Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov edx, ebx | 0_2_00BA8600 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax-16h] | 0_2_00BE1720 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov byte ptr [ebx], al | 0_2_00BCC09E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov byte ptr [ebx], al | 0_2_00BCC0E6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov byte ptr [ebx], al | 0_2_00BCE0DA |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov eax, dword ptr [00BE6130h] | 0_2_00BB8169 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov byte ptr [ebx], al | 0_2_00BCC09E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx ebx, byte ptr [edx] | 0_2_00BD6210 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h | 0_2_00BC83E6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov ecx, eax | 0_2_00BBC300 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then cmp word ptr [edi+ebx+02h], 0000h | 0_2_00BE0340 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx edx, byte ptr [eax+edi-74D5A7FEh] | 0_2_00BCC465 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov byte ptr [ebx], al | 0_2_00BCC465 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov edi, ecx | 0_2_00BCA5B6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h | 0_2_00BC8528 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax-16h] | 0_2_00BE06F0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov eax, ebx | 0_2_00BBC8A0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx esi, byte ptr [esp+eax-000000BEh] | 0_2_00BBC8A0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx ebx, byte ptr [esp+edx+0Ah] | 0_2_00BBC8A0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax-2E3D7ACEh] | 0_2_00BBC8A0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h | 0_2_00BC2830 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx esi, byte ptr [esp+ecx+04h] | 0_2_00BDC830 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then push esi | 0_2_00BAC805 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov byte ptr [edi], al | 0_2_00BCC850 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then cmp dword ptr [ebx+edi*8], 385488F2h | 0_2_00BDC990 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h | 0_2_00BC89E9 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov ebx, dword ptr [edi+04h] | 0_2_00BCAAC0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then lea esi, dword ptr [eax+00000270h] | 0_2_00BA8A50 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then cmp dword ptr [ecx+ebx*8], 385488F2h | 0_2_00BDCA40 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax-6E2DD57Fh] | 0_2_00BBEB80 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov edx, ecx | 0_2_00BB8B1B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx edx, byte ptr [esp+eax+0Ah] | 0_2_00BAAB40 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then cmp dword ptr [edi+esi*8], 385488F2h | 0_2_00BB4CA0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov edi, dword ptr [esi+30h] | 0_2_00BACC7A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 2213E57Fh | 0_2_00BDCDF0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx esi, byte ptr [esp+ecx-3ECB279Fh] | 0_2_00BDCDF0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then cmp dword ptr [esi+edx*8], 2213E57Fh | 0_2_00BDCDF0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then cmp dword ptr [ebp+ebx*8+00h], 7F7BECC6h | 0_2_00BDCDF0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx esi, byte ptr [ebp+eax-46h] | 0_2_00BDEDC1 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov edx, ecx | 0_2_00BC6D2E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx edx, byte ptr [esp+ecx-16h] | 0_2_00BE0D20 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx eax, byte ptr [ebp+edi+00000090h] | 0_2_00BA2EB0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov ecx, eax | 0_2_00BC2E6D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then jmp edx | 0_2_00BC2E6D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx ecx, byte ptr [edx+eax] | 0_2_00BC2E6D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov word ptr [eax], cx | 0_2_00BB6F52 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov esi, ecx | 0_2_00BC90D0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov ecx, eax | 0_2_00BCD116 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov ecx, eax | 0_2_00BCD17D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then cmp byte ptr [esi+ebx], 00000000h | 0_2_00BCB170 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx ebx, byte ptr [esp+ecx-16h] | 0_2_00BE1160 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then add eax, dword ptr [esp+ecx*4+24h] | 0_2_00BA73D0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx ecx, word ptr [edi+esi*4] | 0_2_00BA73D0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov byte ptr [ebx], al | 0_2_00BCD34A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov word ptr [eax], cx | 0_2_00BB747D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov word ptr [edx], di | 0_2_00BB747D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov eax, ebx | 0_2_00BC7440 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+09AD4080h] | 0_2_00BC7440 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx ecx, byte ptr [esi+eax+61765397h] | 0_2_00BBB57D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov dword ptr [esp+20h], eax | 0_2_00BA9780 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then jmp edx | 0_2_00BC37D6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then jmp eax | 0_2_00BC9739 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx ecx, byte ptr [esp+eax+20h] | 0_2_00BC7740 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov ecx, eax | 0_2_00BBD8AC |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov ecx, eax | 0_2_00BBD8AC |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov edx, ecx | 0_2_00BBB8F6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov edx, ecx | 0_2_00BBB8F6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov ecx, eax | 0_2_00BBD8D8 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov ecx, eax | 0_2_00BBD8D8 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then jmp edx | 0_2_00BC39B9 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then movzx ecx, byte ptr [edx+eax] | 0_2_00BC39B9 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov byte ptr [edi], al | 0_2_00BCB980 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then dec edx | 0_2_00BDFA20 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov word ptr [eax], cx | 0_2_00BC1A10 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then dec edx | 0_2_00BDFB10 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov byte ptr [ebx], al | 0_2_00BCDDFF |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then dec edx | 0_2_00BDFD70 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov edx, ecx | 0_2_00BC9E80 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov byte ptr [ebx], al | 0_2_00BCDE07 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then dec edx | 0_2_00BDFE00 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov edi, dword ptr [esp+28h] | 0_2_00BC5F1B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 4x nop then mov ecx, eax | 0_2_00BCBF13 |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183598092.00000000015E9000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183598092.00000000015E9000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183598092.00000000015E9000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: SQHE4Hsjo6.exe, 00000000.00000002.2183866825.0000000001660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://broadcast.st.dl.eccdnx.com |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183866825.0000000001660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183866825.0000000001660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: SQHE4Hsjo6.exe, 00000000.00000002.2183866825.0000000001660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/fatalerror.css?v=OFUqlcDNiD6y&l=engli |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183598092.00000000015E9000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=FRRi |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183866825.0000000001660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183866825.0000000001660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://player.vimeo.com |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183866825.0000000001660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183866825.0000000001660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183866825.0000000001660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183598092.00000000015E9000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173656213.000000000160C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183598092.00000000015E9000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: SQHE4Hsjo6.exe, 00000000.00000002.2183706569.00000000015FF000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183598092.00000000015E9000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173656213.00000000015FF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900 |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183866825.0000000001660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/; |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183598092.00000000015E9000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183866825.0000000001660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183866825.0000000001660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183866825.0000000001660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.0000000001676000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173656213.00000000015ED000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: SQHE4Hsjo6.exe, 00000000.00000003.2173621851.000000000166D000.00000004.00000020.00020000.00000000.sdmp, SQHE4Hsjo6.exe, 00000000.00000002.2183866825.0000000001660000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BA8600 | 0_2_00BA8600 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BAB100 | 0_2_00BAB100 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BCC09E | 0_2_00BCC09E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C7A0E4 | 0_2_00C7A0E4 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C0A0F9 | 0_2_00C0A0F9 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C0E082 | 0_2_00C0E082 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CDC080 | 0_2_00CDC080 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BB60E9 | 0_2_00BB60E9 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CC209E | 0_2_00CC209E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BCC0E6 | 0_2_00BCC0E6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C1609E | 0_2_00C1609E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CE4091 | 0_2_00CE4091 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C4C0A4 | 0_2_00C4C0A4 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C9A0AA | 0_2_00C9A0AA |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C2E0A8 | 0_2_00C2E0A8 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C140AC | 0_2_00C140AC |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C4E0AA | 0_2_00C4E0AA |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C1E0B3 | 0_2_00C1E0B3 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C400B6 | 0_2_00C400B6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BCA0CA | 0_2_00BCA0CA |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CD205F | 0_2_00CD205F |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CCA061 | 0_2_00CCA061 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C52076 | 0_2_00C52076 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CCE03D | 0_2_00CCE03D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CF603E | 0_2_00CF603E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D62020 | 0_2_00D62020 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C781C7 | 0_2_00C781C7 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CBE1DF | 0_2_00CBE1DF |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C461E7 | 0_2_00C461E7 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C381E0 | 0_2_00C381E0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CCA1E4 | 0_2_00CCA1E4 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CEA1E7 | 0_2_00CEA1E7 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D041F9 | 0_2_00D041F9 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C641EC | 0_2_00C641EC |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BCE180 | 0_2_00BCE180 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C841F5 | 0_2_00C841F5 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CD618C | 0_2_00CD618C |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C3E18B | 0_2_00C3E18B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C6618B | 0_2_00C6618B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BC81EA | 0_2_00BC81EA |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CB4190 | 0_2_00CB4190 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA41AE | 0_2_00CA41AE |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CF41A6 | 0_2_00CF41A6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C6A1B4 | 0_2_00C6A1B4 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C08141 | 0_2_00C08141 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C48145 | 0_2_00C48145 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA615D | 0_2_00CA615D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CE8166 | 0_2_00CE8166 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C0416C | 0_2_00C0416C |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BB8169 | 0_2_00BB8169 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BA6160 | 0_2_00BA6160 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BCC09E | 0_2_00BCC09E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C4412E | 0_2_00C4412E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D002DB | 0_2_00D002DB |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D022C8 | 0_2_00D022C8 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CB02E6 | 0_2_00CB02E6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C5C2FF | 0_2_00C5C2FF |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CE0295 | 0_2_00CE0295 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C942AB | 0_2_00C942AB |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C1A2A4 | 0_2_00C1A2A4 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BC42D0 | 0_2_00BC42D0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C342B7 | 0_2_00C342B7 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C1C2B6 | 0_2_00C1C2B6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C8C2BF | 0_2_00C8C2BF |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C782BF | 0_2_00C782BF |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C0A241 | 0_2_00C0A241 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BBE220 | 0_2_00BBE220 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C30258 | 0_2_00C30258 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C6825D | 0_2_00C6825D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CBA269 | 0_2_00CBA269 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C50266 | 0_2_00C50266 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C2C27A | 0_2_00C2C27A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C58278 | 0_2_00C58278 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C98277 | 0_2_00C98277 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CC2205 | 0_2_00CC2205 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BA4270 | 0_2_00BA4270 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D0820D | 0_2_00D0820D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CD23C0 | 0_2_00CD23C0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D063C7 | 0_2_00D063C7 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CCC3EB | 0_2_00CCC3EB |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C5A3F4 | 0_2_00C5A3F4 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C3E380 | 0_2_00C3E380 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BC83E6 | 0_2_00BC83E6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C6035C | 0_2_00C6035C |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CC4360 | 0_2_00CC4360 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CF037A | 0_2_00CF037A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CEA377 | 0_2_00CEA377 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C4A300 | 0_2_00C4A300 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CCC30A | 0_2_00CCC30A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C1030B | 0_2_00C1030B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CFE301 | 0_2_00CFE301 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA0310 | 0_2_00CA0310 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C9E312 | 0_2_00C9E312 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CE2311 | 0_2_00CE2311 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CEE338 | 0_2_00CEE338 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CFA4D8 | 0_2_00CFA4D8 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C284F7 | 0_2_00C284F7 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C8848C | 0_2_00C8848C |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BC24E0 | 0_2_00BC24E0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA24A0 | 0_2_00CA24A0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C144AF | 0_2_00C144AF |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C624B4 | 0_2_00C624B4 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BC04C6 | 0_2_00BC04C6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C2E4B9 | 0_2_00C2E4B9 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C9C407 | 0_2_00C9C407 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C02412 | 0_2_00C02412 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BE0460 | 0_2_00BE0460 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C42421 | 0_2_00C42421 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C76421 | 0_2_00C76421 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CDA42A | 0_2_00CDA42A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C3A435 | 0_2_00C3A435 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BDA440 | 0_2_00BDA440 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C3043E | 0_2_00C3043E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C70438 | 0_2_00C70438 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C905D8 | 0_2_00C905D8 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CB45DC | 0_2_00CB45DC |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C665DF | 0_2_00C665DF |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C965D3 | 0_2_00C965D3 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BDC5A0 | 0_2_00BDC5A0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C3C5E5 | 0_2_00C3C5E5 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CBE5F9 | 0_2_00CBE5F9 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA8583 | 0_2_00CA8583 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BA65F0 | 0_2_00BA65F0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C86586 | 0_2_00C86586 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BDA5D4 | 0_2_00BDA5D4 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BCC53C | 0_2_00BCC53C |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C46552 | 0_2_00C46552 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D08572 | 0_2_00D08572 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CAA566 | 0_2_00CAA566 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C2A578 | 0_2_00C2A578 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CB8508 | 0_2_00CB8508 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CE4517 | 0_2_00CE4517 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BC4560 | 0_2_00BC4560 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CF052F | 0_2_00CF052F |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C0E524 | 0_2_00C0E524 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA4523 | 0_2_00CA4523 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CE8534 | 0_2_00CE8534 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CC86DA | 0_2_00CC86DA |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C726EA | 0_2_00C726EA |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C886FA | 0_2_00C886FA |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CF46F9 | 0_2_00CF46F9 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BAE687 | 0_2_00BAE687 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CDA6F2 | 0_2_00CDA6F2 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BE06F0 | 0_2_00BE06F0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C08698 | 0_2_00C08698 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C686A0 | 0_2_00C686A0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BC46D0 | 0_2_00BC46D0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C0A6B9 | 0_2_00C0A6B9 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C26640 | 0_2_00C26640 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C50643 | 0_2_00C50643 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BBE630 | 0_2_00BBE630 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C8A643 | 0_2_00C8A643 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D0465D | 0_2_00D0465D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C9C66A | 0_2_00C9C66A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C5A66D | 0_2_00C5A66D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CFC664 | 0_2_00CFC664 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C1A670 | 0_2_00C1A670 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA0677 | 0_2_00CA0677 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C9E60F | 0_2_00C9E60F |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C7A60F | 0_2_00C7A60F |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CBA61A | 0_2_00CBA61A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CC461D | 0_2_00CC461D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CD6618 | 0_2_00CD6618 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C64618 | 0_2_00C64618 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA662A | 0_2_00CA662A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D02637 | 0_2_00D02637 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CE0624 | 0_2_00CE0624 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BD8650 | 0_2_00BD8650 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CDE620 | 0_2_00CDE620 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C9263C | 0_2_00C9263C |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C7C63F | 0_2_00C7C63F |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C3A7CF | 0_2_00C3A7CF |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C027D2 | 0_2_00C027D2 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C8E7D4 | 0_2_00C8E7D4 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C5C7D8 | 0_2_00C5C7D8 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C567E5 | 0_2_00C567E5 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA87FB | 0_2_00CA87FB |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CFA7FE | 0_2_00CFA7FE |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C367F1 | 0_2_00C367F1 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CCE7F2 | 0_2_00CCE7F2 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CAA78D | 0_2_00CAA78D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CBC781 | 0_2_00CBC781 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C447AE | 0_2_00C447AE |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C1676C | 0_2_00C1676C |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C20772 | 0_2_00C20772 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C0477D | 0_2_00C0477D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C10714 | 0_2_00C10714 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BB2750 | 0_2_00BB2750 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C3872F | 0_2_00C3872F |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C6072A | 0_2_00C6072A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CF2735 | 0_2_00CF2735 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C3E73E | 0_2_00C3E73E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BD88B0 | 0_2_00BD88B0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BBC8A0 | 0_2_00BBC8A0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C4E8E7 | 0_2_00C4E8E7 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CD48E6 | 0_2_00CD48E6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CFE88E | 0_2_00CFE88E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CD2885 | 0_2_00CD2885 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA2895 | 0_2_00CA2895 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D0688F | 0_2_00D0688F |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C608BD | 0_2_00C608BD |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C3E8BC | 0_2_00C3E8BC |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C4A844 | 0_2_00C4A844 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CE884D | 0_2_00CE884D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C48848 | 0_2_00C48848 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C7285C | 0_2_00C7285C |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CB8879 | 0_2_00CB8879 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C9C808 | 0_2_00C9C808 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CC680B | 0_2_00CC680B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C1E80B | 0_2_00C1E80B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C8C81D | 0_2_00C8C81D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C6881D | 0_2_00C6881D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CE482B | 0_2_00CE482B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C6C82F | 0_2_00C6C82F |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C62835 | 0_2_00C62835 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CC083A | 0_2_00CC083A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BAC840 | 0_2_00BAC840 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C2483D | 0_2_00C2483D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CFC9CE | 0_2_00CFC9CE |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C0A9CC | 0_2_00C0A9CC |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C809D5 | 0_2_00C809D5 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CF09E4 | 0_2_00CF09E4 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CF89FE | 0_2_00CF89FE |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C349FD | 0_2_00C349FD |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BCC9EB | 0_2_00BCC9EB |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BE09E0 | 0_2_00BE09E0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C2A9AF | 0_2_00C2A9AF |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CB69A4 | 0_2_00CB69A4 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C1A9B4 | 0_2_00C1A9B4 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C549BC | 0_2_00C549BC |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA69B7 | 0_2_00CA69B7 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C789B8 | 0_2_00C789B8 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C3694B | 0_2_00C3694B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CCE946 | 0_2_00CCE946 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C6A962 | 0_2_00C6A962 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BC6910 | 0_2_00BC6910 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C96965 | 0_2_00C96965 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D0096C | 0_2_00D0096C |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BBE960 | 0_2_00BBE960 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C0E927 | 0_2_00C0E927 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BC8ABC | 0_2_00BC8ABC |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C52AC6 | 0_2_00C52AC6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CAEAC9 | 0_2_00CAEAC9 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C88ACE | 0_2_00C88ACE |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C3AAE2 | 0_2_00C3AAE2 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C58AE8 | 0_2_00C58AE8 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C96AFA | 0_2_00C96AFA |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C38AFB | 0_2_00C38AFB |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C10AFF | 0_2_00C10AFF |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CB4A8F | 0_2_00CB4A8F |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CE0A87 | 0_2_00CE0A87 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C26A97 | 0_2_00C26A97 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C46A92 | 0_2_00C46A92 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CB2A90 | 0_2_00CB2A90 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C2CAA3 | 0_2_00C2CAA3 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CF2AAD | 0_2_00CF2AAD |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C7CAA1 | 0_2_00C7CAA1 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CC0AB1 | 0_2_00CC0AB1 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C86A61 | 0_2_00C86A61 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C9AA7F | 0_2_00C9AA7F |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CECA77 | 0_2_00CECA77 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CB0A30 | 0_2_00CB0A30 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BDCA40 | 0_2_00BDCA40 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BA4BA0 | 0_2_00BA4BA0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C84BE3 | 0_2_00C84BE3 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C8EBFB | 0_2_00C8EBFB |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BBEB80 | 0_2_00BBEB80 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CB0B9E | 0_2_00CB0B9E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C0CB99 | 0_2_00C0CB99 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C76B9A | 0_2_00C76B9A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CF6BAE | 0_2_00CF6BAE |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C64BA2 | 0_2_00C64BA2 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA8BAF | 0_2_00CA8BAF |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C94BA2 | 0_2_00C94BA2 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C42BB4 | 0_2_00C42BB4 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D5EB45 | 0_2_00D5EB45 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BF8B26 | 0_2_00BF8B26 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BB8B1B | 0_2_00BB8B1B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C7EB65 | 0_2_00C7EB65 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C78B72 | 0_2_00C78B72 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C32B7F | 0_2_00C32B7F |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CBCB01 | 0_2_00CBCB01 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C9EB2B | 0_2_00C9EB2B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CC8B2A | 0_2_00CC8B2A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CD2B2A | 0_2_00CD2B2A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CB6B33 | 0_2_00CB6B33 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BAAB40 | 0_2_00BAAB40 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C02CCA | 0_2_00C02CCA |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C2ACD1 | 0_2_00C2ACD1 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BB4CA0 | 0_2_00BB4CA0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C14CE1 | 0_2_00C14CE1 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C06CE6 | 0_2_00C06CE6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C40CF9 | 0_2_00C40CF9 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C68C86 | 0_2_00C68C86 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C1EC84 | 0_2_00C1EC84 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C60C9A | 0_2_00C60C9A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D68CB4 | 0_2_00D68CB4 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CFECAA | 0_2_00CFECAA |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C70C41 | 0_2_00C70C41 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CDEC44 | 0_2_00CDEC44 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D06C5B | 0_2_00D06C5B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CBCC53 | 0_2_00CBCC53 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CACC57 | 0_2_00CACC57 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D00C4E | 0_2_00D00C4E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CB2C7A | 0_2_00CB2C7A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C80C7B | 0_2_00C80C7B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C66C04 | 0_2_00C66C04 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C56C02 | 0_2_00C56C02 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CECC06 | 0_2_00CECC06 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C20C0E | 0_2_00C20C0E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CEEC2E | 0_2_00CEEC2E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C88C2E | 0_2_00C88C2E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CCCC3D | 0_2_00CCCC3D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D04C22 | 0_2_00D04C22 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C04C39 | 0_2_00C04C39 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA0DCC | 0_2_00CA0DCC |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C6EDD5 | 0_2_00C6EDD5 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C9ADDF | 0_2_00C9ADDF |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C4CDDD | 0_2_00C4CDDD |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C18DDB | 0_2_00C18DDB |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C5ADE1 | 0_2_00C5ADE1 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CB4DE1 | 0_2_00CB4DE1 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C0EDED | 0_2_00C0EDED |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C46DF4 | 0_2_00C46DF4 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CE0D8E | 0_2_00CE0D8E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D02D95 | 0_2_00D02D95 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C62D8E | 0_2_00C62D8E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BDCDF0 | 0_2_00BDCDF0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CDCD83 | 0_2_00CDCD83 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C8AD98 | 0_2_00C8AD98 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C3ED91 | 0_2_00C3ED91 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CBED9F | 0_2_00CBED9F |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C6ADA6 | 0_2_00C6ADA6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C70DA6 | 0_2_00C70DA6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C92D4B | 0_2_00C92D4B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D08D58 | 0_2_00D08D58 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C26D4D | 0_2_00C26D4D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BC6D2E | 0_2_00BC6D2E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA6D58 | 0_2_00CA6D58 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BE0D20 | 0_2_00BE0D20 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C1AD70 | 0_2_00C1AD70 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C48D7C | 0_2_00C48D7C |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C98D04 | 0_2_00C98D04 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BCCD5E | 0_2_00BCCD5E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BCCD4C | 0_2_00BCCD4C |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BA2EB0 | 0_2_00BA2EB0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BBAEB0 | 0_2_00BBAEB0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C00ECD | 0_2_00C00ECD |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BD8EA0 | 0_2_00BD8EA0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C76EE6 | 0_2_00C76EE6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C56EEE | 0_2_00C56EEE |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BF6E89 | 0_2_00BF6E89 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C94E8C | 0_2_00C94E8C |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CCEEAC | 0_2_00CCEEAC |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C5CEA9 | 0_2_00C5CEA9 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D06EA7 | 0_2_00D06EA7 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CC0EB7 | 0_2_00CC0EB7 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C10EBD | 0_2_00C10EBD |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C68E55 | 0_2_00C68E55 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CE2E50 | 0_2_00CE2E50 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CFCE6D | 0_2_00CFCE6D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CF0E61 | 0_2_00CF0E61 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CF4E7B | 0_2_00CF4E7B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CB8E7D | 0_2_00CB8E7D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C90E72 | 0_2_00C90E72 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BC0E6C | 0_2_00BC0E6C |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C26E12 | 0_2_00C26E12 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BC2E6D | 0_2_00BC2E6D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA4E12 | 0_2_00CA4E12 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BCEE63 | 0_2_00BCEE63 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CFAE2D | 0_2_00CFAE2D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CF8E2B | 0_2_00CF8E2B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C24E30 | 0_2_00C24E30 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BACE45 | 0_2_00BACE45 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CD8FCF | 0_2_00CD8FCF |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CBCFDF | 0_2_00CBCFDF |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D00FF2 | 0_2_00D00FF2 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C6EFEE | 0_2_00C6EFEE |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C7AFEF | 0_2_00C7AFEF |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CECFF5 | 0_2_00CECFF5 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CFEF8B | 0_2_00CFEF8B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CF8F82 | 0_2_00CF8F82 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C12F8F | 0_2_00C12F8F |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CD0F9F | 0_2_00CD0F9F |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CAAFB7 | 0_2_00CAAFB7 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CC6F59 | 0_2_00CC6F59 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C38F68 | 0_2_00C38F68 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CB6F65 | 0_2_00CB6F65 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C58F73 | 0_2_00C58F73 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CC2F70 | 0_2_00CC2F70 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C6CF7B | 0_2_00C6CF7B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C1AF03 | 0_2_00C1AF03 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CC4F1C | 0_2_00CC4F1C |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CE8F1B | 0_2_00CE8F1B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CD4F15 | 0_2_00CD4F15 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C22F22 | 0_2_00C22F22 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BB6F52 | 0_2_00BB6F52 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C96F37 | 0_2_00C96F37 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C50F3A | 0_2_00C50F3A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA70D9 | 0_2_00CA70D9 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C530D1 | 0_2_00C530D1 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CB70DC | 0_2_00CB70DC |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C2B0DC | 0_2_00C2B0DC |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C030E9 | 0_2_00C030E9 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CDB0A1 | 0_2_00CDB0A1 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA50BC | 0_2_00CA50BC |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D55053 | 0_2_00D55053 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BAD021 | 0_2_00BAD021 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C33058 | 0_2_00C33058 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BBD003 | 0_2_00BBD003 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CB3000 | 0_2_00CB3000 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CCD01F | 0_2_00CCD01F |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C75028 | 0_2_00C75028 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C4D1C5 | 0_2_00C4D1C5 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BC91AE | 0_2_00BC91AE |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C491D7 | 0_2_00C491D7 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C411D3 | 0_2_00C411D3 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C4B1D3 | 0_2_00C4B1D3 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA91D5 | 0_2_00CA91D5 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BDF18B | 0_2_00BDF18B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CF118C | 0_2_00CF118C |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C1719A | 0_2_00C1719A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C4F1A9 | 0_2_00C4F1A9 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C9F1B9 | 0_2_00C9F1B9 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C911BB | 0_2_00C911BB |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CA31BF | 0_2_00CA31BF |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C951B3 | 0_2_00C951B3 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C5B159 | 0_2_00C5B159 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CBF173 | 0_2_00CBF173 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C79107 | 0_2_00C79107 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D03110 | 0_2_00D03110 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C99108 | 0_2_00C99108 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C0510C | 0_2_00C0510C |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C0F11B | 0_2_00C0F11B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CEF112 | 0_2_00CEF112 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C6B126 | 0_2_00C6B126 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CE5126 | 0_2_00CE5126 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C15131 | 0_2_00C15131 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CFB13B | 0_2_00CFB13B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C71130 | 0_2_00C71130 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C7313B | 0_2_00C7313B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CE12CE | 0_2_00CE12CE |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C832C2 | 0_2_00C832C2 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CC32DD | 0_2_00CC32DD |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C592D1 | 0_2_00C592D1 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C112D8 | 0_2_00C112D8 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CBD2D5 | 0_2_00CBD2D5 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CB92E8 | 0_2_00CB92E8 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D072F3 | 0_2_00D072F3 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C952E6 | 0_2_00C952E6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C1B2F1 | 0_2_00C1B2F1 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C7D2FB | 0_2_00C7D2FB |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BD9280 | 0_2_00BD9280 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CD728D | 0_2_00CD728D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C2B287 | 0_2_00C2B287 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CCB28A | 0_2_00CCB28A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C9B283 | 0_2_00C9B283 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CD3287 | 0_2_00CD3287 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C0B28E | 0_2_00C0B28E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C9D298 | 0_2_00C9D298 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CD529F | 0_2_00CD529F |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C25295 | 0_2_00C25295 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BF72E5 | 0_2_00BF72E5 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D0928D | 0_2_00D0928D |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C232BA | 0_2_00C232BA |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BB1227 | 0_2_00BB1227 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C69264 | 0_2_00C69264 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C1926B | 0_2_00C1926B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D67218 | 0_2_00D67218 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CE321E | 0_2_00CE321E |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C0D228 | 0_2_00C0D228 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C613C1 | 0_2_00C613C1 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C633CE | 0_2_00C633CE |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C053D0 | 0_2_00C053D0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CF73D4 | 0_2_00CF73D4 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C213E1 | 0_2_00C213E1 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00D013E0 | 0_2_00D013E0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C673FC | 0_2_00C673FC |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C53389 | 0_2_00C53389 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C3D3A3 | 0_2_00C3D3A3 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C8B3AC | 0_2_00C8B3AC |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BA73D0 | 0_2_00BA73D0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BAF3C0 | 0_2_00BAF3C0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C073BE | 0_2_00C073BE |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BF7336 | 0_2_00BF7336 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C6535A | 0_2_00C6535A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CCF36A | 0_2_00CCF36A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C3B36B | 0_2_00C3B36B |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BA9310 | 0_2_00BA9310 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CAF360 | 0_2_00CAF360 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C89364 | 0_2_00C89364 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CFD309 | 0_2_00CFD309 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BCF377 | 0_2_00BCF377 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CAB32C | 0_2_00CAB32C |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C51334 | 0_2_00C51334 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BCD34A | 0_2_00BCD34A |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00BC1340 | 0_2_00BC1340 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CDD4C6 | 0_2_00CDD4C6 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00CFF4C2 | 0_2_00CFF4C2 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | Code function: 0_2_00C1B4D0 | 0_2_00C1B4D0 |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D6F696 second address: D6F6A6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 pop eax 0x00000009 ja 00007F93A8F20C26h 0x0000000f pop edi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D6F83D second address: D6F850 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F93A913F996h 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jnp 00007F93A913F996h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D72C6A second address: D72C83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F93A8F20C32h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D72C83 second address: D72C93 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F93A913F996h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D72C93 second address: D72CA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jnl 00007F93A8F20C26h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D72CA0 second address: D72CB8 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F93A913F996h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f jnl 00007F93A913F9A4h 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D72CB8 second address: D72CE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F93A8F20C26h 0x0000000a popad 0x0000000b mov eax, dword ptr [eax] 0x0000000d jmp 00007F93A8F20C32h 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a pop edx 0x0000001b pop eax 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D72CE1 second address: BF8AA3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A913F9A1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a mov dx, DAC5h 0x0000000e push dword ptr [ebp+122D1639h] 0x00000014 push edx 0x00000015 mov dx, cx 0x00000018 pop ecx 0x00000019 call dword ptr [ebp+122D284Eh] 0x0000001f pushad 0x00000020 mov dword ptr [ebp+122D2E8Ch], edi 0x00000026 xor eax, eax 0x00000028 ja 00007F93A913F99Ch 0x0000002e or dword ptr [ebp+122D2E8Ch], esi 0x00000034 mov edx, dword ptr [esp+28h] 0x00000038 jmp 00007F93A913F9A1h 0x0000003d mov dword ptr [ebp+122D379Eh], eax 0x00000043 mov dword ptr [ebp+122D25F0h], ebx 0x00000049 mov esi, 0000003Ch 0x0000004e sub dword ptr [ebp+122D2E8Ch], ecx 0x00000054 add esi, dword ptr [esp+24h] 0x00000058 pushad 0x00000059 mov edi, 2B242506h 0x0000005e mov edx, 275888BAh 0x00000063 popad 0x00000064 lodsw 0x00000066 or dword ptr [ebp+122D25F0h], esi 0x0000006c add eax, dword ptr [esp+24h] 0x00000070 cmc 0x00000071 mov ebx, dword ptr [esp+24h] 0x00000075 or dword ptr [ebp+122D2E8Ch], edi 0x0000007b cmc 0x0000007c push eax 0x0000007d push eax 0x0000007e push edx 0x0000007f jmp 00007F93A913F9A8h 0x00000084 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D72D1C second address: D72D6E instructions: 0x00000000 rdtsc 0x00000002 jne 00007F93A8F20C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ecx 0x0000000b mov dword ptr [esp], eax 0x0000000e jc 00007F93A8F20C29h 0x00000014 add ch, 0000004Ch 0x00000017 jmp 00007F93A8F20C2Dh 0x0000001c push 00000000h 0x0000001e jmp 00007F93A8F20C2Ah 0x00000023 push A8431418h 0x00000028 pushad 0x00000029 jmp 00007F93A8F20C39h 0x0000002e push edi 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D72D6E second address: D72DCC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 add dword ptr [esp], 57BCEC68h 0x0000000d jmp 00007F93A913F9A8h 0x00000012 push 00000003h 0x00000014 movzx edi, di 0x00000017 push 00000000h 0x00000019 mov dword ptr [ebp+122D186Ah], ecx 0x0000001f push 00000003h 0x00000021 xor ecx, dword ptr [ebp+122D3782h] 0x00000027 call 00007F93A913F999h 0x0000002c jmp 00007F93A913F9A4h 0x00000031 push eax 0x00000032 push eax 0x00000033 push edx 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D72DCC second address: D72DD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D72DD0 second address: D72DE6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A913F9A2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D72DE6 second address: D72DEC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D72DEC second address: D72DF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D72DF0 second address: D72E27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c pushad 0x0000000d jns 00007F93A8F20C28h 0x00000013 pushad 0x00000014 jmp 00007F93A8F20C2Ah 0x00000019 jmp 00007F93A8F20C2Fh 0x0000001e popad 0x0000001f popad 0x00000020 mov eax, dword ptr [eax] 0x00000022 pushad 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D72E27 second address: D72E2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D72E2F second address: D72E73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c push eax 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 pop eax 0x00000012 popad 0x00000013 pop eax 0x00000014 pop eax 0x00000015 mov si, 40DAh 0x00000019 lea ebx, dword ptr [ebp+1244DBCDh] 0x0000001f call 00007F93A8F20C35h 0x00000024 mov cx, 3D5Ch 0x00000028 pop ecx 0x00000029 xchg eax, ebx 0x0000002a jl 00007F93A8F20C30h 0x00000030 push eax 0x00000031 push edx 0x00000032 pushad 0x00000033 popad 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D72F44 second address: D72FF3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A913F9A0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor dword ptr [esp], 7D4300CDh 0x00000010 jg 00007F93A913F99Ch 0x00000016 push 00000003h 0x00000018 mov edi, dword ptr [ebp+122D24E8h] 0x0000001e push 00000000h 0x00000020 mov edi, dword ptr [ebp+122D25C1h] 0x00000026 push 00000003h 0x00000028 jmp 00007F93A913F9A0h 0x0000002d mov ecx, dword ptr [ebp+122D1C82h] 0x00000033 push 746F8AEDh 0x00000038 jmp 00007F93A913F9A8h 0x0000003d add dword ptr [esp], 4B907513h 0x00000044 jmp 00007F93A913F9A5h 0x00000049 lea ebx, dword ptr [ebp+1244DBD6h] 0x0000004f mov cx, A005h 0x00000053 xchg eax, ebx 0x00000054 jmp 00007F93A913F99Ah 0x00000059 push eax 0x0000005a pushad 0x0000005b jns 00007F93A913F99Ch 0x00000061 jc 00007F93A913F996h 0x00000067 push eax 0x00000068 push edx 0x00000069 push edx 0x0000006a pop edx 0x0000006b rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D72FF3 second address: D72FF7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D73042 second address: D730BB instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F93A913F9AAh 0x00000008 jmp 00007F93A913F9A4h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 jc 00007F93A913F9A5h 0x00000016 jmp 00007F93A913F99Fh 0x0000001b nop 0x0000001c push 00000000h 0x0000001e push eax 0x0000001f call 00007F93A913F998h 0x00000024 pop eax 0x00000025 mov dword ptr [esp+04h], eax 0x00000029 add dword ptr [esp+04h], 00000018h 0x00000031 inc eax 0x00000032 push eax 0x00000033 ret 0x00000034 pop eax 0x00000035 ret 0x00000036 mov edx, 118A665Dh 0x0000003b push 00000000h 0x0000003d mov esi, dword ptr [ebp+122D17F7h] 0x00000043 mov dword ptr [ebp+122D186Ah], edi 0x00000049 push 94A442D9h 0x0000004e push eax 0x0000004f push edx 0x00000050 jmp 00007F93A913F99Ah 0x00000055 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D730BB second address: D730C2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D92E08 second address: D92E3A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A913F99Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push esi 0x0000000d pop esi 0x0000000e jmp 00007F93A913F9A9h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D92E3A second address: D92E45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D92E45 second address: D92E49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D66CB0 second address: D66CBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F93A8F20C26h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D66CBD second address: D66CC7 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F93A913F99Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D66CC7 second address: D66CE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F93A8F20C2Eh 0x0000000a push esi 0x0000000b pop esi 0x0000000c jp 00007F93A8F20C26h 0x00000012 pop edx 0x00000013 pop eax 0x00000014 jo 00007F93A8F20C49h 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D66CE4 second address: D66CEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D91123 second address: D9112D instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F93A8F20C26h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D912A8 second address: D912F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 jg 00007F93A913F99Ch 0x0000000d popad 0x0000000e jc 00007F93A913F9DFh 0x00000014 jmp 00007F93A913F9A7h 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F93A913F9A9h 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D912F6 second address: D912FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D915A5 second address: D915CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jns 00007F93A913F996h 0x0000000c popad 0x0000000d jmp 00007F93A913F9A5h 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D915CB second address: D915D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D915D1 second address: D915D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D91859 second address: D9186B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F93A8F20C2Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D9186B second address: D91893 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A913F9A7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jl 00007F93A913F996h 0x00000010 pushad 0x00000011 popad 0x00000012 push edi 0x00000013 pop edi 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D91893 second address: D918C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 push eax 0x00000007 pop eax 0x00000008 jmp 00007F93A8F20C32h 0x0000000d pop edi 0x0000000e popad 0x0000000f push eax 0x00000010 jmp 00007F93A8F20C2Eh 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D918C2 second address: D918C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D91A53 second address: D91A6B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007F93A8F20C2Ch 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D91A6B second address: D91A6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D91A6F second address: D91A75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D91A75 second address: D91AAE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007F93A913F9BEh 0x0000000c push esi 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D91D57 second address: D91D5B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D89C79 second address: D89C7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D6A299 second address: D6A29D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D9699E second address: D969C6 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jbe 00007F93A913F996h 0x0000000d jno 00007F93A913F996h 0x00000013 pop ebx 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 jnc 00007F93A913F99Eh 0x0000001d push ecx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D969C6 second address: D969CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D969CB second address: D969D4 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D9AA89 second address: D9AA92 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D9AC83 second address: D9AC87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D9AC87 second address: D9AC91 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D9AC91 second address: D9ACA3 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F93A913F996h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D9ACA3 second address: D9ACA9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D9ACA9 second address: D9ACAF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D9ACAF second address: D9ACB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D6A285 second address: D6A299 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F93A913F996h 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e jnl 00007F93A913F996h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D9FFB6 second address: D9FFBA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA0166 second address: DA016C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA016C second address: DA0175 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA0175 second address: DA0179 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA0179 second address: DA017D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA0A92 second address: DA0AE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F93A913F996h 0x0000000a popad 0x0000000b js 00007F93A913F998h 0x00000011 push edi 0x00000012 pop edi 0x00000013 popad 0x00000014 push eax 0x00000015 push ecx 0x00000016 jmp 00007F93A913F99Fh 0x0000001b pop ecx 0x0000001c xchg eax, ebx 0x0000001d pushad 0x0000001e mov dh, al 0x00000020 jmp 00007F93A913F99Ah 0x00000025 popad 0x00000026 xor dword ptr [ebp+122D30E4h], eax 0x0000002c nop 0x0000002d jmp 00007F93A913F9A1h 0x00000032 push eax 0x00000033 push esi 0x00000034 push eax 0x00000035 push edx 0x00000036 push ecx 0x00000037 pop ecx 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA0DBF second address: DA0DF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F93A8F20C35h 0x00000009 popad 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F93A8F20C33h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA0FC2 second address: DA0FC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA1042 second address: DA1055 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A8F20C2Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA1F75 second address: DA1F79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA1F79 second address: DA1F83 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F93A8F20C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA1F83 second address: DA1F88 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA1F88 second address: DA1FB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 add dword ptr [ebp+122D25F7h], ebx 0x0000000e push 00000000h 0x00000010 mov edi, dword ptr [ebp+122D364Ah] 0x00000016 push 00000000h 0x00000018 mov dword ptr [ebp+122D1880h], edi 0x0000001e push eax 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007F93A8F20C2Ch 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA3042 second address: DA3046 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DAAFD7 second address: DAAFE8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F93A8F20C2Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DABF7B second address: DABFCC instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 sub dword ptr [ebp+124715CEh], esi 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push eax 0x00000014 call 00007F93A913F998h 0x00000019 pop eax 0x0000001a mov dword ptr [esp+04h], eax 0x0000001e add dword ptr [esp+04h], 00000014h 0x00000026 inc eax 0x00000027 push eax 0x00000028 ret 0x00000029 pop eax 0x0000002a ret 0x0000002b mov dword ptr [ebp+122D28BBh], edx 0x00000031 push 00000000h 0x00000033 sbb bh, 00000072h 0x00000036 xchg eax, esi 0x00000037 jmp 00007F93A913F9A1h 0x0000003c push eax 0x0000003d pushad 0x0000003e pushad 0x0000003f push ecx 0x00000040 pop ecx 0x00000041 push eax 0x00000042 push edx 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DAB10F second address: DAB119 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F93A8F20C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DACF29 second address: DACF88 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jmp 00007F93A913F9A6h 0x0000000c pop edx 0x0000000d popad 0x0000000e mov dword ptr [esp], eax 0x00000011 xor ebx, dword ptr [ebp+122D25DCh] 0x00000017 push 00000000h 0x00000019 jbe 00007F93A913F996h 0x0000001f push 00000000h 0x00000021 push 00000000h 0x00000023 push ecx 0x00000024 call 00007F93A913F998h 0x00000029 pop ecx 0x0000002a mov dword ptr [esp+04h], ecx 0x0000002e add dword ptr [esp+04h], 0000001Bh 0x00000036 inc ecx 0x00000037 push ecx 0x00000038 ret 0x00000039 pop ecx 0x0000003a ret 0x0000003b xchg eax, esi 0x0000003c jbe 00007F93A913F99Eh 0x00000042 push eax 0x00000043 push eax 0x00000044 push edx 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DAC0E0 second address: DAC182 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 jmp 00007F93A8F20C32h 0x0000000a nop 0x0000000b ja 00007F93A8F20C2Ch 0x00000011 push dword ptr fs:[00000000h] 0x00000018 mov dword ptr [ebp+122D1B4Ah], ebx 0x0000001e mov dword ptr fs:[00000000h], esp 0x00000025 push 00000000h 0x00000027 push eax 0x00000028 call 00007F93A8F20C28h 0x0000002d pop eax 0x0000002e mov dword ptr [esp+04h], eax 0x00000032 add dword ptr [esp+04h], 00000016h 0x0000003a inc eax 0x0000003b push eax 0x0000003c ret 0x0000003d pop eax 0x0000003e ret 0x0000003f xor edi, 79112A62h 0x00000045 mov eax, dword ptr [ebp+122D05D5h] 0x0000004b push 00000000h 0x0000004d push esi 0x0000004e call 00007F93A8F20C28h 0x00000053 pop esi 0x00000054 mov dword ptr [esp+04h], esi 0x00000058 add dword ptr [esp+04h], 0000001Ah 0x00000060 inc esi 0x00000061 push esi 0x00000062 ret 0x00000063 pop esi 0x00000064 ret 0x00000065 mov dword ptr [ebp+122D18C4h], edx 0x0000006b push FFFFFFFFh 0x0000006d or dword ptr [ebp+122D2903h], edx 0x00000073 push eax 0x00000074 push eax 0x00000075 push edx 0x00000076 jmp 00007F93A8F20C2Dh 0x0000007b rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DADE33 second address: DADE5A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F93A913F9A5h 0x0000000b popad 0x0000000c push eax 0x0000000d jc 00007F93A913F9A4h 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DADE5A second address: DADE5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DB24F7 second address: DB24FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DB24FB second address: DB24FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DB1466 second address: DB146C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DB146C second address: DB147A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F93A8F20C2Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DB257F second address: DB2594 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A913F9A1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DB26B4 second address: DB26B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DB26B8 second address: DB2738 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop ebx 0x0000000a popad 0x0000000b mov dword ptr [esp], eax 0x0000000e jmp 00007F93A913F9A0h 0x00000013 push dword ptr fs:[00000000h] 0x0000001a push 00000000h 0x0000001c push ecx 0x0000001d call 00007F93A913F998h 0x00000022 pop ecx 0x00000023 mov dword ptr [esp+04h], ecx 0x00000027 add dword ptr [esp+04h], 00000015h 0x0000002f inc ecx 0x00000030 push ecx 0x00000031 ret 0x00000032 pop ecx 0x00000033 ret 0x00000034 mov dword ptr fs:[00000000h], esp 0x0000003b push eax 0x0000003c pop edi 0x0000003d mov eax, dword ptr [ebp+122D1661h] 0x00000043 push 00000000h 0x00000045 push ebp 0x00000046 call 00007F93A913F998h 0x0000004b pop ebp 0x0000004c mov dword ptr [esp+04h], ebp 0x00000050 add dword ptr [esp+04h], 00000019h 0x00000058 inc ebp 0x00000059 push ebp 0x0000005a ret 0x0000005b pop ebp 0x0000005c ret 0x0000005d push FFFFFFFFh 0x0000005f mov dword ptr [ebp+122D2CD9h], eax 0x00000065 push eax 0x00000066 push eax 0x00000067 push edx 0x00000068 push edx 0x00000069 push eax 0x0000006a push edx 0x0000006b rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DB444B second address: DB4450 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DB2738 second address: DB273D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DB6259 second address: DB625D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DB7215 second address: DB7228 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A913F99Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DB6438 second address: DB643E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DB838F second address: DB8395 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DB94AE second address: DB94CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F93A8F20C34h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DB8395 second address: DB839A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DBA2C7 second address: DBA2CC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DB84D1 second address: DB84EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F93A913F9A6h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DBB2B8 second address: DBB2DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A8F20C35h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d jnl 00007F93A8F20C26h 0x00000013 pop ebx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DBB2DC second address: DBB2E1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DC469C second address: DC46B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A8F20C33h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DC3D99 second address: DC3D9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DC3D9F second address: DC3DAF instructions: 0x00000000 rdtsc 0x00000002 jns 00007F93A8F20C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DC3DAF second address: DC3DB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DC3F16 second address: DC3F20 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F93A8F20C26h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DC3F20 second address: DC3F26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DC40CE second address: DC40D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DC40D2 second address: DC40DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DC422B second address: DC4240 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A8F20C2Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DC83A5 second address: DC83B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 js 00007F93A913F996h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DC83B2 second address: DC83CC instructions: 0x00000000 rdtsc 0x00000002 jp 00007F93A8F20C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jne 00007F93A8F20C2Ch 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DC83CC second address: DC841D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A913F99Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d pushad 0x0000000e jnc 00007F93A913F99Ch 0x00000014 jmp 00007F93A913F9A3h 0x00000019 popad 0x0000001a mov eax, dword ptr [eax] 0x0000001c jl 00007F93A913F9B4h 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007F93A913F9A2h 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DC841D second address: DC8421 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DC8421 second address: DC8447 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a pushad 0x0000000b jg 00007F93A913F99Ch 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F93A913F99Dh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DCF7A6 second address: DCF7AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DCFA98 second address: DCFA9C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DCFA9C second address: DCFAC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jo 00007F93A8F20C26h 0x00000012 pushad 0x00000013 popad 0x00000014 jmp 00007F93A8F20C37h 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DCFC4C second address: DCFC54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DCFEAB second address: DCFEB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DCFEB0 second address: DCFEB5 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DD6819 second address: DD6830 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F93A8F20C2Bh 0x0000000f push esi 0x00000010 pop esi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D61B45 second address: D61B61 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F93A913F9A4h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DD52B3 second address: DD52B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DD52B9 second address: DD52C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DD52C5 second address: DD52D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jbe 00007F93A8F20C2Eh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DD52D2 second address: DD52DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DD599D second address: DD59AE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A8F20C2Ah 0x00000007 pushad 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DD5F11 second address: DD5F26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 jc 00007F93A913F996h 0x0000000e jl 00007F93A913F996h 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DD5F26 second address: DD5F57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 pop eax 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F93A8F20C32h 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F93A8F20C2Fh 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DD5F57 second address: DD5F5D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DD5F5D second address: DD5F67 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F93A8F20C26h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DD5F67 second address: DD5F6B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DD6215 second address: DD622E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 jmp 00007F93A8F20C2Fh 0x0000000b push edi 0x0000000c pop edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D8A707 second address: D8A726 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F93A913F99Bh 0x00000009 jmp 00007F93A913F99Fh 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DD6650 second address: DD666C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F93A8F20C38h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D5CB9F second address: D5CBA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D5CBA3 second address: D5CBA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D5CBA7 second address: D5CBB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push esi 0x0000000b pop esi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DDDABD second address: DDDAD9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F93A8F20C2Dh 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c jbe 00007F93A8F20C2Ch 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DDCACF second address: DDCAD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DDCEC4 second address: DDCED2 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F93A8F20C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DDCED2 second address: DDCEDF instructions: 0x00000000 rdtsc 0x00000002 jng 00007F93A913F996h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DDC50E second address: DDC51A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 jno 00007F93A8F20C26h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DDC51A second address: DDC520 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DDC520 second address: DDC52A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DDD327 second address: DDD32C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D63700 second address: D63704 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D63704 second address: D6370C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D6370C second address: D63712 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: D63712 second address: D6372A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A913F9A4h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DE512C second address: DE5146 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F93A8F20C2Fh 0x00000009 jc 00007F93A8F20C26h 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DE5146 second address: DE5154 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F93A913F99Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA9088 second address: D89C79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 push eax 0x0000000a mov dword ptr [ebp+122D1FEAh], edx 0x00000010 pop edi 0x00000011 call dword ptr [ebp+122D1892h] 0x00000017 pushad 0x00000018 jno 00007F93A8F20C28h 0x0000001e push esi 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA9486 second address: DA948A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA948A second address: DA94BB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A8F20C2Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a je 00007F93A8F20C42h 0x00000010 pushad 0x00000011 jmp 00007F93A8F20C34h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA94BB second address: BF8AA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 nop 0x00000006 jmp 00007F93A913F9A1h 0x0000000b push dword ptr [ebp+122D1639h] 0x00000011 add dl, FFFFFFEAh 0x00000014 call dword ptr [ebp+122D284Eh] 0x0000001a pushad 0x0000001b mov dword ptr [ebp+122D2E8Ch], edi 0x00000021 xor eax, eax 0x00000023 ja 00007F93A913F99Ch 0x00000029 or dword ptr [ebp+122D2E8Ch], esi 0x0000002f mov edx, dword ptr [esp+28h] 0x00000033 jmp 00007F93A913F9A1h 0x00000038 mov dword ptr [ebp+122D379Eh], eax 0x0000003e mov dword ptr [ebp+122D25F0h], ebx 0x00000044 mov esi, 0000003Ch 0x00000049 sub dword ptr [ebp+122D2E8Ch], ecx 0x0000004f add esi, dword ptr [esp+24h] 0x00000053 pushad 0x00000054 mov edi, 2B242506h 0x00000059 mov edx, 275888BAh 0x0000005e popad 0x0000005f lodsw 0x00000061 or dword ptr [ebp+122D25F0h], esi 0x00000067 add eax, dword ptr [esp+24h] 0x0000006b cmc 0x0000006c mov ebx, dword ptr [esp+24h] 0x00000070 or dword ptr [ebp+122D2E8Ch], edi 0x00000076 cmc 0x00000077 push eax 0x00000078 push eax 0x00000079 push edx 0x0000007a jmp 00007F93A913F9A8h 0x0000007f rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA95AE second address: DA95B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA96CE second address: DA96D4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA9A00 second address: DA9A0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA9A0C second address: DA9A11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA9F46 second address: DA9F4C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA9F4C second address: DA9F52 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA9F52 second address: DA9F56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA9FF4 second address: DAA00B instructions: 0x00000000 rdtsc 0x00000002 je 00007F93A913F99Ch 0x00000008 jng 00007F93A913F996h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 pushad 0x00000012 pushad 0x00000013 push edx 0x00000014 pop edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DAA164 second address: DAA17D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A8F20C2Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DAA17D second address: DAA181 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DAA181 second address: DAA185 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DAA185 second address: DAA18E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DAA2F6 second address: D8A707 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 jne 00007F93A8F20C3Bh 0x0000000d nop 0x0000000e push 00000000h 0x00000010 push ebx 0x00000011 call 00007F93A8F20C28h 0x00000016 pop ebx 0x00000017 mov dword ptr [esp+04h], ebx 0x0000001b add dword ptr [esp+04h], 0000001Ch 0x00000023 inc ebx 0x00000024 push ebx 0x00000025 ret 0x00000026 pop ebx 0x00000027 ret 0x00000028 mov dword ptr [ebp+122D31D5h], ecx 0x0000002e lea eax, dword ptr [ebp+12483E03h] 0x00000034 mov dword ptr [ebp+122DB856h], edi 0x0000003a mov dx, F875h 0x0000003e push eax 0x0000003f jnc 00007F93A8F20C43h 0x00000045 mov dword ptr [esp], eax 0x00000048 adc edx, 0C84681Ch 0x0000004e call dword ptr [ebp+122D2D49h] 0x00000054 jmp 00007F93A8F20C2Fh 0x00000059 push eax 0x0000005a push edx 0x0000005b pushad 0x0000005c push eax 0x0000005d push edx 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DE5C4A second address: DE5C71 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 ja 00007F93A913F996h 0x00000009 pop ecx 0x0000000a jng 00007F93A913F998h 0x00000010 pushad 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push ecx 0x00000015 pushad 0x00000016 pushad 0x00000017 popad 0x00000018 jmp 00007F93A913F99Dh 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DE8E3E second address: DE8E5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F93A8F20C38h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DE8E5A second address: DE8E88 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F93A913F996h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F93A913F99Ch 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F93A913F9A2h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DE8E88 second address: DE8EA4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F93A8F20C2Fh 0x00000008 jnc 00007F93A8F20C26h 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DEB849 second address: DEB84F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DEB84F second address: DEB85E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jl 00007F93A8F20C26h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DEB85E second address: DEB862 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DEB862 second address: DEB86D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DEB9D9 second address: DEB9DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DEBB75 second address: DEBBA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F93A8F20C26h 0x0000000a jmp 00007F93A8F20C38h 0x0000000f popad 0x00000010 jp 00007F93A8F20C2Ch 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DEDEDD second address: DEDEFC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F93A913F9A9h 0x00000009 push eax 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DEE03E second address: DEE061 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F93A8F20C35h 0x00000008 jmp 00007F93A8F20C2Fh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jg 00007F93A8F20C26h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DEE061 second address: DEE06F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A913F99Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DEE06F second address: DEE08A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 jmp 00007F93A8F20C34h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DEE08A second address: DEE099 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 js 00007F93A913F996h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DF3CAB second address: DF3CC8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jc 00007F93A8F20C35h 0x0000000e jmp 00007F93A8F20C2Dh 0x00000013 push eax 0x00000014 pop eax 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DF3CC8 second address: DF3CD8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F93A913F99Ah 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DF3CD8 second address: DF3CDC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DF2F9D second address: DF2FA7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DF2FA7 second address: DF2FF3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A8F20C36h 0x00000007 jbe 00007F93A8F20C26h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f je 00007F93A8F20C2Eh 0x00000015 jmp 00007F93A8F20C2Dh 0x0000001a popad 0x0000001b push edx 0x0000001c pushad 0x0000001d pushad 0x0000001e popad 0x0000001f pushad 0x00000020 popad 0x00000021 jnl 00007F93A8F20C26h 0x00000027 popad 0x00000028 push edi 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DF357E second address: DF358E instructions: 0x00000000 rdtsc 0x00000002 jp 00007F93A913F996h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DF358E second address: DF3594 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DF64D5 second address: DF64E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F93A913F996h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DF64E1 second address: DF64EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jo 00007F93A8F20C26h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DF6688 second address: DF668E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DF67D7 second address: DF67DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DFB36F second address: DFB39A instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F93A913F9A2h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F93A913F99Ch 0x00000011 pushad 0x00000012 push edi 0x00000013 pop edi 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DFB39A second address: DFB39F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DFBD7E second address: DFBD91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 jl 00007F93A913F99Ch 0x0000000d jc 00007F93A913F996h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DFBD91 second address: DFBD99 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DFBD99 second address: DFBDA3 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DFBDA3 second address: DFBDA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E03506 second address: E03510 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F93A913F996h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E037CA second address: E037D0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E037D0 second address: E037EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jl 00007F93A913F9A9h 0x0000000c jmp 00007F93A913F99Dh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E037EB second address: E037F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jg 00007F93A8F20C26h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E03DAF second address: E03DBF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 jne 00007F93A913F996h 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f pop ecx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E03DBF second address: E03DE2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F93A8F20C35h 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d ja 00007F93A8F20C26h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E043F0 second address: E043F6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E043F6 second address: E0440C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 jmp 00007F93A8F20C2Dh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E0440C second address: E04411 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E04411 second address: E0441E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jnl 00007F93A8F20C26h 0x00000009 pop ecx 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E04958 second address: E04980 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F93A913F9A0h 0x00000008 jmp 00007F93A913F99Ch 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jl 00007F93A913F996h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E04980 second address: E04991 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F93A8F20C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E08EDD second address: E08EE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F93A913F996h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E08EE9 second address: E08EEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E08469 second address: E0846F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E0846F second address: E08475 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E08475 second address: E08496 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F93A913F996h 0x00000008 jmp 00007F93A913F9A3h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E08496 second address: E0849A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E085EA second address: E085F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E085F0 second address: E085F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E085F4 second address: E08604 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A913F99Ah 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E08604 second address: E08635 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F93A8F20C2Ah 0x00000008 push ebx 0x00000009 ja 00007F93A8F20C26h 0x0000000f jmp 00007F93A8F20C35h 0x00000014 pop ebx 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E08635 second address: E08639 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E08639 second address: E0863F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E0863F second address: E08656 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F93A913F99Dh 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E08656 second address: E0865B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E0865B second address: E08661 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E15333 second address: E1534D instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F93A8F20C2Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c jng 00007F93A8F20C26h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E154B8 second address: E154BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E154BF second address: E154D6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F93A8F20C33h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E15961 second address: E15965 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E15C27 second address: E15C36 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A8F20C2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E15C36 second address: E15C41 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnp 00007F93A913F996h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E15C41 second address: E15C47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E15D68 second address: E15D8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 pop eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jmp 00007F93A913F9A7h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E16021 second address: E16025 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E161C2 second address: E161D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F93A913F9A0h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E161D8 second address: E161DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E161DC second address: E161E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E161E2 second address: E161E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E1FF78 second address: E1FF7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E2CF5A second address: E2CF5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E2CF5E second address: E2CF62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E2CF62 second address: E2CF7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 push esi 0x00000009 push edi 0x0000000a pop edi 0x0000000b pop esi 0x0000000c jmp 00007F93A8F20C2Ch 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 pop eax 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E326E9 second address: E32700 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 ja 00007F93A913F9A2h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E454E2 second address: E454EC instructions: 0x00000000 rdtsc 0x00000002 jg 00007F93A8F20C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E47A3E second address: E47A42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E47A42 second address: E47A46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E47A46 second address: E47A50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E47A50 second address: E47A5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F93A8F20C26h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E47A5A second address: E47A6F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jc 00007F93A913F996h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E4C090 second address: E4C0AC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A8F20C30h 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b jns 00007F93A8F20C26h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E4C1D1 second address: E4C1ED instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 jmp 00007F93A913F9A1h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E4C4E4 second address: E4C4E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E4C8CE second address: E4C8E8 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F93A913F998h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c ja 00007F93A913F99Ch 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E4C8E8 second address: E4C8ED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E4C8ED second address: E4C902 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F93A913F996h 0x0000000a push edx 0x0000000b pop edx 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jnl 00007F93A913F996h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E4C902 second address: E4C906 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E4FEC8 second address: E4FEE5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A913F99Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jg 00007F93A913F9D9h 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E4FEE5 second address: E4FEEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E4FEEB second address: E4FEEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E60FED second address: E60FF1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E60FF1 second address: E61004 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jno 00007F93A913F996h 0x0000000d pop edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E6CF95 second address: E6CFC6 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F93A8F20C2Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnc 00007F93A8F20C4Eh 0x00000010 pushad 0x00000011 jmp 00007F93A8F20C38h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E8225A second address: E82262 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E823E7 second address: E823F8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F93A8F20C2Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E823F8 second address: E82414 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F93A913F9A1h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e push esi 0x0000000f pop esi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E82534 second address: E8253C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E8253C second address: E82552 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F93A913F9A1h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E82552 second address: E82557 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E82E2E second address: E82E32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E82E32 second address: E82E6B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F93A8F20C39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jnc 00007F93A8F20C28h 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F93A8F20C2Fh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E82E6B second address: E82E6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E82E6F second address: E82E75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E82E75 second address: E82E94 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F93A913F9AAh 0x00000008 jmp 00007F93A913F9A4h 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E8311A second address: E8311E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E85C5A second address: E85C5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E85C5E second address: E85C8A instructions: 0x00000000 rdtsc 0x00000002 jo 00007F93A8F20C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F93A8F20C39h 0x0000000f popad 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E85C8A second address: E85C8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E85C8F second address: E85C94 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E8613B second address: E8613F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: E8613F second address: E8614E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push eax 0x0000000b pop eax 0x0000000c push esi 0x0000000d pop esi 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA2DB9 second address: DA2DC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SQHE4Hsjo6.exe | RDTSC instruction interceptor: First address: DA2DC5 second address: DA2DCF instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F93A8F20C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |