Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149885058.00000000014CF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149885058.00000000014CF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149885058.00000000014CF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://broadcast.st.dl.eccdnx.com |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/ |
Source: v3tb7mqP48.exe, 00000000.00000002.2150773954.00000000014C7000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=SCXpgixTDzt4&a |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/fatalerror.css?v=OFUqlcDNiD6y&l=engli |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149885058.00000000014CF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: v3tb7mqP48.exe, 00000000.00000002.2150773954.00000000014C7000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: v3tb7mqP48.exe, 00000000.00000002.2150773954.00000000014C7000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=M_FULq_A |
Source: v3tb7mqP48.exe, 00000000.00000002.2150773954.00000000014C7000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=aep8 |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=Eq36AUaEgab8&l=en |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://player.vimeo.com |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149885058.00000000014CF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149885058.00000000014CF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: v3tb7mqP48.exe, 00000000.00000002.2150773954.00000000014C7000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149885058.0000000001514000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001514000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900 |
Source: v3tb7mqP48.exe, 00000000.00000002.2150773954.00000000014C7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900s |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: v3tb7mqP48.exe, 00000000.00000003.2150020200.0000000001518000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/; |
Source: v3tb7mqP48.exe, 00000000.00000003.2150020200.0000000001518000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/;Persistent-AuthWWW-AuthenticateVarysteamCountry=US%7C185ce35c568ebbb |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149885058.00000000014CF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: v3tb7mqP48.exe, 00000000.00000003.2149850227.0000000001558000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149850227.000000000155E000.00000004.00000020.00020000.00000000.sdmp, v3tb7mqP48.exe, 00000000.00000003.2149885058.00000000014CF000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: v3tb7mqP48.exe, 00000000.00000002.2150934256.0000000001518000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F1B2B0 | 0_2_00F1B2B0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F18880 | 0_2_00F18880 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F2D0C0 | 0_2_00F2D0C0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F37070 | 0_2_00F37070 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F16000 | 0_2_00F16000 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F221DB | 0_2_00F221DB |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F3B170 | 0_2_00F3B170 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F4F150 | 0_2_00F4F150 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F37133 | 0_2_00F37133 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F35100 | 0_2_00F35100 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_0110F328 | 0_2_0110F328 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F142B0 | 0_2_00F142B0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F192A0 | 0_2_00F192A0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_010D0382 | 0_2_010D0382 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F2825B | 0_2_00F2825B |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F163C0 | 0_2_00F163C0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F32380 | 0_2_00F32380 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F18360 | 0_2_00F18360 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_010E4509 | 0_2_010E4509 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F4A4EF | 0_2_00F4A4EF |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F454C4 | 0_2_00F454C4 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F474AB | 0_2_00F474AB |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F52470 | 0_2_00F52470 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F38437 | 0_2_00F38437 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F4443D | 0_2_00F4443D |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F42426 | 0_2_00F42426 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F2C400 | 0_2_00F2C400 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F2D400 | 0_2_00F2D400 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F27405 | 0_2_00F27405 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_010D5413 | 0_2_010D5413 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F4C5A0 | 0_2_00F4C5A0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F1D545 | 0_2_00F1D545 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F2F6D0 | 0_2_00F2F6D0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_01093759 | 0_2_01093759 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F2A690 | 0_2_00F2A690 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F5768E | 0_2_00F5768E |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F17620 | 0_2_00F17620 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F46610 | 0_2_00F46610 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F357E0 | 0_2_00F357E0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F527B0 | 0_2_00F527B0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F19790 | 0_2_00F19790 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F25720 | 0_2_00F25720 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F518A0 | 0_2_00F518A0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F4B870 | 0_2_00F4B870 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F37860 | 0_2_00F37860 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F16850 | 0_2_00F16850 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F29840 | 0_2_00F29840 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F7A848 | 0_2_00F7A848 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F4F820 | 0_2_00F4F820 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F4080E | 0_2_00F4080E |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F3A9F7 | 0_2_00F3A9F7 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F1E9B0 | 0_2_00F1E9B0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F2194F | 0_2_00F2194F |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00FDA93F | 0_2_00FDA93F |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F43930 | 0_2_00F43930 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F49923 | 0_2_00F49923 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_010C88D4 | 0_2_010C88D4 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F13900 | 0_2_00F13900 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F35AF0 | 0_2_00F35AF0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F2DAD0 | 0_2_00F2DAD0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F39ADE | 0_2_00F39ADE |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F15AB0 | 0_2_00F15AB0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F28A7A | 0_2_00F28A7A |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_010E2B9E | 0_2_010E2B9E |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F3EA62 | 0_2_00F3EA62 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F1CA62 | 0_2_00F1CA62 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F52A60 | 0_2_00F52A60 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F3DBF0 | 0_2_00F3DBF0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F28BC9 | 0_2_00F28BC9 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F3EBB3 | 0_2_00F3EBB3 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F51BB0 | 0_2_00F51BB0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F2BBA0 | 0_2_00F2BBA0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F3EBA1 | 0_2_00F3EBA1 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F3BBA0 | 0_2_00F3BBA0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_010DDA69 | 0_2_010DDA69 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F28B79 | 0_2_00F28B79 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F38B67 | 0_2_00F38B67 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F47B69 | 0_2_00F47B69 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F3EB5F | 0_2_00F3EB5F |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F4CB40 | 0_2_00F4CB40 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F42B24 | 0_2_00F42B24 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F12B20 | 0_2_00F12B20 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F28B23 | 0_2_00F28B23 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F51B20 | 0_2_00F51B20 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_01127AF6 | 0_2_01127AF6 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_010D9AF9 | 0_2_010D9AF9 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F44CEF | 0_2_00F44CEF |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F2DCB0 | 0_2_00F2DCB0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F4ACB0 | 0_2_00F4ACB0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F3FCBC | 0_2_00F3FCBC |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_010D3D54 | 0_2_010D3D54 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F36C76 | 0_2_00F36C76 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F51C40 | 0_2_00F51C40 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F24C20 | 0_2_00F24C20 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F28C2A | 0_2_00F28C2A |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_010D1DF4 | 0_2_010D1DF4 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F14DC0 | 0_2_00F14DC0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F30D90 | 0_2_00F30D90 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_01087C60 | 0_2_01087C60 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00FBAD88 | 0_2_00FBAD88 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F35D6A | 0_2_00F35D6A |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F4CD27 | 0_2_00F4CD27 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F52D20 | 0_2_00F52D20 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F45D13 | 0_2_00F45D13 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F12EF0 | 0_2_00F12EF0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F33EFF | 0_2_00F33EFF |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F2BEE1 | 0_2_00F2BEE1 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F26ED0 | 0_2_00F26ED0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_010E0F79 | 0_2_010E0F79 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F41E8E | 0_2_00F41E8E |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F31E70 | 0_2_00F31E70 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F1AE30 | 0_2_00F1AE30 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F1DFE2 | 0_2_00F1DFE2 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F39FE4 | 0_2_00F39FE4 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F1CFEC | 0_2_00F1CFEC |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F51FB0 | 0_2_00F51FB0 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_010DBE74 | 0_2_010DBE74 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F37F30 | 0_2_00F37F30 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | Code function: 0_2_00F2AF24 | 0_2_00F2AF24 |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: F6B097 second address: F6B09B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: F6B09B second address: F6B0A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: F6B0A1 second address: F6B0AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F083C5154E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: F6B0AB second address: F6B0CF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jmp 00007F083C517C57h 0x0000000f push edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10DA006 second address: 10DA01A instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F083C5154EAh 0x00000008 pushad 0x00000009 popad 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c jbe 00007F083C5154ECh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10E9DD5 second address: 10E9DE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 js 00007F083C517C46h 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10E9DE6 second address: 10E9E2D instructions: 0x00000000 rdtsc 0x00000002 ja 00007F083C5154FFh 0x00000008 pushad 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d jbe 00007F083C5154E6h 0x00000013 jmp 00007F083C5154F4h 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b pushad 0x0000001c push esi 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10EA2A7 second address: 10EA2C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 js 00007F083C517C5Eh 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F083C517C4Ch 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10EA575 second address: 10EA58F instructions: 0x00000000 rdtsc 0x00000002 jg 00007F083C5154EEh 0x00000008 push eax 0x00000009 push edx 0x0000000a jns 00007F083C5154E6h 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10EA718 second address: 10EA71E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10EA71E second address: 10EA726 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10EA726 second address: 10EA735 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jo 00007F083C517C46h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10EA735 second address: 10EA739 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10ED17E second address: 10ED1C1 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 js 00007F083C517C46h 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f push 00000000h 0x00000011 push eax 0x00000012 call 00007F083C517C48h 0x00000017 pop eax 0x00000018 mov dword ptr [esp+04h], eax 0x0000001c add dword ptr [esp+04h], 00000015h 0x00000024 inc eax 0x00000025 push eax 0x00000026 ret 0x00000027 pop eax 0x00000028 ret 0x00000029 push 00000000h 0x0000002b mov dword ptr [ebp+122D2EB5h], edx 0x00000031 push 3B6185C1h 0x00000036 pushad 0x00000037 pushad 0x00000038 je 00007F083C517C46h 0x0000003e push eax 0x0000003f push edx 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10ED1C1 second address: 10ED26A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jg 00007F083C5154E8h 0x0000000b popad 0x0000000c xor dword ptr [esp], 3B618541h 0x00000013 mov esi, ebx 0x00000015 mov dword ptr [ebp+122D1EB8h], eax 0x0000001b push 00000003h 0x0000001d push 00000000h 0x0000001f push ebx 0x00000020 call 00007F083C5154E8h 0x00000025 pop ebx 0x00000026 mov dword ptr [esp+04h], ebx 0x0000002a add dword ptr [esp+04h], 00000015h 0x00000032 inc ebx 0x00000033 push ebx 0x00000034 ret 0x00000035 pop ebx 0x00000036 ret 0x00000037 call 00007F083C5154F1h 0x0000003c pushad 0x0000003d mov bx, di 0x00000040 or edx, dword ptr [ebp+122D34B7h] 0x00000046 popad 0x00000047 pop edx 0x00000048 push 00000000h 0x0000004a push 00000000h 0x0000004c push ebp 0x0000004d call 00007F083C5154E8h 0x00000052 pop ebp 0x00000053 mov dword ptr [esp+04h], ebp 0x00000057 add dword ptr [esp+04h], 0000001Dh 0x0000005f inc ebp 0x00000060 push ebp 0x00000061 ret 0x00000062 pop ebp 0x00000063 ret 0x00000064 mov dword ptr [ebp+122D3312h], edx 0x0000006a jmp 00007F083C5154F7h 0x0000006f push 00000003h 0x00000071 push 45449427h 0x00000076 pushad 0x00000077 push eax 0x00000078 push edx 0x00000079 push eax 0x0000007a push edx 0x0000007b rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10ED26A second address: 10ED26E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10ED26E second address: 10ED28F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C5154EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F083C5154F0h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 110CFC9 second address: 110CFCF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 110D163 second address: 110D170 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F083C5154E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 110D304 second address: 110D30A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 110D30A second address: 110D310 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 110DB10 second address: 110DB38 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F083C517C46h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F083C517C56h 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 110DB38 second address: 110DB3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 110DB3E second address: 110DB48 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 pushad 0x00000008 popad 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 110DB48 second address: 110DB6B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C5154F9h 0x00000007 je 00007F083C5154EEh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 110DDD7 second address: 110DE0D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F083C517C56h 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007F083C517C53h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 110DF85 second address: 110DFB5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push esi 0x0000000a pop esi 0x0000000b push edi 0x0000000c pop edi 0x0000000d popad 0x0000000e jnc 00007F083C5154FAh 0x00000014 popad 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 push edx 0x00000019 pop edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 110DFB5 second address: 110DFB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 110DFB9 second address: 110DFC4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 110181A second address: 1101826 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F083C517C46h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1101826 second address: 110182A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 110E94F second address: 110E971 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C517C50h 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F083C517C4Eh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 110EAF8 second address: 110EAFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 110EAFE second address: 110EB02 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 110EB02 second address: 110EB0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11106EB second address: 1110709 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jnl 00007F083C517C46h 0x0000000c popad 0x0000000d pushad 0x0000000e jmp 00007F083C517C4Eh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10D69A0 second address: 10D69A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10D69A4 second address: 10D69BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a jl 00007F083C517C46h 0x00000010 push edx 0x00000011 pop edx 0x00000012 pop eax 0x00000013 ja 00007F083C517C48h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1114DE2 second address: 1114E14 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C5154EFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F083C5154E8h 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 popad 0x00000012 push eax 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 je 00007F083C5154E6h 0x0000001c jmp 00007F083C5154EBh 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1113C61 second address: 1113C65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1113C65 second address: 1113C85 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F083C5154E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F083C5154EEh 0x0000000f popad 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push ecx 0x00000016 pop ecx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1113C85 second address: 1113C8F instructions: 0x00000000 rdtsc 0x00000002 jl 00007F083C517C46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1117500 second address: 111750D instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F083C5154E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111750D second address: 1117515 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1117515 second address: 111751C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10DF023 second address: 10DF035 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007F083C517C4Ch 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111AFB0 second address: 111AFB6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111AFB6 second address: 111AFBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111AFBC second address: 111AFC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111AFC0 second address: 111AFF9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C517C50h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 js 00007F083C517C46h 0x00000016 jmp 00007F083C517C58h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111B77A second address: 111B77E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111BA42 second address: 111BA52 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jc 00007F083C517C4Eh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111BA52 second address: 111BA58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111C9E2 second address: 111C9E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111CBD9 second address: 111CBDF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111CD26 second address: 111CD2A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111CE0D second address: 111CE14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111CE14 second address: 111CE2A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jns 00007F083C517C46h 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jnp 00007F083C517C54h 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111CEE1 second address: 111CEEB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F083C5154E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111CEEB second address: 111CF03 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F083C517C4Ch 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111D1F0 second address: 111D20B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C5154F7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111D77B second address: 111D780 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111D851 second address: 111D855 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111DBA3 second address: 111DBA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111DC3A second address: 111DC72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push edx 0x0000000c call 00007F083C5154E8h 0x00000011 pop edx 0x00000012 mov dword ptr [esp+04h], edx 0x00000016 add dword ptr [esp+04h], 0000001Ch 0x0000001e inc edx 0x0000001f push edx 0x00000020 ret 0x00000021 pop edx 0x00000022 ret 0x00000023 push eax 0x00000024 push eax 0x00000025 push edx 0x00000026 jbe 00007F083C5154E8h 0x0000002c push eax 0x0000002d pop eax 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111DC72 second address: 111DC78 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111DC78 second address: 111DC7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 111E978 second address: 111E97C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1121A7E second address: 1121A82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1121A82 second address: 1121A86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1121A86 second address: 1121A90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11252F0 second address: 11252F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1125E5F second address: 1125EBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 mov dword ptr [esp], eax 0x00000008 push 00000000h 0x0000000a push eax 0x0000000b call 00007F083C5154E8h 0x00000010 pop eax 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 add dword ptr [esp+04h], 00000017h 0x0000001d inc eax 0x0000001e push eax 0x0000001f ret 0x00000020 pop eax 0x00000021 ret 0x00000022 movsx esi, ax 0x00000025 push 00000000h 0x00000027 mov dword ptr [ebp+122D24EDh], eax 0x0000002d push 00000000h 0x0000002f push 00000000h 0x00000031 push ebp 0x00000032 call 00007F083C5154E8h 0x00000037 pop ebp 0x00000038 mov dword ptr [esp+04h], ebp 0x0000003c add dword ptr [esp+04h], 00000015h 0x00000044 inc ebp 0x00000045 push ebp 0x00000046 ret 0x00000047 pop ebp 0x00000048 ret 0x00000049 mov si, dx 0x0000004c push eax 0x0000004d jo 00007F083C5154F0h 0x00000053 push eax 0x00000054 push edx 0x00000055 pushad 0x00000056 popad 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1127864 second address: 112786E instructions: 0x00000000 rdtsc 0x00000002 ja 00007F083C517C46h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 112786E second address: 1127889 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F083C5154ECh 0x0000000b pushad 0x0000000c js 00007F083C5154E6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1125BF8 second address: 1125BFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11266D8 second address: 11266E2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007F083C5154E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1125BFC second address: 1125C03 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 112A9FA second address: 112A9FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 112BB6B second address: 112BBF0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push esi 0x00000009 push edx 0x0000000a push edx 0x0000000b pop edx 0x0000000c pop edx 0x0000000d pop esi 0x0000000e nop 0x0000000f mov ebx, edx 0x00000011 mov ebx, dword ptr [ebp+122D36DBh] 0x00000017 push dword ptr fs:[00000000h] 0x0000001e mov edi, dword ptr [ebp+12456B95h] 0x00000024 mov dword ptr fs:[00000000h], esp 0x0000002b jmp 00007F083C517C52h 0x00000030 mov eax, dword ptr [ebp+122D0751h] 0x00000036 jmp 00007F083C517C4Fh 0x0000003b push FFFFFFFFh 0x0000003d push 00000000h 0x0000003f push ebx 0x00000040 call 00007F083C517C48h 0x00000045 pop ebx 0x00000046 mov dword ptr [esp+04h], ebx 0x0000004a add dword ptr [esp+04h], 00000017h 0x00000052 inc ebx 0x00000053 push ebx 0x00000054 ret 0x00000055 pop ebx 0x00000056 ret 0x00000057 xor bh, FFFFFFBDh 0x0000005a mov di, C20Ah 0x0000005e push eax 0x0000005f jo 00007F083C517C54h 0x00000065 push eax 0x00000066 push edx 0x00000067 push eax 0x00000068 push edx 0x00000069 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 112D883 second address: 112D89E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C5154F3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 112BBF0 second address: 112BBF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 112D89E second address: 112D8A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 112E7DE second address: 112E7E2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 112D9D3 second address: 112DA6E instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F083C5154E8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b call 00007F083C5154EDh 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 jmp 00007F083C5154F5h 0x00000018 popad 0x00000019 pop edi 0x0000001a push dword ptr fs:[00000000h] 0x00000021 push edx 0x00000022 add dword ptr [ebp+122D1EC6h], edi 0x00000028 pop ebx 0x00000029 mov dword ptr fs:[00000000h], esp 0x00000030 mov eax, dword ptr [ebp+122D0F25h] 0x00000036 mov edi, 16104A31h 0x0000003b jmp 00007F083C5154F3h 0x00000040 push FFFFFFFFh 0x00000042 push 00000000h 0x00000044 push edx 0x00000045 call 00007F083C5154E8h 0x0000004a pop edx 0x0000004b mov dword ptr [esp+04h], edx 0x0000004f add dword ptr [esp+04h], 00000019h 0x00000057 inc edx 0x00000058 push edx 0x00000059 ret 0x0000005a pop edx 0x0000005b ret 0x0000005c mov edi, dword ptr [ebp+122D37C7h] 0x00000062 nop 0x00000063 push eax 0x00000064 je 00007F083C5154ECh 0x0000006a push eax 0x0000006b push edx 0x0000006c rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 112E7E2 second address: 112E7E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 112DA6E second address: 112DA7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b pop ebx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 112F864 second address: 112F868 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 112EA28 second address: 112EA3B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F083C5154EEh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 112F868 second address: 112F889 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F083C517C56h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 112EA3B second address: 112EA48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 112F889 second address: 112F8F6 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F083C517C46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ecx 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push 00000000h 0x00000010 push ecx 0x00000011 call 00007F083C517C48h 0x00000016 pop ecx 0x00000017 mov dword ptr [esp+04h], ecx 0x0000001b add dword ptr [esp+04h], 00000014h 0x00000023 inc ecx 0x00000024 push ecx 0x00000025 ret 0x00000026 pop ecx 0x00000027 ret 0x00000028 mov di, si 0x0000002b push 00000000h 0x0000002d push 00000000h 0x0000002f push ecx 0x00000030 call 00007F083C517C48h 0x00000035 pop ecx 0x00000036 mov dword ptr [esp+04h], ecx 0x0000003a add dword ptr [esp+04h], 00000016h 0x00000042 inc ecx 0x00000043 push ecx 0x00000044 ret 0x00000045 pop ecx 0x00000046 ret 0x00000047 xchg eax, esi 0x00000048 jmp 00007F083C517C55h 0x0000004d push eax 0x0000004e pushad 0x0000004f js 00007F083C517C4Ch 0x00000055 push eax 0x00000056 push edx 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1130964 second address: 1130979 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C5154EAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a push eax 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 112FAEB second address: 112FB1A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C517C50h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jc 00007F083C517C58h 0x00000012 jmp 00007F083C517C52h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1130979 second address: 113097D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1131A0C second address: 1131A2E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C517C57h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1131A2E second address: 1131A32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1131A32 second address: 1131A40 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C517C4Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1131A40 second address: 1131A46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1131A46 second address: 1131A96 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 sbb edi, 7636CBEEh 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push ebx 0x00000014 call 00007F083C517C48h 0x00000019 pop ebx 0x0000001a mov dword ptr [esp+04h], ebx 0x0000001e add dword ptr [esp+04h], 0000001Ch 0x00000026 inc ebx 0x00000027 push ebx 0x00000028 ret 0x00000029 pop ebx 0x0000002a ret 0x0000002b jo 00007F083C517C4Ch 0x00000031 mov dword ptr [ebp+122D2D01h], ecx 0x00000037 push 00000000h 0x00000039 xor dword ptr [ebp+1245BAABh], ecx 0x0000003f xchg eax, esi 0x00000040 push eax 0x00000041 push edx 0x00000042 push eax 0x00000043 push edx 0x00000044 push eax 0x00000045 push edx 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1131A96 second address: 1131A9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1131A9A second address: 1131AA0 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1131AA0 second address: 1131AB2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F083C5154EEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1131AB2 second address: 1131AC4 instructions: 0x00000000 rdtsc 0x00000002 je 00007F083C517C46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1131AC4 second address: 1131ACB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1131ACB second address: 1131AD1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1131C7C second address: 1131C82 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1133B2C second address: 1133B30 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1134B1A second address: 1134B23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1136BA8 second address: 1136BB2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F083C517C46h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1136BB2 second address: 1136C35 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push 00000000h 0x0000000d push ebx 0x0000000e call 00007F083C5154E8h 0x00000013 pop ebx 0x00000014 mov dword ptr [esp+04h], ebx 0x00000018 add dword ptr [esp+04h], 0000001Dh 0x00000020 inc ebx 0x00000021 push ebx 0x00000022 ret 0x00000023 pop ebx 0x00000024 ret 0x00000025 push 00000000h 0x00000027 push 00000000h 0x00000029 push esi 0x0000002a call 00007F083C5154E8h 0x0000002f pop esi 0x00000030 mov dword ptr [esp+04h], esi 0x00000034 add dword ptr [esp+04h], 0000001Ch 0x0000003c inc esi 0x0000003d push esi 0x0000003e ret 0x0000003f pop esi 0x00000040 ret 0x00000041 movzx ebx, cx 0x00000044 push 00000000h 0x00000046 mov ebx, 0E8F3302h 0x0000004b mov ebx, 20F5060Bh 0x00000050 xchg eax, esi 0x00000051 push eax 0x00000052 push edx 0x00000053 pushad 0x00000054 push ebx 0x00000055 pop ebx 0x00000056 jmp 00007F083C5154F7h 0x0000005b popad 0x0000005c rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1136C35 second address: 1136C63 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F083C517C5Bh 0x00000008 jmp 00007F083C517C55h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jp 00007F083C517C4Ch 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1136C63 second address: 1136C68 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1133CE3 second address: 1133CE8 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1134C40 second address: 1134C44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1134C44 second address: 1134C48 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1134C48 second address: 1134C59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b ja 00007F083C5154E6h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1139EB7 second address: 1139F81 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C517C59h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b jnc 00007F083C517C4Ah 0x00000011 nop 0x00000012 push 00000000h 0x00000014 push esi 0x00000015 call 00007F083C517C48h 0x0000001a pop esi 0x0000001b mov dword ptr [esp+04h], esi 0x0000001f add dword ptr [esp+04h], 00000015h 0x00000027 inc esi 0x00000028 push esi 0x00000029 ret 0x0000002a pop esi 0x0000002b ret 0x0000002c jmp 00007F083C517C4Dh 0x00000031 xor di, 7561h 0x00000036 push 00000000h 0x00000038 push 00000000h 0x0000003a push ecx 0x0000003b call 00007F083C517C48h 0x00000040 pop ecx 0x00000041 mov dword ptr [esp+04h], ecx 0x00000045 add dword ptr [esp+04h], 00000014h 0x0000004d inc ecx 0x0000004e push ecx 0x0000004f ret 0x00000050 pop ecx 0x00000051 ret 0x00000052 pushad 0x00000053 jmp 00007F083C517C52h 0x00000058 call 00007F083C517C56h 0x0000005d or dword ptr [ebp+122D3339h], ebx 0x00000063 pop edi 0x00000064 popad 0x00000065 mov dword ptr [ebp+12456B95h], ecx 0x0000006b push 00000000h 0x0000006d jmp 00007F083C517C54h 0x00000072 xchg eax, esi 0x00000073 pushad 0x00000074 push eax 0x00000075 push edx 0x00000076 push esi 0x00000077 pop esi 0x00000078 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1137F67 second address: 1137F6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1138FBC second address: 1138FD9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F083C517C58h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1138FD9 second address: 1138FE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1141A6F second address: 1141A81 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F083C517C4Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1141A81 second address: 1141A85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1141BCF second address: 1141BE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F083C517C4Ah 0x0000000a jp 00007F083C517C4Eh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1141BE5 second address: 1141C31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a jmp 00007F083C5154F8h 0x0000000f jmp 00007F083C5154EFh 0x00000014 pop ecx 0x00000015 push esi 0x00000016 jmp 00007F083C5154F2h 0x0000001b jo 00007F083C5154E6h 0x00000021 pop esi 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1141D75 second address: 1141D7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1141D7B second address: 1141D85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push edi 0x00000006 push esi 0x00000007 pop esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1141D85 second address: 1141D93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push ecx 0x00000006 jno 00007F083C517C46h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1144567 second address: 1144571 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F083C5154EEh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1144571 second address: 114457F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b push edx 0x0000000c pop edx 0x0000000d pop edi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 114457F second address: 1144584 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 114E7B9 second address: 114E7D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F083C517C56h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 114DC2D second address: 114DC33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 114DC33 second address: 114DC3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 114DDE0 second address: 114DDE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 114DDE5 second address: 114DDF3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F083C517C4Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 114DDF3 second address: 114DE14 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d js 00007F083C5154E6h 0x00000013 jmp 00007F083C5154EDh 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 114DE14 second address: 114DE1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 114DE1C second address: 114DE20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 114E21D second address: 114E223 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 114E223 second address: 114E236 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 jc 00007F083C515506h 0x0000000d push eax 0x0000000e push edx 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1128B2D second address: 1128B69 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xor dword ptr [esp], 58BBA218h 0x0000000e push 00000000h 0x00000010 push eax 0x00000011 call 00007F083C517C48h 0x00000016 pop eax 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b add dword ptr [esp+04h], 00000014h 0x00000023 inc eax 0x00000024 push eax 0x00000025 ret 0x00000026 pop eax 0x00000027 ret 0x00000028 movzx edx, si 0x0000002b push ADB2F219h 0x00000030 push eax 0x00000031 push edx 0x00000032 push esi 0x00000033 jnp 00007F083C517C46h 0x00000039 pop esi 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1128B69 second address: 1128B86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F083C5154F9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1128C32 second address: 1128C38 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1128DD5 second address: 1128DE0 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1128DE0 second address: 1128DF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jnc 00007F083C517C4Ch 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1128F25 second address: 1128F29 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1128F29 second address: 1128F32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1128F32 second address: 1128F8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push ebx 0x0000000c call 00007F083C5154E8h 0x00000011 pop ebx 0x00000012 mov dword ptr [esp+04h], ebx 0x00000016 add dword ptr [esp+04h], 00000018h 0x0000001e inc ebx 0x0000001f push ebx 0x00000020 ret 0x00000021 pop ebx 0x00000022 ret 0x00000023 sbb cl, FFFFFFA4h 0x00000026 push 00000004h 0x00000028 add di, 7F62h 0x0000002d nop 0x0000002e pushad 0x0000002f jp 00007F083C5154ECh 0x00000035 jns 00007F083C5154F3h 0x0000003b popad 0x0000003c push eax 0x0000003d push ecx 0x0000003e push eax 0x0000003f push edx 0x00000040 push edi 0x00000041 pop edi 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1128F6F second address: 1128F8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F083C517C53h 0x0000000a popad 0x0000000b push eax 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 pop edi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11293E4 second address: 11293F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop ecx 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11293F0 second address: 11293F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1151FC9 second address: 1151FE2 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F083C5154E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F083C5154EDh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1151FE2 second address: 1152008 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C517C4Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jmp 00007F083C517C53h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1152564 second address: 1152568 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1152568 second address: 115256C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 115256C second address: 115257C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a je 00007F083C5154E6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11526C7 second address: 11526CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11526CB second address: 11526CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11526CF second address: 11526D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 115280F second address: 115282C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F083C5154F3h 0x00000009 jns 00007F083C5154E6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 115296B second address: 1152971 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1152971 second address: 11529B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F083C5154F5h 0x00000009 popad 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F083C5154F5h 0x00000012 pushad 0x00000013 jne 00007F083C5154E6h 0x00000019 ja 00007F083C5154E6h 0x0000001f pushad 0x00000020 popad 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11529B3 second address: 11529B8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11573A7 second address: 11573AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11573AB second address: 11573B5 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11573B5 second address: 11573B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11573B9 second address: 11573DD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C517C50h 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c pushad 0x0000000d popad 0x0000000e jbe 00007F083C517C46h 0x00000014 pop ecx 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1157946 second address: 115795A instructions: 0x00000000 rdtsc 0x00000002 jg 00007F083C5154E6h 0x00000008 jng 00007F083C5154E6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 115795A second address: 1157960 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1157960 second address: 1157985 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F083C5154E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edx 0x0000000b jmp 00007F083C5154F2h 0x00000010 push eax 0x00000011 push edx 0x00000012 jnl 00007F083C5154E6h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1157AF3 second address: 1157AF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1157AF9 second address: 1157B01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1157D97 second address: 1157D9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1157D9D second address: 1157DB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F083C5154E6h 0x0000000a popad 0x0000000b push esi 0x0000000c pushad 0x0000000d popad 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 jc 00007F083C5154E6h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1157F28 second address: 1157F4C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C517C4Ch 0x00000007 pushad 0x00000008 jmp 00007F083C517C53h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 115CC69 second address: 115CC90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F083C5154EDh 0x00000009 jmp 00007F083C5154F2h 0x0000000e popad 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 115CF62 second address: 115CF6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 115D219 second address: 115D21D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 115D4CF second address: 115D4D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 115D4D5 second address: 115D4D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 115D4D9 second address: 115D4FF instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F083C517C46h 0x00000008 jmp 00007F083C517C59h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 115D4FF second address: 115D50D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F083C5154E6h 0x0000000a popad 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 115D679 second address: 115D683 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 115D683 second address: 115D696 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F083C5154E6h 0x0000000a jl 00007F083C5154E6h 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 115D811 second address: 115D819 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 115D819 second address: 115D81E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 115D975 second address: 115D98E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F083C517C53h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 115DAEF second address: 115DB09 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F083C5154F5h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 115C83A second address: 115C858 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007F083C517C59h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1160BFB second address: 1160C05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F083C5154E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1160C05 second address: 1160C20 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007F083C517C55h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1160C20 second address: 1160C25 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10D33FA second address: 10D3410 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 jbe 00007F083C517C46h 0x0000000f push edx 0x00000010 pop edx 0x00000011 pop ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 pop eax 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10D3410 second address: 10D3427 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C5154F1h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1164478 second address: 116449C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F083C517C4Ah 0x00000009 jns 00007F083C517C46h 0x0000000f jmp 00007F083C517C4Ch 0x00000014 popad 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 116449C second address: 11644A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F083C5154E6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 116AF51 second address: 116AF69 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C517C52h 0x00000007 push eax 0x00000008 push edx 0x00000009 push esi 0x0000000a pop esi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 116DDD7 second address: 116DDE2 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10E3FFA second address: 10E4002 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10E4002 second address: 10E4027 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 jc 00007F083C515512h 0x0000000c push esi 0x0000000d jmp 00007F083C5154F6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10E4027 second address: 10E402F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10E402F second address: 10E4035 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 117461E second address: 1174624 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1173ACB second address: 1173AD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1173AD3 second address: 1173AD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1173DAF second address: 1173DB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 117409F second address: 11740A9 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F083C517C46h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11740A9 second address: 11740B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11740B3 second address: 11740B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11740B9 second address: 11740BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1177604 second address: 1177609 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1177609 second address: 1177616 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1177616 second address: 117761A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1176FC4 second address: 1176FC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 10E0A7E second address: 10E0A82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 117C52D second address: 117C532 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 117C532 second address: 117C54E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jne 00007F083C517C4Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 push edi 0x00000013 pop edi 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 117C54E second address: 117C554 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 117C9D9 second address: 117C9E6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jg 00007F083C517C46h 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 117C9E6 second address: 117C9F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 js 00007F083C5154E6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1183451 second address: 11834AB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F083C517C4Bh 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007F083C517C53h 0x0000000f push edi 0x00000010 pop edi 0x00000011 popad 0x00000012 je 00007F083C517C5Fh 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F083C517C51h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11834AB second address: 11834B0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1183780 second address: 118378A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 118378A second address: 1183790 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1184549 second address: 1184578 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F083C517C57h 0x00000009 jmp 00007F083C517C54h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1184578 second address: 11845A6 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F083C5154E6h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jp 00007F083C5154EAh 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 push edx 0x00000015 pop edx 0x00000016 pop edx 0x00000017 pop eax 0x00000018 pushad 0x00000019 pushad 0x0000001a jc 00007F083C5154E6h 0x00000020 jc 00007F083C5154E6h 0x00000026 pushad 0x00000027 popad 0x00000028 popad 0x00000029 pushad 0x0000002a push eax 0x0000002b pop eax 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1184877 second address: 118487B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1184E57 second address: 1184E62 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1184E62 second address: 1184E66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1184E66 second address: 1184E6A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1184E6A second address: 1184E70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1184E70 second address: 1184E75 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1184E75 second address: 1184E8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F083C517C46h 0x0000000a pop edx 0x0000000b pushad 0x0000000c jc 00007F083C517C46h 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1184E8B second address: 1184E91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 118EEC6 second address: 118EEE2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F083C517C55h 0x00000008 push esi 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 118F328 second address: 118F32C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 118F5CA second address: 118F5D4 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F083C517C46h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 118F8C2 second address: 118F8D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 jng 00007F083C5154E6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 118F8D0 second address: 118F903 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 push esi 0x00000007 pop esi 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F083C517C53h 0x00000013 jmp 00007F083C517C52h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 118F903 second address: 118F917 instructions: 0x00000000 rdtsc 0x00000002 js 00007F083C5154E8h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e ja 00007F083C5154E6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1197565 second address: 119756A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 119756A second address: 1197570 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1197570 second address: 1197574 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1197574 second address: 119758B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C5154F3h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11979D4 second address: 11979E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11979E3 second address: 11979E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1197B25 second address: 1197B2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 pop eax 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1197B2E second address: 1197B3A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F083C5154E6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1197B3A second address: 1197B3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1198966 second address: 1198985 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007F083C5154E6h 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b jmp 00007F083C5154EAh 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 push edi 0x00000019 pop edi 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1198985 second address: 1198989 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1198989 second address: 119899E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F083C5154EAh 0x0000000b pushad 0x0000000c push esi 0x0000000d pop esi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 119904A second address: 119904E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1196F74 second address: 1196F9D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C5154EBh 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jg 00007F083C5154ECh 0x00000011 jp 00007F083C5154E6h 0x00000017 pop edi 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b jo 00007F083C5154E6h 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1196F9D second address: 1196FA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 119EFEF second address: 119EFF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 119EFF5 second address: 119F018 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F083C517C59h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 119F018 second address: 119F01C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 119F01C second address: 119F028 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 119F028 second address: 119F02C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 119EA28 second address: 119EA2E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 119EB6E second address: 119EB7E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F083C5154E6h 0x0000000a js 00007F083C5154E6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 119EB7E second address: 119EB92 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F083C517C46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e jns 00007F083C517C46h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 119ECDF second address: 119ECE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F083C5154E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 119ECE9 second address: 119ED03 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C517C56h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C6240 second address: 11C6244 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C6244 second address: 11C6255 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jbe 00007F083C517C46h 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C6255 second address: 11C6281 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C5154F7h 0x00000007 jno 00007F083C5154E6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 jbe 00007F083C5154E6h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C4F3C second address: 11C4F42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C50AD second address: 11C50BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F083C5154EBh 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C50BE second address: 11C50E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C517C4Ah 0x00000007 je 00007F083C517C46h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 jmp 00007F083C517C52h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C50E8 second address: 11C5120 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jng 00007F083C5154FBh 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F083C5154EBh 0x00000017 jbe 00007F083C5154E6h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C5120 second address: 11C5126 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C5126 second address: 11C5153 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C5154EFh 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F083C5154F8h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C5153 second address: 11C5157 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C53D4 second address: 11C53DF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnl 00007F083C5154E6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C5563 second address: 11C556D instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F083C517C46h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C556D second address: 11C5576 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C9C75 second address: 11C9C7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop ecx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C9C7F second address: 11C9C87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C9C87 second address: 11C9C94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 je 00007F083C517C46h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C9C94 second address: 11C9CB7 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 jbe 00007F083C515516h 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 jmp 00007F083C5154F2h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C9DC6 second address: 11C9DCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11C9DCA second address: 11C9DCE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11CE35D second address: 11CE374 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C517C4Ah 0x00000007 js 00007F083C517C46h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11CE374 second address: 11CE382 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jno 00007F083C5154E6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11D79F1 second address: 11D79F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11D79F5 second address: 11D7A06 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F083C5154EBh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11D7A06 second address: 11D7A0A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11D7A0A second address: 11D7A30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F083C5154F6h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jl 00007F083C5154E6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11D7A30 second address: 11D7A34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11D4499 second address: 11D44A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C5154ECh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11E5705 second address: 11E570B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11E6F99 second address: 11E6FB5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C5154F4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11EAB52 second address: 11EAB56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11EAB56 second address: 11EAB61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 11EA78F second address: 11EA7A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jmp 00007F083C517C4Bh 0x0000000b popad 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 120100B second address: 120100F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 12000D7 second address: 12000E7 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jns 00007F083C517C46h 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 12000E7 second address: 12000EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 12007DA second address: 12007F2 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F083C517C46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a ja 00007F083C517C4Eh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1200BED second address: 1200BFC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push edi 0x00000006 pop edi 0x00000007 jl 00007F083C5154E6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1202646 second address: 120264B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1203D34 second address: 1203D52 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C5154F4h 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1203D52 second address: 1203D6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F083C517C56h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1203D6C second address: 1203D86 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C5154ECh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jnc 00007F083C5154E6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 120673E second address: 1206742 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1206742 second address: 1206748 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1206748 second address: 1206756 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1206756 second address: 1206761 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F083C5154E6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1206980 second address: 120699A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F083C517C55h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1206A48 second address: 1206A64 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C5154EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 jo 00007F083C5154E6h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1206A64 second address: 1206A90 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F083C517C58h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jmp 00007F083C517C4Dh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1206A90 second address: 1206AD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov eax, dword ptr [eax] 0x00000008 pushad 0x00000009 jmp 00007F083C5154EDh 0x0000000e ja 00007F083C5154F5h 0x00000014 popad 0x00000015 mov dword ptr [esp+04h], eax 0x00000019 push edi 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F083C5154EDh 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1206D69 second address: 1206D7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F083C517C4Dh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1206D7F second address: 1206D83 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1208242 second address: 1208246 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1208246 second address: 120824C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 120824C second address: 1208263 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F083C517C4Fh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 1208263 second address: 120826F instructions: 0x00000000 rdtsc 0x00000002 je 00007F083C5154E6h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 120826F second address: 1208281 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jo 00007F083C517C46h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\v3tb7mqP48.exe | RDTSC instruction interceptor: First address: 120A08E second address: 120A094 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |