9A432 second address: D9A438 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: D9A438 second address: D9A43C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E4648A second address: E4648E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E4648E second address: E4649A instructions: 0x00000000 rdtsc 0x00000002 je 00007F8348D94566h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E4649A second address: E4649F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E46C7B second address: E46C82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E46C82 second address: E46C97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F834854C576h 0x0000000a pop ecx 0x0000000b push edi 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e pop edi 0x0000000f popad 0x00000010 push esi 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E46C97 second address: E46C9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E46FC2 second address: E46FC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E4726D second address: E47272 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E4758F second address: E47595 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E47595 second address: E475A1 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a push eax 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E47E98 second address: E47EAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F834854C582h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E47EAF second address: E47EB4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E51713 second address: E51719 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E50CC5 second address: E50CE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F8348D94577h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E5904E second address: E59054 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E59054 second address: E59069 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8348D9456Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E598CA second address: E598E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jmp 00007F834854C57Ch 0x0000000b push ecx 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E59BAB second address: E59BB1 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E59BB1 second address: E59BB6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E59BB6 second address: E59BEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 jng 00007F8348D94566h 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f js 00007F8348D9459Eh 0x00000015 pushad 0x00000016 jmp 00007F8348D9456Fh 0x0000001b jmp 00007F8348D9456Fh 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E62841 second address: E6285A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F834854C576h 0x0000000a push esi 0x0000000b pop esi 0x0000000c popad 0x0000000d jno 00007F834854C57Ch 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E629D1 second address: E629E0 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pushad 0x00000007 jng 00007F8348D94566h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E6E08F second address: E6E099 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F834854C576h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E6E099 second address: E6E0A4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E6E1DD second address: E6E1E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E6E1E1 second address: E6E1E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E6E1E9 second address: E6E204 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jp 00007F834854C576h 0x00000009 jmp 00007F834854C57Eh 0x0000000e push edi 0x0000000f pop edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E72A4B second address: E72A6A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jg 00007F8348D9456Eh 0x0000000f pushad 0x00000010 push eax 0x00000011 pop eax 0x00000012 pushad 0x00000013 popad 0x00000014 push ecx 0x00000015 pop ecx 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E72A6A second address: E72A73 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E725D5 second address: E725F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F8348D94579h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E743F2 second address: E743F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E743F6 second address: E743FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E7FED9 second address: E7FEDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E87911 second address: E87915 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E91034 second address: E9104D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F834854C584h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E912F1 second address: E912F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E916C6 second address: E916ED instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F834854C583h 0x0000000b popad 0x0000000c pushad 0x0000000d jo 00007F834854C578h 0x00000013 push edx 0x00000014 pop edx 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E916ED second address: E916F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E91848 second address: E9184C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E9184C second address: E91856 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F8348D94566h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E91856 second address: E91870 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F834854C585h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E93CEE second address: E93D16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 jg 00007F8348D9457Eh 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E93D16 second address: E93D1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E93D1C second address: E93D20 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: E978DD second address: E978E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: EA58A7 second address: EA58B5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jno 00007F8348D94568h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: EA58B5 second address: EA58BA instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: EB39B2 second address: EB39D4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8348D94576h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jp 00007F8348D94566h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: EB6934 second address: EB693A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: EB6649 second address: EB6653 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F8348D94566h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: EB6653 second address: EB6659 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: EB6659 second address: EB665F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: EB665F second address: EB667A instructions: 0x00000000 rdtsc 0x00000002 ja 00007F834854C58Dh 0x00000008 jmp 00007F834854C581h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: EB9C3C second address: EB9C55 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8348D9456Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F8348D94588h 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: EB9C55 second address: EB9C5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ECD4D7 second address: ECD4DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ECD4DB second address: ECD4E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ECD4E1 second address: ECD4E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ECD4E7 second address: ECD4EE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ECD4EE second address: ECD4F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ECD616 second address: ECD61D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ECDA68 second address: ECDA6E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ECDA6E second address: ECDA8B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007F834854C57Eh 0x00000008 jnp 00007F834854C576h 0x0000000e pop edx 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ECDD52 second address: ECDD77 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8348D94578h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a js 00007F8348D94578h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ECE02A second address: ECE036 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F834854C576h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ECE2E1 second address: ECE306 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8348D9456Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F8348D94577h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ECE306 second address: ECE31A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007F834854C576h 0x00000009 push edi 0x0000000a pop edi 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ECFE11 second address: ECFE17 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ECFE17 second address: ECFE26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F834854C57Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ECFE26 second address: ECFE2C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ECFE2C second address: ECFE45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F834854C57Bh 0x0000000d jnc 00007F834854C576h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ED167D second address: ED16BC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jmp 00007F8348D9456Fh 0x00000011 jnc 00007F8348D94566h 0x00000017 jmp 00007F8348D9456Bh 0x0000001c jmp 00007F8348D9456Dh 0x00000021 popad 0x00000022 pushad 0x00000023 push edi 0x00000024 pop edi 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ED16BC second address: ED16C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ED16C4 second address: ED16C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ED460B second address: ED4664 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F834854C588h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d jmp 00007F834854C587h 0x00000012 mov eax, dword ptr [eax] 0x00000014 push eax 0x00000015 push edx 0x00000016 jo 00007F834854C58Eh 0x0000001c jmp 00007F834854C588h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ED4664 second address: ED4689 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F8348D9456Fh 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 jng 00007F8348D94566h 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: ED5DCC second address: ED5DDE instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 jno 00007F834854C576h 0x0000000b pop esi 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SPzPNCzcCy.exe | RDTSC instruction interceptor: First address: DDF8A9 second address: DDF8AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |