Windows Analysis Report
MysticThumbs4.2.0 Patch.exe

Overview

General Information

Sample name: MysticThumbs4.2.0 Patch.exe
Analysis ID: 1544637
MD5: 204728b183383e9e064ccb65fba64408
SHA1: d8b1b2bd56de42db44013e23d84e3aacdee202db
SHA256: 4639a785aa9db39e1823df53c9c25195d41bcbcc05245d068058b64512f1bcff
Infos:

Detection

Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Hides threads from debuggers
Machine Learning detection for sample
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Abnormal high CPU Usage
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

AV Detection

barindex
Source: MysticThumbs4.2.0 Patch.exe Avira: detected
Source: C:\Users\user\AppData\Local\Temp\E_N60005\krnln.fnr ReversingLabs: Detection: 35%
Source: MysticThumbs4.2.0 Patch.exe ReversingLabs: Detection: 73%
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: MysticThumbs4.2.0 Patch.exe Joe Sandbox ML: detected
Source: MysticThumbs4.2.0 Patch.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_100655A0 FindFirstFileA,FindClose, 0_2_100655A0
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_10065610 FindFirstFileA,FindClose, 0_2_10065610
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 4x nop then push esi 0_2_1008D06A
Source: MysticThumbs4.2.0 Patch.exe, 00000000.00000002.3767180830.000000001010D000.00000008.00000001.01000000.00000005.sdmp, MysticThumbs4.2.0 Patch.exe, 00000000.00000003.1322941486.00000000049AB000.00000004.00000020.00020000.00000000.sdmp, krnln.fnr.0.dr String found in binary or memory: http://dywt.com.cn
Source: MysticThumbs4.2.0 Patch.exe, 00000000.00000003.1322941486.0000000004AE6000.00000004.00000020.00020000.00000000.sdmp, dp1.fne.0.dr String found in binary or memory: http://dywt.com.cn/RSATool2v14.rar
Source: MysticThumbs4.2.0 Patch.exe, 00000000.00000003.1321710760.0000000002560000.00000004.00001000.00020000.00000000.sdmp String found in binary or memory: http://www.52pojie.cn/
Source: MysticThumbs4.2.0 Patch.exe, 00000000.00000003.1322941486.0000000004B06000.00000004.00000020.00020000.00000000.sdmp, eAPI.fne.0.dr String found in binary or memory: http://www.baidu.com
Source: MysticThumbs4.2.0 Patch.exe, 00000000.00000003.1322941486.0000000004B06000.00000004.00000020.00020000.00000000.sdmp, eAPI.fne.0.dr String found in binary or memory: http://www.baidu.comtest
Source: MysticThumbs4.2.0 Patch.exe, 00000000.00000003.1322941486.0000000004B06000.00000004.00000020.00020000.00000000.sdmp, MysticThumbs4.2.0 Patch.exe, 00000000.00000003.1322941486.0000000004AE6000.00000004.00000020.00020000.00000000.sdmp, dp1.fne.0.dr, eAPI.fne.0.dr String found in binary or memory: http://www.eyuyan.com
Source: MysticThumbs4.2.0 Patch.exe, 00000000.00000003.1322941486.0000000004B01000.00000004.00000020.00020000.00000000.sdmp, dp1.fne.0.dr String found in binary or memory: http://www.eyuyan.comDVarFileInfo$
Source: MysticThumbs4.2.0 Patch.exe, 00000000.00000003.1322941486.0000000004B06000.00000004.00000020.00020000.00000000.sdmp, MysticThumbs4.2.0 Patch.exe, 00000000.00000003.1322941486.0000000004AE6000.00000004.00000020.00020000.00000000.sdmp, dp1.fne.0.dr, eAPI.fne.0.dr String found in binary or memory: http://www.eyuyan.comservice
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_10089250 GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,GlobalFree,EmptyClipboard,SetClipboardData,CloseClipboard, 0_2_10089250
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_10089250 GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,GlobalFree,EmptyClipboard,SetClipboardData,CloseClipboard, 0_2_10089250
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_100893A0 OpenClipboard,GetClipboardData,CloseClipboard,GlobalSize,GlobalLock,GlobalUnlock,CloseClipboard, 0_2_100893A0
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_100BD010 IsWindowEnabled,TranslateAcceleratorA,IsChild,GetFocus,PostMessageA,PostMessageA,SendMessageA,IsChild,IsWindow,IsWindowVisible,SendMessageA,SendMessageA,SendMessageA,SendMessageA,GetParent,SendMessageA,WinHelpA,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,IsWindow, 0_2_100BD010

System Summary

barindex
Source: MysticThumbs4.2.0 Patch.exe Static PE information: section name:
Source: MysticThumbs4.2.0 Patch.exe Static PE information: section name: .idata
Source: MysticThumbs4.2.0 Patch.exe Static PE information: section name:
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Process Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0044A047 0_2_0044A047
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C6048 0_2_004C6048
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004DF047 0_2_004DF047
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004BF044 0_2_004BF044
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047B054 0_2_0047B054
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00487054 0_2_00487054
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049506B 0_2_0049506B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00501072 0_2_00501072
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0046F062 0_2_0046F062
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049706E 0_2_0049706E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E6069 0_2_004E6069
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0044B068 0_2_0044B068
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00509062 0_2_00509062
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D107E 0_2_004D107E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D5070 0_2_004D5070
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E300B 0_2_004E300B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0046700F 0_2_0046700F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050B01C 0_2_0050B01C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043100E 0_2_0043100E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0045500A 0_2_0045500A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D301F 0_2_004D301F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004EA01A 0_2_004EA01A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00460025 0_2_00460025
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0048A020 0_2_0048A020
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00443028 0_2_00443028
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043402E 0_2_0043402E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004BA03B 0_2_004BA03B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00449036 0_2_00449036
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050702B 0_2_0050702B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B90C2 0_2_004B90C2
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004AF0C0 0_2_004AF0C0
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F00DD 0_2_004F00DD
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004370DC 0_2_004370DC
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0045C0E2 0_2_0045C0E2
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F70E5 0_2_004F70E5
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043C0F1 0_2_0043C0F1
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004AB0F3 0_2_004AB0F3
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F60F5 0_2_004F60F5
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043B083 0_2_0043B083
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0048108C 0_2_0048108C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F8086 0_2_004F8086
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00479091 0_2_00479091
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E2096 0_2_004E2096
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047209E 0_2_0047209E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043A099 0_2_0043A099
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047E0A6 0_2_0047E0A6
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0056E0B0 0_2_0056E0B0
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004A80A5 0_2_004A80A5
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0045E0B6 0_2_0045E0B6
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0048D0B1 0_2_0048D0B1
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_005690AA 0_2_005690AA
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047B146 0_2_0047B146
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049914C 0_2_0049914C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B6147 0_2_004B6147
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004ED155 0_2_004ED155
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B3156 0_2_004B3156
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004DB16D 0_2_004DB16D
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00468165 0_2_00468165
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004EF161 0_2_004EF161
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049517B 0_2_0049517B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004A2179 0_2_004A2179
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049D104 0_2_0049D104
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050A11F 0_2_0050A11F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00480114 0_2_00480114
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004FB12D 0_2_004FB12D
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0048E12B 0_2_0048E12B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004CA12F 0_2_004CA12F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00440120 0_2_00440120
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004AD12E 0_2_004AD12E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00477122 0_2_00477122
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0057D13F 0_2_0057D13F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C8126 0_2_004C8126
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0046D128 0_2_0046D128
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00461137 0_2_00461137
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00466134 0_2_00466134
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050C126 0_2_0050C126
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B2132 0_2_004B2132
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C01CB 0_2_004C01CB
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D01DC 0_2_004D01DC
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F91DB 0_2_004F91DB
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043E1D8 0_2_0043E1D8
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043D1F3 0_2_0043D1F3
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004DE1FF 0_2_004DE1FF
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0046C1FB 0_2_0046C1FB
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004781FA 0_2_004781FA
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0048418A 0_2_0048418A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00470184 0_2_00470184
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004EB188 0_2_004EB188
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004EC187 0_2_004EC187
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0051219B 0_2_0051219B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043418F 0_2_0043418F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00502188 0_2_00502188
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D2196 0_2_004D2196
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F5190 0_2_004F5190
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004FD1A8 0_2_004FD1A8
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004421A9 0_2_004421A9
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B51A4 0_2_004B51A4
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004851BC 0_2_004851BC
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004591BD 0_2_004591BD
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004CF1B6 0_2_004CF1B6
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00448242 0_2_00448242
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047124D 0_2_0047124D
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E9242 0_2_004E9242
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047B254 0_2_0047B254
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00483256 0_2_00483256
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0042F269 0_2_0042F269
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004FF273 0_2_004FF273
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0048B20A 0_2_0048B20A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0042D21D 0_2_0042D21D
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E123D 0_2_004E123D
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047F230 0_2_0047F230
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D423A 0_2_004D423A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B7232 0_2_004B7232
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0044C2C8 0_2_0044C2C8
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004BB2C7 0_2_004BB2C7
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_005092CF 0_2_005092CF
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D72E9 0_2_004D72E9
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004332E4 0_2_004332E4
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C92E5 0_2_004C92E5
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F42F9 0_2_004F42F9
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0044E2FE 0_2_0044E2FE
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004442F9 0_2_004442F9
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0042A2FD 0_2_0042A2FD
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00511291 0_2_00511291
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0042E292 0_2_0042E292
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00438297 0_2_00438297
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049B29E 0_2_0049B29E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004A1296 0_2_004A1296
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C42AC 0_2_004C42AC
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050A2B0 0_2_0050A2B0
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004302B3 0_2_004302B3
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004362B4 0_2_004362B4
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_005132A8 0_2_005132A8
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F32B1 0_2_004F32B1
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00435343 0_2_00435343
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047434F 0_2_0047434F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0048C340 0_2_0048C340
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F1347 0_2_004F1347
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00441348 0_2_00441348
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050535C 0_2_0050535C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0045035C 0_2_0045035C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0045B35B 0_2_0045B35B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00489369 0_2_00489369
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004A536C 0_2_004A536C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047A37E 0_2_0047A37E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00455307 0_2_00455307
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0046930F 0_2_0046930F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049F31B 0_2_0049F31B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B131D 0_2_004B131D
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004BD326 0_2_004BD326
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004DA33D 0_2_004DA33D
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00453333 0_2_00453333
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049333F 0_2_0049333F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004623CF 0_2_004623CF
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004BF3C4 0_2_004BF3C4
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004FC3DD 0_2_004FC3DD
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0046F3D5 0_2_0046F3D5
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C33D8 0_2_004C33D8
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_005003C4 0_2_005003C4
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049A3D3 0_2_0049A3D3
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_005073CD 0_2_005073CD
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_005173F6 0_2_005173F6
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0045A3EB 0_2_0045A3EB
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004FE3FE 0_2_004FE3FE
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004863FD 0_2_004863FD
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004DC3F8 0_2_004DC3F8
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004763F1 0_2_004763F1
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004513FD 0_2_004513FD
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0044B3F9 0_2_0044B3F9
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0048838B 0_2_0048838B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00452382 0_2_00452382
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047538D 0_2_0047538D
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049E383 0_2_0049E383
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D1381 0_2_004D1381
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E439C 0_2_004E439C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C239B 0_2_004C239B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00496394 0_2_00496394
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004AC397 0_2_004AC397
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004DB3AE 0_2_004DB3AE
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043F3AF 0_2_0043F3AF
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E33BE 0_2_004E33BE
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00466446 0_2_00466446
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004FD44E 0_2_004FD44E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049944F 0_2_0049944F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050B457 0_2_0050B457
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00456456 0_2_00456456
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B0453 0_2_004B0453
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004A7454 0_2_004A7454
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00445461 0_2_00445461
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047746A 0_2_0047746A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E847E 0_2_004E847E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F847A 0_2_004F847A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0045F47A 0_2_0045F47A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049C40F 0_2_0049C40F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00458409 0_2_00458409
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B6405 0_2_004B6405
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049B406 0_2_0049B406
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050D405 0_2_0050D405
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047D410 0_2_0047D410
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E0419 0_2_004E0419
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00514408 0_2_00514408
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050440B 0_2_0050440B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004BB42F 0_2_004BB42F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0046042E 0_2_0046042E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00430435 0_2_00430435
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D843B 0_2_004D843B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00481437 0_2_00481437
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004294CB 0_2_004294CB
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F74C6 0_2_004F74C6
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004EE4DF 0_2_004EE4DF
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004DA4D8 0_2_004DA4D8
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004884D0 0_2_004884D0
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F14D7 0_2_004F14D7
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004A34D6 0_2_004A34D6
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0045E4EC 0_2_0045E4EC
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C84E5 0_2_004C84E5
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049448A 0_2_0049448A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004CA486 0_2_004CA486
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F6485 0_2_004F6485
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0062B4AD 0_2_0062B4AD
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047149C 0_2_0047149C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0046349B 0_2_0046349B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00498496 0_2_00498496
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B34AA 0_2_004B34AA
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0044F4A6 0_2_0044F4A6
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E14A6 0_2_004E14A6
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D54A4 0_2_004D54A4
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E24A4 0_2_004E24A4
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B84A6 0_2_004B84A6
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004434AA 0_2_004434AA
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047B4BE 0_2_0047B4BE
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004AE4B6 0_2_004AE4B6
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B24B7 0_2_004B24B7
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004494BB 0_2_004494BB
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00513558 0_2_00513558
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B5541 0_2_004B5541
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00442555 0_2_00442555
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004EB552 0_2_004EB552
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004AD554 0_2_004AD554
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B457A 0_2_004B457A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0051756C 0_2_0051756C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004EC570 0_2_004EC570
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00467501 0_2_00467501
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00502500 0_2_00502500
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004A4518 0_2_004A4518
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00510502 0_2_00510502
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B951E 0_2_004B951E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F5517 0_2_004F5517
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0046B51F 0_2_0046B51F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050150A 0_2_0050150A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047E51B 0_2_0047E51B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0048F516 0_2_0048F516
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004BC539 0_2_004BC539
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043C536 0_2_0043C536
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0042F538 0_2_0042F538
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047F53B 0_2_0047F53B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00479539 0_2_00479539
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004705C6 0_2_004705C6
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004855C2 0_2_004855C2
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004375D5 0_2_004375D5
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_005735F7 0_2_005735F7
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0042E5E2 0_2_0042E5E2
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050B5F2 0_2_0050B5F2
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0056C5FB 0_2_0056C5FB
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0042C5F3 0_2_0042C5F3
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0044A5F5 0_2_0044A5F5
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004335F1 0_2_004335F1
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_005125E2 0_2_005125E2
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004835FD 0_2_004835FD
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0057B5EB 0_2_0057B5EB
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C05F0 0_2_004C05F0
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004685F8 0_2_004685F8
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00472585 0_2_00472585
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F258C 0_2_004F258C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0048D58E 0_2_0048D58E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0046559C 0_2_0046559C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00499597 0_2_00499597
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004AF5A0 0_2_004AF5A0
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004875A5 0_2_004875A5
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F95A1 0_2_004F95A1
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004DB5A2 0_2_004DB5A2
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004645B5 0_2_004645B5
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004925BD 0_2_004925BD
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043D5BA 0_2_0043D5BA
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047A644 0_2_0047A644
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0046264B 0_2_0046264B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D4657 0_2_004D4657
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004AB654 0_2_004AB654
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00436666 0_2_00436666
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C3664 0_2_004C3664
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0046C66B 0_2_0046C66B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00455675 0_2_00455675
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050C667 0_2_0050C667
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00490677 0_2_00490677
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0045967A 0_2_0045967A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004CE60C 0_2_004CE60C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004DE60B 0_2_004DE60B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004FC605 0_2_004FC605
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004A261B 0_2_004A261B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004CC61A 0_2_004CC61A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00401622 0_2_00401622
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0044462D 0_2_0044462D
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C5626 0_2_004C5626
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D363F 0_2_004D363F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0045D632 0_2_0045D632
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0044D63C 0_2_0044D63C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0048B631 0_2_0048B631
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C4633 0_2_004C4633
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004FA630 0_2_004FA630
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004A16CD 0_2_004A16CD
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004BA6C1 0_2_004BA6C1
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0046D6D6 0_2_0046D6D6
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004766DE 0_2_004766DE
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004EF6D5 0_2_004EF6D5
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004BD6D4 0_2_004BD6D4
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C96E7 0_2_004C96E7
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_005156E0 0_2_005156E0
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0042D683 0_2_0042D683
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00457684 0_2_00457684
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004ED695 0_2_004ED695
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004746A7 0_2_004746A7
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_005116A3 0_2_005116A3
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C16BA 0_2_004C16BA
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0042A746 0_2_0042A746
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004DF745 0_2_004DF745
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00493743 0_2_00493743
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049A759 0_2_0049A759
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0044C76D 0_2_0044C76D
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E8765 0_2_004E8765
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00450768 0_2_00450768
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0044E770 0_2_0044E770
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F3777 0_2_004F3777
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0046F77C 0_2_0046F77C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0046E77A 0_2_0046E77A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0045A778 0_2_0045A778
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D070E 0_2_004D070E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D770E 0_2_004D770E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00448703 0_2_00448703
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D271A 0_2_004D271A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004BE72A 0_2_004BE72A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0048E72C 0_2_0048E72C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0048C72D 0_2_0048C72D
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0045B723 0_2_0045B723
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004EA73F 0_2_004EA73F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00441731 0_2_00441731
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004AC731 0_2_004AC731
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0048F734 0_2_0048F734
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E77CE 0_2_004E77CE
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D87C7 0_2_004D87C7
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D57C1 0_2_004D57C1
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047B7D9 0_2_0047B7D9
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D17ED 0_2_004D17ED
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C27E5 0_2_004C27E5
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004527F4 0_2_004527F4
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C77F8 0_2_004C77F8
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004BC7FD 0_2_004BC7FD
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004757FA 0_2_004757FA
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004BF7F6 0_2_004BF7F6
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B47F5 0_2_004B47F5
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050E792 0_2_0050E792
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B678F 0_2_004B678F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0048A78D 0_2_0048A78D
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049C780 0_2_0049C780
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00451788 0_2_00451788
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004DD79C 0_2_004DD79C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049F79C 0_2_0049F79C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00434795 0_2_00434795
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0046979C 0_2_0046979C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050078C 0_2_0050078C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050778D 0_2_0050778D
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004667A7 0_2_004667A7
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050A7B2 0_2_0050A7B2
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004FD7A2 0_2_004FD7A2
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B17B6 0_2_004B17B6
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C984C 0_2_004C984C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043184A 0_2_0043184A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047184A 0_2_0047184A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00449854 0_2_00449854
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F8856 0_2_004F8856
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E0854 0_2_004E0854
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004BD854 0_2_004BD854
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043C86F 0_2_0043C86F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049987C 0_2_0049987C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049487F 0_2_0049487F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004A6870 0_2_004A6870
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F780E 0_2_004F780E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00430801 0_2_00430801
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B8802 0_2_004B8802
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050681C 0_2_0050681C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0044080A 0_2_0044080A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C6819 0_2_004C6819
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004DC813 0_2_004DC813
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E3828 0_2_004E3828
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004FC828 0_2_004FC828
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004DB825 0_2_004DB825
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050D83B 0_2_0050D83B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00503823 0_2_00503823
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E5839 0_2_004E5839
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004FE838 0_2_004FE838
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0044583C 0_2_0044583C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004628C3 0_2_004628C3
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004CB8C5 0_2_004CB8C5
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049E8DD 0_2_0049E8DD
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004818E8 0_2_004818E8
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0048B8ED 0_2_0048B8ED
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004AA8EF 0_2_004AA8EF
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004438E2 0_2_004438E2
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047C8EC 0_2_0047C8EC
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004898E7 0_2_004898E7
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D68E2 0_2_004D68E2
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_005088FF 0_2_005088FF
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0044A8F3 0_2_0044A8F3
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004658FF 0_2_004658FF
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004A8881 0_2_004A8881
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0051689C 0_2_0051689C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B2884 0_2_004B2884
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0044B895 0_2_0044B895
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_005F288B 0_2_005F288B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047F892 0_2_0047F892
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F4896 0_2_004F4896
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00488892 0_2_00488892
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043A89E 0_2_0043A89E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B08AD 0_2_004B08AD
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004EE8A8 0_2_004EE8A8
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004588A8 0_2_004588A8
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B8948 0_2_004B8948
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049694D 0_2_0049694D
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00433944 0_2_00433944
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0051495B 0_2_0051495B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0045E948 0_2_0045E948
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043D94C 0_2_0043D94C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00474957 0_2_00474957
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004EB95D 0_2_004EB95D
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043296A 0_2_0043296A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043E96E 0_2_0043E96E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00487967 0_2_00487967
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00502961 0_2_00502961
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0045F97C 0_2_0045F97C
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043690B 0_2_0043690B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0046190A 0_2_0046190A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049791B 0_2_0049791B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0046F913 0_2_0046F913
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004DD916 0_2_004DD916
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0045D919 0_2_0045D919
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047E919 0_2_0047E919
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E7929 0_2_004E7929
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0048F920 0_2_0048F920
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004CA932 0_2_004CA932
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0049D9CC 0_2_0049D9CC
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004AF9CC 0_2_004AF9CC
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004689CE 0_2_004689CE
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004799C8 0_2_004799C8
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004679DB 0_2_004679DB
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004859E8 0_2_004859E8
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0044D9ED 0_2_0044D9ED
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004569EE 0_2_004569EE
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004779E8 0_2_004779E8
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004809F0 0_2_004809F0
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047D9FA 0_2_0047D9FA
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004B998A 0_2_004B998A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0047098F 0_2_0047098F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00446990 0_2_00446990
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F999B 0_2_004F999B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050F985 0_2_0050F985
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004DE995 0_2_004DE995
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004EA995 0_2_004EA995
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004DA991 0_2_004DA991
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004429A6 0_2_004429A6
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004C39A8 0_2_004C39A8
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0050B9B4 0_2_0050B9B4
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D49AB 0_2_004D49AB
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004CC9A1 0_2_004CC9A1
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_005109AA 0_2_005109AA
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_005019AD 0_2_005019AD
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D2A4D 0_2_004D2A4D
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0045AA46 0_2_0045AA46
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00444A4D 0_2_00444A4D
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004BEA40 0_2_004BEA40
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004EDA6E 0_2_004EDA6E
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E6A7B 0_2_004E6A7B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00492A73 0_2_00492A73
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D8A71 0_2_004D8A71
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00495A74 0_2_00495A74
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00491A09 0_2_00491A09
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0042FA0B 0_2_0042FA0B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004E1A04 0_2_004E1A04
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0044FA0A 0_2_0044FA0A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004AEA1B 0_2_004AEA1B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00463A20 0_2_00463A20
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00409A27 0_2_00409A27
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00439A31 0_2_00439A31
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004F6A38 0_2_004F6A38
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004CFA35 0_2_004CFA35
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004D0AC8 0_2_004D0AC8
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00487AC2 0_2_00487AC2
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00490AC3 0_2_00490AC3
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00498AC6 0_2_00498AC6
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0045BAD4 0_2_0045BAD4
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0044CAD6 0_2_0044CAD6
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0043CAD5 0_2_0043CAD5
Source: Joe Sandbox View Dropped File: C:\Users\user\AppData\Local\Temp\E_N60005\eAPI.fne 53483523C316AD8C022C2B07A5CABFFF3339BC5CB5E4AC24C3260EEA4F4D9731
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: String function: 100C330C appears 40 times
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: String function: 10093CF0 appears 37 times
Source: MysticThumbs4.2.0 Patch.exe, 00000000.00000003.1322941486.0000000004B06000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename vs MysticThumbs4.2.0 Patch.exe
Source: MysticThumbs4.2.0 Patch.exe, 00000000.00000003.1322941486.0000000004B06000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \StringFileInfo\%s\OriginalFilename vs MysticThumbs4.2.0 Patch.exe
Source: MysticThumbs4.2.0 Patch.exe, 00000000.00000003.1322941486.0000000004B06000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: *.*index.datdesktop.ini..\*.*-%luS-1-%luSet cdaudio door closed waitSet cdaudio door open waitGlobalMemoryStatusExKernel32.dll %1%s\shell\%s\command.%s%s\shell\%s%c:%C:%s\%s.lnkSoftware\Microsoft\Windows\CurrentVersion\Run\HistoryLastTermTypeLastServiceLastMachineTermType%dService%dSoftware\Microsoft\TelnetMachine%dSoftware\Microsoft\Windows\CurrentVersion\Explorer\RecentDocsSoftware\Microsoft\Windows\CurrentVersion\Explorer\RunMRUSoftware\Microsoft\RAS Autodial\AddressesSoftware\Microsoft\Internet Explorer\IntelliForms\e161255a-37c3-11d2-bcaa-00c04fd929db\Data\Data\e161255a-37c3-11d2-bcaa-00c04fd929dbSoftware\Microsoft\Protected Storage System Provider\Software\Microsoft\Internet Explorer\TypedURLsntdllNtQuerySystemInformationPerfStats\StopStatPerfStats\StatDataKERNEL\CPUUsagePerfStats\StartStat%s\%sbmpicldllexeicoUntitledSOFTWARE\Microsoft\Internet Explorerx86 Family %s Model %s Stepping %s%08X-%08X-%08X-%08X\StringFileInfo\%s\Comments\StringFileInfo\%s\ProductVersion\StringFileInfo\%s\ProductName\StringFileInfo\%s\OriginalFilename\StringFileInfo\%s\LegalTrademarks\StringFileInfo\%s\LegalCopyright\StringFileInfo\%s\InternalName\StringFileInfo\%s\FileDescription\StringFileInfo\%s\CompanyName\StringFileInfo\%s\FileVersion040904E4000%x, \VarFileInfo\TranslationZwUnmapViewOfSectionZwMapViewOfSectionZwOpenSectionntdll.dll\device\physicalmemory\%s%s\%s\%s.lnkExecHotIconIconButtonTextDefault VisibleYesCLSID{1FBA04EE-3024-11D2-8F1F-0000F87ABD16}Software\Microsoft\Internet Explorer\Extensions\{%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}Software\Microsoft\Internet Explorer\Extensions\%sSoftware\Microsoft\Internet Explorer\ExtensionsExt + Alt + Shift + Ctrl + %s,%d%s.lnk.lnkwindowsdevice,,,GetDefaultPrinterAwinspool.drvSetDefaultPrinterATileWallpaperWallpaperStyleWallpaperControl Panel\DesktopShell_TrayWndProgmanRundll32 netplwiz.dll,UsersRunDllrundll32.exe shell32.dll,Control_RunDLL Inetcpl.cpl,,rundll32.exe shell32.dll,Control_RunDLL intl.cpl,,rundll32.exe shell32.dll,Control_RunDLL powercfg.cplrundll32.exe shell32.dll,Control_RunDLL odbccp32.cplrundll32.exe shell32.dll,Control_RunDLL mmsys.cpl,,rundll32.exe shell32.dll,Control_RunDLL main.cpl @1,rundll32.exe shell32.dll,Control_RunDLL main.cpl @0,rundll32.exe shell32.dll,Control_RunDLL joy.cpl,,rundll32.exe shell32.dll,SHHelpShortcuts_RunDLL FontsFolderrundll32.exe shell32.dll,Control_RunDLL timedate.cpl,,rundll32.exe shell32.dll,Control_RunDLL appwiz.cpl,,rundll32.exe shell32.dll,SHHelpShortcuts_RunDLL AddPrinterrundll32.exe shell32.dll,Control_RunDLL access.cpl,,rundll32.exe shell32.dll,Control_RunDLL desk.cpl,,%s%drundll32.exe shell32.dll,Control_RunDLL sysdm.cpl,,rundll32.exe shell32.dll,Control_RunDLLSetLayeredWindowAttributesUSER32.DLLDISPLAYMicrosoft Internet ExplorerMSInfo32.exeMSInfoSoftware\Microsoft\Shared Tools LocationPathSoftware\Microsoft\Shared Tools\MSInfoIsHungThreadIsHungAppWindowUser32 vs MysticThumbs4.2.0 Patch.exe
Source: MysticThumbs4.2.0 Patch.exe, 00000000.00000003.1322941486.0000000004B06000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename vs MysticThumbs4.2.0 Patch.exe
Source: MysticThumbs4.2.0 Patch.exe, 00000000.00000002.3767538355.000000001012A000.00000002.00000001.01000000.00000005.sdmp Binary or memory string: OriginalFilename vs MysticThumbs4.2.0 Patch.exe
Source: MysticThumbs4.2.0 Patch.exe, 00000000.00000003.1322941486.00000000049AB000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: OriginalFilename vs MysticThumbs4.2.0 Patch.exe
Source: MysticThumbs4.2.0 Patch.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: MysticThumbs4.2.0 Patch.exe Static PE information: Section: awewbyhg ZLIB complexity 0.9923244254298942
Source: eAPI.fne.0.dr Binary string: *.*index.datdesktop.ini..\*.*-%luS-1-%luSet cdaudio door closed waitSet cdaudio door open waitGlobalMemoryStatusExKernel32.dll %1%s\shell\%s\command.%s%s\shell\%s%c:%C:%s\%s.lnkSoftware\Microsoft\Windows\CurrentVersion\Run\HistoryLastTermTypeLastServiceLastMachineTermType%dService%dSoftware\Microsoft\TelnetMachine%dSoftware\Microsoft\Windows\CurrentVersion\Explorer\RecentDocsSoftware\Microsoft\Windows\CurrentVersion\Explorer\RunMRUSoftware\Microsoft\RAS Autodial\AddressesSoftware\Microsoft\Internet Explorer\IntelliForms\e161255a-37c3-11d2-bcaa-00c04fd929db\Data\Data\e161255a-37c3-11d2-bcaa-00c04fd929dbSoftware\Microsoft\Protected Storage System Provider\Software\Microsoft\Internet Explorer\TypedURLsntdllNtQuerySystemInformationPerfStats\StopStatPerfStats\StatDataKERNEL\CPUUsagePerfStats\StartStat%s\%sbmpicldllexeicoUntitledSOFTWARE\Microsoft\Internet Explorerx86 Family %s Model %s Stepping %s%08X-%08X-%08X-%08X\StringFileInfo\%s\Comments\StringFileInfo\%s\ProductVersion\StringFileInfo\%s\ProductName\StringFileInfo\%s\OriginalFilename\StringFileInfo\%s\LegalTrademarks\StringFileInfo\%s\LegalCopyright\StringFileInfo\%s\InternalName\StringFileInfo\%s\FileDescription\StringFileInfo\%s\CompanyName\StringFileInfo\%s\FileVersion040904E4000%x, \VarFileInfo\TranslationZwUnmapViewOfSectionZwMapViewOfSectionZwOpenSectionntdll.dll\device\physicalmemory\%s%s\%s\%s.lnkExecHotIconIconButtonTextDefault VisibleYesCLSID{1FBA04EE-3024-11D2-8F1F-0000F87ABD16}Software\Microsoft\Internet Explorer\Extensions\{%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}Software\Microsoft\Internet Explorer\Extensions\%sSoftware\Microsoft\Internet Explorer\ExtensionsExt + Alt + Shift + Ctrl + %s,%d%s.lnk.lnkwindowsdevice,,,GetDefaultPrinterAwinspool.drvSetDefaultPrinterATileWallpaperWallpaperStyleWallpaperControl Panel\DesktopShell_TrayWndProgmanRundll32 netplwiz.dll,UsersRunDllrundll32.exe shell32.dll,Control_RunDLL Inetcpl.cpl,,rundll32.exe shell32.dll,Control_RunDLL intl.cpl,,rundll32.exe shell32.dll,Control_RunDLL powercfg.cplrundll32.exe shell32.dll,Control_RunDLL odbccp32.cplrundll32.exe shell32.dll,Control_RunDLL mmsys.cpl,,rundll32.exe shell32.dll,Control_RunDLL main.cpl @1,rundll32.exe shell32.dll,Control_RunDLL main.cpl @0,rundll32.exe shell32.dll,Control_RunDLL joy.cpl,,rundll32.exe shell32.dll,SHHelpShortcuts_RunDLL FontsFolderrundll32.exe shell32.dll,Control_RunDLL timedate.cpl,,rundll32.exe shell32.dll,Control_RunDLL appwiz.cpl,,rundll32.exe shell32.dll,SHHelpShortcuts_RunDLL AddPrinterrundll32.exe shell32.dll,Control_RunDLL access.cpl,,rundll32.exe shell32.dll,Control_RunDLL desk.cpl,,%s%drundll32.exe shell32.dll,Control_RunDLL sysdm.cpl,,rundll32.exe shell32.dll,Control_RunDLLSetLayeredWindowAttributesUSER32.DLLDISPLAYMicrosoft Internet ExplorerMSInfo32.exeMSInfoSoftware\Microsoft\Shared Tools LocationPathSoftware\Microsoft\Shared Tools\MSInfoIsHungThreadIsHungAppWindowUser32
Source: classification engine Classification label: mal100.evad.winEXE@1/3@0/0
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_10065140 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,MulDiv, 0_2_10065140
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe File created: C:\Users\user~1\AppData\Local\Temp\E_N60005 Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: MysticThumbs4.2.0 Patch.exe ReversingLabs: Detection: 73%
Source: MysticThumbs4.2.0 Patch.exe String found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe File read: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: acgenral.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: samcli.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: msacm32.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: dwmapi.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: winmmbase.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: winmmbase.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: aclayers.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: sfc_os.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: olepro32.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Section loaded: textshaping.dll Jump to behavior
Source: MysticThumbs4.2.0 Patch.exe Static file information: File size 2422974 > 1048576
Source: MysticThumbs4.2.0 Patch.exe Static PE information: Raw size of awewbyhg is bigger than: 0x100000 < 0x17a000

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Unpacked PE file: 0.2.MysticThumbs4.2.0 Patch.exe.400000.0.unpack :EW;.rsrc:W;.idata :W; :EW;awewbyhg:EW;ulosnzww:EW; vs :ER;.rsrc:W;dU9:W; :EW;awewbyhg:EW;ulosnzww:EW;
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_100D5263 GetModuleHandleA,LoadLibraryA,GetProcAddress,#17,#17,FreeLibrary, 0_2_100D5263
Source: initial sample Static PE information: section where entry point is pointing to: ulosnzww
Source: MysticThumbs4.2.0 Patch.exe Static PE information: section name:
Source: MysticThumbs4.2.0 Patch.exe Static PE information: section name: .idata
Source: MysticThumbs4.2.0 Patch.exe Static PE information: section name:
Source: MysticThumbs4.2.0 Patch.exe Static PE information: section name: awewbyhg
Source: MysticThumbs4.2.0 Patch.exe Static PE information: section name: ulosnzww
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00422041 push ebp; mov dword ptr [esp], edx 0_2_004220B9
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00618065 push eax; mov dword ptr [esp], ebp 0_2_0061808A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00618065 push edi; mov dword ptr [esp], 7C99C576h 0_2_006180B1
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0042704D push ebp; mov dword ptr [esp], 401234F2h 0_2_00427057
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_005D9019 push ebp; mov dword ptr [esp], edi 0_2_005D95DE
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00420005 push edi; mov dword ptr [esp], esi 0_2_0042001A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0042200D push ebp; mov dword ptr [esp], edx 0_2_004220B9
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00424017 push ebp; mov dword ptr [esp], edx 0_2_00424F4B
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00424017 push ecx; mov dword ptr [esp], eax 0_2_00425A17
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0042601A push ecx; mov dword ptr [esp], ebp 0_2_0042602A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0042502C push 5BA53402h; mov dword ptr [esp], ebx 0_2_00428C3F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004250CD push ebp; mov dword ptr [esp], ebx 0_2_00428F65
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_004260DD push ebx; mov dword ptr [esp], edi 0_2_004260DE
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00424084 push eax; mov dword ptr [esp], 3C841B83h 0_2_00425662
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00421088 push edi; mov dword ptr [esp], 50BF9100h 0_2_004210CD
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_006110B2 push ebp; mov dword ptr [esp], ecx 0_2_006110D9
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_006110B2 push 08BF8858h; mov dword ptr [esp], eax 0_2_0061110A
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00424097 push 0474F7D2h; mov dword ptr [esp], eax 0_2_004245D3
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00424097 push ebx; mov dword ptr [esp], 61DA1009h 0_2_00424ED3
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00424097 push esi; mov dword ptr [esp], 3A726B48h 0_2_00425DFB
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00424097 push edx; mov dword ptr [esp], ecx 0_2_00428A8F
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00424097 push 30AC2B00h; mov dword ptr [esp], eax 0_2_00428B43
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0056E0B0 push edx; mov dword ptr [esp], ebx 0_2_0056E0DF
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0056E0B0 push ebx; mov dword ptr [esp], edx 0_2_0056E1A6
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0056E0B0 push edi; mov dword ptr [esp], ebx 0_2_0056E2A1
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0056E0B0 push edi; mov dword ptr [esp], ecx 0_2_0056E2FC
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0056E0B0 push ecx; mov dword ptr [esp], esi 0_2_0056E322
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0056E0B0 push 646327D4h; mov dword ptr [esp], ebp 0_2_0056E351
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0056E0B0 push ecx; mov dword ptr [esp], 5047BBC0h 0_2_0056E3DA
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0056E0B0 push 0D27D3FBh; mov dword ptr [esp], esi 0_2_0056E469
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_0056E0B0 push edi; mov dword ptr [esp], eax 0_2_0056E4CF
Source: MysticThumbs4.2.0 Patch.exe Static PE information: section name: entropy: 7.769714016837807
Source: MysticThumbs4.2.0 Patch.exe Static PE information: section name: awewbyhg entropy: 7.951787681950419
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe File created: C:\Users\user\AppData\Local\Temp\E_N60005\krnln.fnr Jump to dropped file
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe File created: C:\Users\user\AppData\Local\Temp\E_N60005\dp1.fne Jump to dropped file
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe File created: C:\Users\user\AppData\Local\Temp\E_N60005\eAPI.fne Jump to dropped file
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe File created: C:\Users\user\AppData\Local\Temp\E_N60005\krnln.fnr Jump to dropped file
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe File created: C:\Users\user\AppData\Local\Temp\E_N60005\dp1.fne Jump to dropped file
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe File created: C:\Users\user\AppData\Local\Temp\E_N60005\eAPI.fne Jump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Window searched: window name: Regmonclass Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Window searched: window name: Filemonclass Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Window searched: window name: Regmonclass Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_10059E80 IsWindow,IsIconic,SetActiveWindow,IsWindow,IsWindow,DestroyAcceleratorTable,DestroyMenu,DestroyAcceleratorTable,DestroyMenu,DestroyAcceleratorTable,DestroyMenu,SetParent,SetWindowPos,IsWindow,SendMessageA,SendMessageA,DestroyAcceleratorTable,IsWindow,IsWindow,IsWindow,IsWindow,IsWindow,GetParent,GetFocus,IsWindow,SendMessageA,IsWindow,GetFocus,SetFocus, 0_2_10059E80
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_100B9F40 DestroyCursor,IsWindowVisible,IsIconic,IsZoomed,GetWindowRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMenu,DeleteMenu,GetSystemMenu, 0_2_100B9F40
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 58421E second address: 584222 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 584222 second address: 58424C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007F54D04F50FEh 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F54D04F5102h 0x00000013 push eax 0x00000014 pop eax 0x00000015 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 58424C second address: 584250 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 583102 second address: 58311B instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F54D04F50FBh 0x00000008 jne 00007F54D04F50F6h 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 58311B second address: 58311F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5832AF second address: 5832B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5832B5 second address: 5832BF instructions: 0x00000000 rdtsc 0x00000002 ja 00007F54D0D8D9B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5832BF second address: 5832C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5832C5 second address: 5832D1 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5832D1 second address: 5832D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5835DD second address: 5835F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 je 00007F54D0D8D9B8h 0x0000000b push edi 0x0000000c pop edi 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 push eax 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5835F2 second address: 583605 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F54D04F50FEh 0x0000000a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 583605 second address: 583615 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007F54D0D8D9B6h 0x0000000a jne 00007F54D0D8D9B6h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 583615 second address: 583619 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 583AAF second address: 583AC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F54D0D8D9BCh 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 583AC2 second address: 583ACB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 583ACB second address: 583AE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F54D0D8D9C3h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 585450 second address: 585458 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 585458 second address: 58548C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 pushad 0x0000000a popad 0x0000000b pop eax 0x0000000c jmp 00007F54D0D8D9C5h 0x00000011 popad 0x00000012 mov eax, dword ptr [esp+04h] 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F54D0D8D9BCh 0x0000001d rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 58548C second address: 5854A6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F50FAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c push edx 0x0000000d jnc 00007F54D04F50F8h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5854A6 second address: 5854AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5854AC second address: 5854B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 585861 second address: 585865 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 585865 second address: 5858E4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 xor dword ptr [esp], 70445C00h 0x0000000e push 00000000h 0x00000010 push ecx 0x00000011 call 00007F54D04F50F8h 0x00000016 pop ecx 0x00000017 mov dword ptr [esp+04h], ecx 0x0000001b add dword ptr [esp+04h], 0000001Bh 0x00000023 inc ecx 0x00000024 push ecx 0x00000025 ret 0x00000026 pop ecx 0x00000027 ret 0x00000028 lea ebx, dword ptr [ebp+0CA473C3h] 0x0000002e push 00000000h 0x00000030 push ecx 0x00000031 call 00007F54D04F50F8h 0x00000036 pop ecx 0x00000037 mov dword ptr [esp+04h], ecx 0x0000003b add dword ptr [esp+04h], 0000001Dh 0x00000043 inc ecx 0x00000044 push ecx 0x00000045 ret 0x00000046 pop ecx 0x00000047 ret 0x00000048 jmp 00007F54D04F50FDh 0x0000004d xchg eax, ebx 0x0000004e jmp 00007F54D04F50FAh 0x00000053 push eax 0x00000054 push eax 0x00000055 push edx 0x00000056 jng 00007F54D04F50F8h 0x0000005c push ebx 0x0000005d pop ebx 0x0000005e rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 56DB99 second address: 56DBAA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F54D0D8D9BDh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 56DBAA second address: 56DC20 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5106h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F54D04F5106h 0x0000000e popad 0x0000000f pushad 0x00000010 jp 00007F54D04F50FCh 0x00000016 jns 00007F54D04F50F6h 0x0000001c push edi 0x0000001d jmp 00007F54D04F50FEh 0x00000022 pop edi 0x00000023 jbe 00007F54D04F5111h 0x00000029 jng 00007F54D04F50F6h 0x0000002f jmp 00007F54D04F5105h 0x00000034 pushad 0x00000035 push ecx 0x00000036 pop ecx 0x00000037 pushad 0x00000038 popad 0x00000039 push eax 0x0000003a push edx 0x0000003b rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A2A73 second address: 5A2A77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A2A77 second address: 5A2A8B instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F54D04F50F6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jnc 00007F54D04F50F6h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A2A8B second address: 5A2AAC instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007F54D0D8D9C5h 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A2AAC second address: 5A2AB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A2BEA second address: 5A2BF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A2BF0 second address: 5A2C02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 jmp 00007F54D04F50FAh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A2C02 second address: 5A2C09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A2E98 second address: 5A2EE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F54D04F5108h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c jmp 00007F54D04F5102h 0x00000011 pop ecx 0x00000012 push edi 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 jmp 00007F54D04F5104h 0x0000001c rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A2EE3 second address: 5A2EE9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A305E second address: 5A306E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a js 00007F54D04F50F6h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A306E second address: 5A307E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jl 00007F54D0D8D9B6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A307E second address: 5A3084 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A3084 second address: 5A3088 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A3088 second address: 5A3092 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A31AD second address: 5A31C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 jns 00007F54D0D8D9B6h 0x0000000c jc 00007F54D0D8D9B6h 0x00000012 pop eax 0x00000013 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A31C0 second address: 5A31E0 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F54D04F50FEh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jmp 00007F54D04F50FAh 0x00000010 push ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A3313 second address: 5A3319 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A3319 second address: 5A332F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F54D04F50FEh 0x0000000a push edi 0x0000000b pop edi 0x0000000c jns 00007F54D04F50F6h 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A332F second address: 5A3340 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F54D0D8D9BDh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A3619 second address: 5A361D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 574689 second address: 5746A2 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007F54D0D8D9C4h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A4362 second address: 5A436B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A436B second address: 5A436F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A436F second address: 5A4387 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F54D04F5102h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A4387 second address: 5A438C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A4B38 second address: 5A4B3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A4B3E second address: 5A4B4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5A4B4A second address: 5A4B4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 57613B second address: 576169 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F54D0D8D9B8h 0x00000008 jno 00007F54D0D8D9CCh 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 576169 second address: 576171 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5AA2D8 second address: 5AA2E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5AB3C4 second address: 5AB3C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5AB3C8 second address: 5AB3CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B04D2 second address: 5B04D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B04D9 second address: 5B04DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B0747 second address: 5B074B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B074B second address: 5B0753 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B2ACF second address: 5B2ADD instructions: 0x00000000 rdtsc 0x00000002 jns 00007F54D04F50F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B2ADD second address: 5B2AE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B2AE1 second address: 5B2AE5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B2D10 second address: 5B2D44 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007F54D0D8D9C0h 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edi 0x0000000d pushad 0x0000000e jmp 00007F54D0D8D9C9h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B330D second address: 5B3311 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B3311 second address: 5B334B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F54D0D8D9C3h 0x0000000b popad 0x0000000c mov dword ptr [esp], ebx 0x0000000f mov si, 18BBh 0x00000013 nop 0x00000014 jnc 00007F54D0D8D9C2h 0x0000001a push eax 0x0000001b push eax 0x0000001c push edx 0x0000001d push esi 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B334B second address: 5B3350 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B33FB second address: 5B3400 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B3DCD second address: 5B3E6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 jmp 00007F54D04F50FEh 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push eax 0x00000010 call 00007F54D04F50F8h 0x00000015 pop eax 0x00000016 mov dword ptr [esp+04h], eax 0x0000001a add dword ptr [esp+04h], 0000001Dh 0x00000022 inc eax 0x00000023 push eax 0x00000024 ret 0x00000025 pop eax 0x00000026 ret 0x00000027 je 00007F54D04F50FBh 0x0000002d adc si, ADDDh 0x00000032 movzx edi, dx 0x00000035 push 00000000h 0x00000037 sub si, D847h 0x0000003c push 00000000h 0x0000003e push 00000000h 0x00000040 push ebp 0x00000041 call 00007F54D04F50F8h 0x00000046 pop ebp 0x00000047 mov dword ptr [esp+04h], ebp 0x0000004b add dword ptr [esp+04h], 00000016h 0x00000053 inc ebp 0x00000054 push ebp 0x00000055 ret 0x00000056 pop ebp 0x00000057 ret 0x00000058 call 00007F54D04F50FFh 0x0000005d push ebx 0x0000005e sub dword ptr [ebp+0C8E25BAh], edi 0x00000064 pop esi 0x00000065 pop edi 0x00000066 xchg eax, ebx 0x00000067 pushad 0x00000068 jmp 00007F54D04F5100h 0x0000006d push edx 0x0000006e push eax 0x0000006f push edx 0x00000070 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B3E6A second address: 5B3E77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B3E77 second address: 5B3E7D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B3E7D second address: 5B3E83 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B3E83 second address: 5B3E87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B486C second address: 5B4874 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B4874 second address: 5B489C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5108h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jl 00007F54D04F50F8h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B489C second address: 5B48A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B48A2 second address: 5B48A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B5067 second address: 5B506C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B62E6 second address: 5B636D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F54D04F50FCh 0x00000008 jmp 00007F54D04F50FDh 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov dword ptr [esp], eax 0x00000013 push 00000000h 0x00000015 push ebx 0x00000016 call 00007F54D04F50F8h 0x0000001b pop ebx 0x0000001c mov dword ptr [esp+04h], ebx 0x00000020 add dword ptr [esp+04h], 00000017h 0x00000028 inc ebx 0x00000029 push ebx 0x0000002a ret 0x0000002b pop ebx 0x0000002c ret 0x0000002d add esi, dword ptr [ebp+0C8E1BFCh] 0x00000033 push 00000000h 0x00000035 mov edi, dword ptr [ebp+0C8E272Fh] 0x0000003b push 00000000h 0x0000003d push 00000000h 0x0000003f push edx 0x00000040 call 00007F54D04F50F8h 0x00000045 pop edx 0x00000046 mov dword ptr [esp+04h], edx 0x0000004a add dword ptr [esp+04h], 00000016h 0x00000052 inc edx 0x00000053 push edx 0x00000054 ret 0x00000055 pop edx 0x00000056 ret 0x00000057 push eax 0x00000058 pushad 0x00000059 jp 00007F54D04F5103h 0x0000005f jmp 00007F54D04F50FDh 0x00000064 push eax 0x00000065 push eax 0x00000066 push edx 0x00000067 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B7850 second address: 5B78C6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9BFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a mov dword ptr [esp], eax 0x0000000d movsx esi, si 0x00000010 push 00000000h 0x00000012 cld 0x00000013 add dword ptr [ebp+0C8E1839h], edi 0x00000019 push 00000000h 0x0000001b push 00000000h 0x0000001d push ecx 0x0000001e call 00007F54D0D8D9B8h 0x00000023 pop ecx 0x00000024 mov dword ptr [esp+04h], ecx 0x00000028 add dword ptr [esp+04h], 0000001Ah 0x00000030 inc ecx 0x00000031 push ecx 0x00000032 ret 0x00000033 pop ecx 0x00000034 ret 0x00000035 jmp 00007F54D0D8D9C1h 0x0000003a jmp 00007F54D0D8D9C9h 0x0000003f push eax 0x00000040 push eax 0x00000041 push ecx 0x00000042 push eax 0x00000043 push edx 0x00000044 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B6B01 second address: 5B6B06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B6B06 second address: 5B6B2D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jo 00007F54D0D8D9C4h 0x00000010 push eax 0x00000011 push edx 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B6B2D second address: 5B6B31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B8CCC second address: 5B8D5F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jnl 00007F54D0D8D9B6h 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jmp 00007F54D0D8D9C2h 0x00000012 nop 0x00000013 mov dword ptr [ebp+0C8E29A7h], ecx 0x00000019 push 00000000h 0x0000001b push 00000000h 0x0000001d push ecx 0x0000001e call 00007F54D0D8D9B8h 0x00000023 pop ecx 0x00000024 mov dword ptr [esp+04h], ecx 0x00000028 add dword ptr [esp+04h], 00000017h 0x00000030 inc ecx 0x00000031 push ecx 0x00000032 ret 0x00000033 pop ecx 0x00000034 ret 0x00000035 add edi, dword ptr [ebp+0C8E3563h] 0x0000003b push 00000000h 0x0000003d push 00000000h 0x0000003f push esi 0x00000040 call 00007F54D0D8D9B8h 0x00000045 pop esi 0x00000046 mov dword ptr [esp+04h], esi 0x0000004a add dword ptr [esp+04h], 00000015h 0x00000052 inc esi 0x00000053 push esi 0x00000054 ret 0x00000055 pop esi 0x00000056 ret 0x00000057 mov edi, 3503438Bh 0x0000005c xchg eax, ebx 0x0000005d je 00007F54D0D8D9BEh 0x00000063 jl 00007F54D0D8D9B8h 0x00000069 pushad 0x0000006a popad 0x0000006b push eax 0x0000006c push eax 0x0000006d push edx 0x0000006e pushad 0x0000006f pushad 0x00000070 popad 0x00000071 jmp 00007F54D0D8D9BCh 0x00000076 popad 0x00000077 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B75BE second address: 5B75C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B8D5F second address: 5B8D65 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B8D65 second address: 5B8D69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B9599 second address: 5B959D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5BA921 second address: 5BA928 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B959D second address: 5B95A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5BC954 second address: 5BC959 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5BA9DD second address: 5BA9E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5BDA5C second address: 5BDA61 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5BE8FE second address: 5BE903 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5BF890 second address: 5BF94F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5109h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a nop 0x0000000b call 00007F54D04F50FFh 0x00000010 pop ebx 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push eax 0x00000016 call 00007F54D04F50F8h 0x0000001b pop eax 0x0000001c mov dword ptr [esp+04h], eax 0x00000020 add dword ptr [esp+04h], 00000017h 0x00000028 inc eax 0x00000029 push eax 0x0000002a ret 0x0000002b pop eax 0x0000002c ret 0x0000002d mov ebx, dword ptr [ebp+0C8E2520h] 0x00000033 mov dword ptr [ebp+0C8E1BB4h], eax 0x00000039 push 00000000h 0x0000003b push 00000000h 0x0000003d push edi 0x0000003e call 00007F54D04F50F8h 0x00000043 pop edi 0x00000044 mov dword ptr [esp+04h], edi 0x00000048 add dword ptr [esp+04h], 0000001Bh 0x00000050 inc edi 0x00000051 push edi 0x00000052 ret 0x00000053 pop edi 0x00000054 ret 0x00000055 sbb bx, 10C1h 0x0000005a xor ebx, dword ptr [ebp+0C8E3493h] 0x00000060 xchg eax, esi 0x00000061 jo 00007F54D04F5108h 0x00000067 jmp 00007F54D04F5102h 0x0000006c push eax 0x0000006d pushad 0x0000006e pushad 0x0000006f pushad 0x00000070 popad 0x00000071 jl 00007F54D04F50F6h 0x00000077 popad 0x00000078 push eax 0x00000079 push edx 0x0000007a jmp 00007F54D04F50FCh 0x0000007f rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5BF94F second address: 5BF953 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C086B second address: 5C08A4 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F54D04F510Ah 0x00000008 jmp 00007F54D04F5104h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 jmp 00007F54D04F5105h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5BFBB1 second address: 5BFBB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5BFBB6 second address: 5BFBC0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F54D04F50F6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C08A4 second address: 5C08A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C08A9 second address: 5C08B3 instructions: 0x00000000 rdtsc 0x00000002 je 00007F54D04F50FCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C18C6 second address: 5C18CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C18CA second address: 5C18CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C292A second address: 5C29B3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007F54D0D8D9B8h 0x0000000c popad 0x0000000d mov dword ptr [esp], eax 0x00000010 call 00007F54D0D8D9BCh 0x00000015 pop ebx 0x00000016 push 00000000h 0x00000018 push 00000000h 0x0000001a push edx 0x0000001b call 00007F54D0D8D9B8h 0x00000020 pop edx 0x00000021 mov dword ptr [esp+04h], edx 0x00000025 add dword ptr [esp+04h], 00000018h 0x0000002d inc edx 0x0000002e push edx 0x0000002f ret 0x00000030 pop edx 0x00000031 ret 0x00000032 mov dword ptr [ebp+0C8E28DAh], edx 0x00000038 mov dword ptr [ebp+0C8E2E28h], edi 0x0000003e push 00000000h 0x00000040 push 00000000h 0x00000042 push eax 0x00000043 call 00007F54D0D8D9B8h 0x00000048 pop eax 0x00000049 mov dword ptr [esp+04h], eax 0x0000004d add dword ptr [esp+04h], 0000001Dh 0x00000055 inc eax 0x00000056 push eax 0x00000057 ret 0x00000058 pop eax 0x00000059 ret 0x0000005a or ebx, 5EFE1C6Dh 0x00000060 push eax 0x00000061 jo 00007F54D0D8D9C2h 0x00000067 jl 00007F54D0D8D9BCh 0x0000006d push eax 0x0000006e push edx 0x0000006f rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C1AD9 second address: 5C1ADD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C1ADD second address: 5C1B59 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F54D0D8D9B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c sbb di, 54EFh 0x00000011 push dword ptr fs:[00000000h] 0x00000018 sub dword ptr [ebp+0C8E17A6h], esi 0x0000001e mov dword ptr fs:[00000000h], esp 0x00000025 or edi, dword ptr [ebp+0C8E368Bh] 0x0000002b mov eax, dword ptr [ebp+0C8E1291h] 0x00000031 push 00000000h 0x00000033 push esi 0x00000034 call 00007F54D0D8D9B8h 0x00000039 pop esi 0x0000003a mov dword ptr [esp+04h], esi 0x0000003e add dword ptr [esp+04h], 00000014h 0x00000046 inc esi 0x00000047 push esi 0x00000048 ret 0x00000049 pop esi 0x0000004a ret 0x0000004b sub ebx, dword ptr [ebp+0C8E36C3h] 0x00000051 push FFFFFFFFh 0x00000053 push ecx 0x00000054 mov dword ptr [ebp+0C8E20C5h], edx 0x0000005a pop edi 0x0000005b nop 0x0000005c jns 00007F54D0D8D9C4h 0x00000062 push eax 0x00000063 pushad 0x00000064 push eax 0x00000065 push edx 0x00000066 jns 00007F54D0D8D9B6h 0x0000006c rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C1B59 second address: 5C1B5D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C4B11 second address: 5C4B1A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C4B1A second address: 5C4B68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 popad 0x00000008 mov dword ptr [esp], eax 0x0000000b push 00000000h 0x0000000d push ebp 0x0000000e call 00007F54D04F50F8h 0x00000013 pop ebp 0x00000014 mov dword ptr [esp+04h], ebp 0x00000018 add dword ptr [esp+04h], 00000019h 0x00000020 inc ebp 0x00000021 push ebp 0x00000022 ret 0x00000023 pop ebp 0x00000024 ret 0x00000025 mov dword ptr [ebp+0C8E1D50h], eax 0x0000002b push 00000000h 0x0000002d sub dword ptr [ebp+0C8E29CAh], ecx 0x00000033 push 00000000h 0x00000035 jne 00007F54D04F50F8h 0x0000003b xchg eax, esi 0x0000003c pushad 0x0000003d push eax 0x0000003e push edx 0x0000003f ja 00007F54D04F50F6h 0x00000045 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C4B68 second address: 5C4B87 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F54D0D8D9C2h 0x0000000b popad 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C4B87 second address: 5C4B8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C6D63 second address: 5C6D68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C6D68 second address: 5C6D6D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C6D6D second address: 5C6D81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d jne 00007F54D0D8D9B6h 0x00000013 pop eax 0x00000014 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C3A88 second address: 5C3AA5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5109h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C3AA5 second address: 5C3AAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C4DBE second address: 5C4DC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 push esi 0x0000000a pop esi 0x0000000b rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C3AAB second address: 5C3AAF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C4DC9 second address: 5C4DFA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5103h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F54D04F5108h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C5FA5 second address: 5C5FB7 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c jnc 00007F54D0D8D9B6h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C6F82 second address: 5C6F98 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F54D04F50FEh 0x0000000d rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C7E35 second address: 5C7E43 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jo 00007F54D0D8D9B6h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C6F98 second address: 5C6F9C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5CF4FF second address: 5CF50A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop ebx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5CF50A second address: 5CF50F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5D3B57 second address: 5D3B5B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5D3B5B second address: 5D3B61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5D3CF0 second address: 5D3CFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F54D0D8D9B6h 0x0000000a push esi 0x0000000b pop esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5D3CFE second address: 5D3D03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5D81C5 second address: 5D81CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5D81CB second address: 5D81D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5D81D0 second address: 5D81D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5DA95B second address: 5DA973 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F54D04F5101h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5DAA41 second address: 5DAA45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5DAA45 second address: 5DAA64 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 je 00007F54D04F50FCh 0x0000000f pushad 0x00000010 push edi 0x00000011 pop edi 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 mov eax, dword ptr [esp+04h] 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e popad 0x0000001f rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5DAA64 second address: 5DAA6A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5DAA6A second address: 5DAA81 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F54D04F50FCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [eax] 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5DAA81 second address: 5DAA88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5DAB5A second address: 5DAB78 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F54D04F5101h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5DAB78 second address: 5DABA6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F54D0D8D9C4h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5DABA6 second address: 5DABD9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5101h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F54D04F5108h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5DEEF3 second address: 5DEEF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5DF084 second address: 5DF097 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F50FFh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5DF097 second address: 5DF09D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5DF384 second address: 5DF388 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5DF8B1 second address: 5DF8B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5DF8B5 second address: 5DF8C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jns 00007F54D04F50F6h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5DF8C3 second address: 5DF8CB instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5DF8CB second address: 5DF8F0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F50FAh 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F54D04F5107h 0x0000000e rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E347B second address: 5E3490 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jmp 00007F54D0D8D9BCh 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E35F8 second address: 5E3602 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F54D04F50F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E3602 second address: 5E3648 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F54D0D8D9BEh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b jp 00007F54D0D8D9C9h 0x00000011 push eax 0x00000012 push edx 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 jmp 00007F54D0D8D9C6h 0x0000001a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E3648 second address: 5E364C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E3AC0 second address: 5E3ADC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007F54D0D8D9C1h 0x0000000c jmp 00007F54D0D8D9BBh 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E3184 second address: 5E3189 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E4231 second address: 5E4235 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E44FA second address: 5E44FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E44FE second address: 5E4504 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E4504 second address: 5E450A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E450A second address: 5E451A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 pop edx 0x00000008 push eax 0x00000009 push edx 0x0000000a jne 00007F54D0D8D9B6h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E87C9 second address: 5E87CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E87CF second address: 5E87E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 jo 00007F54D0D8D9BCh 0x0000000d jg 00007F54D0D8D9B6h 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E87E7 second address: 5E87EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E87EF second address: 5E87F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E87F7 second address: 5E87FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E87FD second address: 5E880D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F54D0D8D9B6h 0x0000000a popad 0x0000000b popad 0x0000000c pushad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E880D second address: 5E8813 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E8813 second address: 5E8824 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jnl 00007F54D0D8D9B6h 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E764D second address: 5E7651 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E7651 second address: 5E7655 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E7655 second address: 5E7661 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b pop edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E7661 second address: 5E7665 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B110B second address: 5B1160 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jbe 00007F54D04F50F8h 0x0000000c push edi 0x0000000d pop edi 0x0000000e popad 0x0000000f mov dword ptr [esp], eax 0x00000012 add dx, EB7Fh 0x00000017 lea eax, dword ptr [ebp+0CA72E91h] 0x0000001d push 00000000h 0x0000001f push ebx 0x00000020 call 00007F54D04F50F8h 0x00000025 pop ebx 0x00000026 mov dword ptr [esp+04h], ebx 0x0000002a add dword ptr [esp+04h], 0000001Ch 0x00000032 inc ebx 0x00000033 push ebx 0x00000034 ret 0x00000035 pop ebx 0x00000036 ret 0x00000037 mov cl, 02h 0x00000039 nop 0x0000003a pushad 0x0000003b jnc 00007F54D04F50FCh 0x00000041 push eax 0x00000042 push edx 0x00000043 pushad 0x00000044 popad 0x00000045 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B1160 second address: 5B1164 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B15AE second address: 5B15B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B15B2 second address: 5B15B8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B15B8 second address: 5B15C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F54D04F50F6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B16CC second address: 5B16D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B1ADE second address: 5B1AE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B1AE2 second address: 5B1AE6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B1AE6 second address: 5B1AEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B1BAB second address: 5B1BB1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B1BB1 second address: 5B1C0F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push esi 0x0000000c call 00007F54D04F50F8h 0x00000011 pop esi 0x00000012 mov dword ptr [esp+04h], esi 0x00000016 add dword ptr [esp+04h], 00000015h 0x0000001e inc esi 0x0000001f push esi 0x00000020 ret 0x00000021 pop esi 0x00000022 ret 0x00000023 jc 00007F54D04F50F9h 0x00000029 mov cx, dx 0x0000002c push 00000004h 0x0000002e push 00000000h 0x00000030 push ebx 0x00000031 call 00007F54D04F50F8h 0x00000036 pop ebx 0x00000037 mov dword ptr [esp+04h], ebx 0x0000003b add dword ptr [esp+04h], 00000017h 0x00000043 inc ebx 0x00000044 push ebx 0x00000045 ret 0x00000046 pop ebx 0x00000047 ret 0x00000048 mov edx, 523432DEh 0x0000004d push eax 0x0000004e push eax 0x0000004f push edx 0x00000050 pushad 0x00000051 push esi 0x00000052 pop esi 0x00000053 push ecx 0x00000054 pop ecx 0x00000055 popad 0x00000056 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B1EBC second address: 5B1EC5 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B1BA7 second address: 5B1BAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B218B second address: 5B218F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B22E3 second address: 5B233B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov dword ptr [esp], eax 0x00000008 push 00000000h 0x0000000a push esi 0x0000000b call 00007F54D04F50F8h 0x00000010 pop esi 0x00000011 mov dword ptr [esp+04h], esi 0x00000015 add dword ptr [esp+04h], 0000001Bh 0x0000001d inc esi 0x0000001e push esi 0x0000001f ret 0x00000020 pop esi 0x00000021 ret 0x00000022 lea eax, dword ptr [ebp+0CA72E91h] 0x00000028 mov edx, dword ptr [ebp+0C8E2A37h] 0x0000002e nop 0x0000002f jmp 00007F54D04F5101h 0x00000034 push eax 0x00000035 push eax 0x00000036 push edx 0x00000037 jmp 00007F54D04F50FCh 0x0000003c rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B233B second address: 5B2341 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5B2341 second address: 59BDB1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5101h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push ebp 0x0000000f call 00007F54D04F50F8h 0x00000014 pop ebp 0x00000015 mov dword ptr [esp+04h], ebp 0x00000019 add dword ptr [esp+04h], 00000018h 0x00000021 inc ebp 0x00000022 push ebp 0x00000023 ret 0x00000024 pop ebp 0x00000025 ret 0x00000026 mov dh, FEh 0x00000028 call dword ptr [ebp+0C8E17EBh] 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 push edx 0x00000032 jmp 00007F54D04F50FDh 0x00000037 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 59BDB1 second address: 59BDC4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9BFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E7AAB second address: 5E7AB7 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F54D04F50FEh 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E7AB7 second address: 5E7ADF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F54D0D8D9C4h 0x0000000b jmp 00007F54D0D8D9BEh 0x00000010 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E7ADF second address: 5E7AE3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E7C5D second address: 5E7C61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E7C61 second address: 5E7C75 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F54D04F50F6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jnl 00007F54D04F50F6h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5E819F second address: 5E81A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F0940 second address: 5F0944 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F0A7E second address: 5F0A86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F0EB7 second address: 5F0EBB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F0EBB second address: 5F0EC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F0EC1 second address: 5F0ECB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F0ECB second address: 5F0ED5 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F54D0D8D9B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F1309 second address: 5F130D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F130D second address: 5F131D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jl 00007F54D0D8D9BEh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F15DA second address: 5F15DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F15DE second address: 5F161C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C8h 0x00000007 jmp 00007F54D0D8D9C8h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop esi 0x0000000f push ebx 0x00000010 jng 00007F54D0D8D9D4h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F161C second address: 5F163C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F54D04F5108h 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F163C second address: 5F1658 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F54D0D8D9C8h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F1658 second address: 5F1668 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F50FCh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F1836 second address: 5F185C instructions: 0x00000000 rdtsc 0x00000002 jp 00007F54D0D8D9B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c pop eax 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007F54D0D8D9C0h 0x00000014 popad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 push ebx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F185C second address: 5F1861 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F1EC2 second address: 5F1ECC instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F54D0D8D9B6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F1ECC second address: 5F1ED2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F1ED2 second address: 5F1ED7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F0636 second address: 5F064D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F54D04F50FBh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F064D second address: 5F0651 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F469B second address: 5F46A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F46A3 second address: 5F46C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F54D0D8D9B6h 0x0000000a pop ecx 0x0000000b push ebx 0x0000000c jmp 00007F54D0D8D9BCh 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 pop ebx 0x00000014 popad 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 jo 00007F54D0D8D9B6h 0x0000001e rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F46C8 second address: 5F46F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F50FEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F54D04F50FAh 0x0000000f pushad 0x00000010 popad 0x00000011 pushad 0x00000012 popad 0x00000013 jmp 00007F54D04F5100h 0x00000018 push edi 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5F695E second address: 5F697E instructions: 0x00000000 rdtsc 0x00000002 jp 00007F54D0D8D9B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d jmp 00007F54D0D8D9C0h 0x00000012 pushad 0x00000013 popad 0x00000014 pop edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5FB6E2 second address: 5FB705 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5109h 0x00000007 jg 00007F54D04F50FCh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5FED5E second address: 5FED62 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5FED62 second address: 5FED7C instructions: 0x00000000 rdtsc 0x00000002 jns 00007F54D04F50F6h 0x00000008 jno 00007F54D04F50F6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 jp 00007F54D04F50F6h 0x00000019 popad 0x0000001a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5FEEBA second address: 5FEEF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jns 00007F54D0D8D9CAh 0x0000000d jnl 00007F54D0D8D9C2h 0x00000013 popad 0x00000014 pushad 0x00000015 jl 00007F54D0D8D9C2h 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5FEEF7 second address: 5FEEFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5FEEFD second address: 5FEF04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5FF07C second address: 5FF080 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5FF080 second address: 5FF08D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5FF360 second address: 5FF3A2 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F54D04F50F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jne 00007F54D04F5109h 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F54D04F5109h 0x00000017 push edi 0x00000018 push ebx 0x00000019 pop ebx 0x0000001a pop edi 0x0000001b rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5FF3A2 second address: 5FF3B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F54D0D8D9C2h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5FF3B8 second address: 5FF3BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 606115 second address: 60611A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 60611A second address: 606120 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 606120 second address: 606134 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F54D0D8D9C0h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 60452C second address: 604530 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 604530 second address: 60453D instructions: 0x00000000 rdtsc 0x00000002 ja 00007F54D0D8D9B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 60453D second address: 604542 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 604C4C second address: 604C52 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 605261 second address: 60528E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007F54D04F50FCh 0x0000000a jmp 00007F54D04F5108h 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 60528E second address: 6052A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F54D0D8D9C5h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 60582F second address: 605866 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5103h 0x00000007 jmp 00007F54D04F5105h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 jng 00007F54D04F50F6h 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 605866 second address: 60586A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 60586A second address: 605870 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 6084F7 second address: 60850D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F54D0D8D9C0h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 608A72 second address: 608A76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 608A76 second address: 608A8A instructions: 0x00000000 rdtsc 0x00000002 jng 00007F54D0D8D9B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jno 00007F54D0D8D9B6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 608A8A second address: 608AA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pushad 0x0000000a jmp 00007F54D04F50FAh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 608AA0 second address: 608AA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 60C2F2 second address: 60C344 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F54D04F50FDh 0x00000008 jmp 00007F54D04F5108h 0x0000000d jmp 00007F54D04F5108h 0x00000012 popad 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 jmp 00007F54D04F50FAh 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 60C344 second address: 60C355 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 jp 00007F54D0D8D9BEh 0x0000000d push edx 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 60C355 second address: 60C359 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 60C5E8 second address: 60C61A instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F54D0D8D9B8h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 jmp 00007F54D0D8D9C6h 0x00000016 pop ebx 0x00000017 jne 00007F54D0D8D9BAh 0x0000001d rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 60C61A second address: 60C620 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 60C620 second address: 60C624 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 60CAD9 second address: 60CAE9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 pop eax 0x00000007 popad 0x00000008 je 00007F54D04F50FCh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 60CAE9 second address: 60CAFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jp 00007F54D0D8D9CEh 0x0000000c push eax 0x0000000d push edx 0x0000000e jbe 00007F54D0D8D9B6h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 60CAFD second address: 60CB01 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 618396 second address: 6183AB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9BFh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 6188D3 second address: 6188D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 6188D7 second address: 6188DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 618A31 second address: 618AA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F54D04F50F6h 0x0000000a pop ebx 0x0000000b pushad 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e jmp 00007F54D04F5103h 0x00000013 push esi 0x00000014 pop esi 0x00000015 popad 0x00000016 ja 00007F54D04F50FEh 0x0000001c push ebx 0x0000001d jmp 00007F54D04F5108h 0x00000022 pop ebx 0x00000023 popad 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007F54D04F50FCh 0x0000002b push esi 0x0000002c jmp 00007F54D04F5108h 0x00000031 push edx 0x00000032 pop edx 0x00000033 pop esi 0x00000034 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 618D39 second address: 618D4F instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F54D0D8D9B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a js 00007F54D0D8D9D0h 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 618D4F second address: 618D53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 618D53 second address: 618D57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 618EB9 second address: 618ED3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jno 00007F54D04F50F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jp 00007F54D04F50F6h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 618ED3 second address: 618ED7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 6191C2 second address: 6191CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F54D04F50F6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 619941 second address: 61994B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F54D0D8D9B6h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 61994B second address: 619963 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5104h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 619963 second address: 6199BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007F54D0D8D9DDh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jng 00007F54D0D8D9BEh 0x00000016 pushad 0x00000017 pushad 0x00000018 popad 0x00000019 pushad 0x0000001a popad 0x0000001b jmp 00007F54D0D8D9BCh 0x00000020 popad 0x00000021 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 61D51C second address: 61D54B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F54D04F50FFh 0x00000009 popad 0x0000000a push eax 0x0000000b jmp 00007F54D04F5107h 0x00000010 push edi 0x00000011 pop edi 0x00000012 pop eax 0x00000013 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 61D54B second address: 61D55D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F54D0D8D9BBh 0x00000008 push eax 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 61D55D second address: 61D563 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 61D3EB second address: 61D3F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 6214B3 second address: 6214D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F54D04F50F6h 0x0000000a jmp 00007F54D04F50FDh 0x0000000f popad 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 6214D0 second address: 6214D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 6214D6 second address: 6214DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 6214DB second address: 6214E0 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 6214E0 second address: 621502 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 push edx 0x00000009 jg 00007F54D04F50F6h 0x0000000f jg 00007F54D04F50F6h 0x00000015 pop edx 0x00000016 push edi 0x00000017 pushad 0x00000018 popad 0x00000019 pop edi 0x0000001a jc 00007F54D04F50FCh 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 630406 second address: 630410 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 630410 second address: 630414 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 630414 second address: 630431 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 je 00007F54D0D8D9BAh 0x0000000f jmp 00007F54D0D8D9BAh 0x00000014 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 630431 second address: 630436 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 630436 second address: 63043C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 63055E second address: 630562 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 630562 second address: 630568 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 633978 second address: 633987 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 633987 second address: 63398B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 63398B second address: 63398F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 637EDC second address: 637F00 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C9h 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 637F00 second address: 637F08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 637F08 second address: 637F0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 637F0E second address: 637F1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F54D04F50F6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C1B45 second address: 5C1B49 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 5C1B49 second address: 5C1B59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jns 00007F54D04F50F6h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 644928 second address: 64492E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 648293 second address: 6482A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5102h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 64BA9E second address: 64BAA2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 64BAA2 second address: 64BAB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 je 00007F54D04F50F6h 0x0000000d jbe 00007F54D04F50F6h 0x00000013 pop ecx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 64BAB6 second address: 64BACF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F54D0D8D9C5h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 64BC3C second address: 64BC66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jbe 00007F54D04F50F8h 0x0000000b jns 00007F54D04F5107h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 64BC66 second address: 64BC95 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F54D0D8D9C6h 0x0000000b jnp 00007F54D0D8D9B6h 0x00000011 popad 0x00000012 je 00007F54D0D8D9BCh 0x00000018 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 64C06A second address: 64C06E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 64C06E second address: 64C076 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 64C325 second address: 64C33B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a pop edx 0x0000000b jmp 00007F54D04F50FBh 0x00000010 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 64C4BB second address: 64C4D8 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push ebx 0x00000008 pushad 0x00000009 jmp 00007F54D0D8D9C2h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 64CF3B second address: 64CF4A instructions: 0x00000000 rdtsc 0x00000002 jno 00007F54D04F50F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 64CF4A second address: 64CF6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F54D0D8D9B6h 0x0000000a jmp 00007F54D0D8D9C4h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 650D2F second address: 650D33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 650D33 second address: 650D4D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007F54D0D8D9C4h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 650D4D second address: 650D53 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 650D53 second address: 650D57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 650A4B second address: 650A55 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 6580A2 second address: 6580A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 65CA2A second address: 65CA3A instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F54D04F50F6h 0x00000008 jns 00007F54D04F50F6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 65CA3A second address: 65CA40 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 65C2D4 second address: 65C2D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 65BFCD second address: 65BFD1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 65BFD1 second address: 65BFFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F54D04F5104h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jc 00007F54D04F50F8h 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 jnl 00007F54D04F50F6h 0x0000001b rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 65BFFB second address: 65BFFF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 65C8C1 second address: 65C8C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 66E1D1 second address: 66E1D5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 66E1D5 second address: 66E1F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007F54D04F5105h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 66E1F9 second address: 66E1FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 66DEE1 second address: 66DEE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 66DEE7 second address: 66DF18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F54D0D8D9C6h 0x00000009 popad 0x0000000a jmp 00007F54D0D8D9C1h 0x0000000f pop edx 0x00000010 push esi 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 6736F5 second address: 6736FB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 6736FB second address: 673731 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 pushad 0x00000008 jnl 00007F54D0D8D9BEh 0x0000000e jmp 00007F54D0D8D9C2h 0x00000013 je 00007F54D0D8D9C2h 0x00000019 jne 00007F54D0D8D9B6h 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 673878 second address: 67388B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jne 00007F54D04F50F6h 0x0000000b jo 00007F54D04F50F6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 673E1B second address: 673E3A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 673F7A second address: 673F7F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 673F7F second address: 673F8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 673F8E second address: 673F94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 673F94 second address: 673F9E instructions: 0x00000000 rdtsc 0x00000002 jno 00007F54D0D8D9B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 673F9E second address: 673FC7 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F54D04F510Eh 0x00000008 jmp 00007F54D04F5108h 0x0000000d pushad 0x0000000e jne 00007F54D04F50F6h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 67429D second address: 6742B0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9BDh 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 678257 second address: 678269 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F54D04F50FCh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 678269 second address: 678271 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4791802 second address: 479185F instructions: 0x00000000 rdtsc 0x00000002 mov ebx, eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov ebp, esp 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007F54D04F5100h 0x00000010 xor ax, A5F8h 0x00000015 jmp 00007F54D04F50FBh 0x0000001a popfd 0x0000001b pushfd 0x0000001c jmp 00007F54D04F5108h 0x00000021 adc al, 00000058h 0x00000024 jmp 00007F54D04F50FBh 0x00000029 popfd 0x0000002a popad 0x0000002b pop ebp 0x0000002c pushad 0x0000002d mov al, BFh 0x0000002f push eax 0x00000030 push edx 0x00000031 push edx 0x00000032 pop esi 0x00000033 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479197F second address: 4791985 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4791985 second address: 4791989 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4791989 second address: 47919DD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F54D0D8D9BEh 0x0000000e xchg eax, ebp 0x0000000f jmp 00007F54D0D8D9C0h 0x00000014 mov ebp, esp 0x00000016 jmp 00007F54D0D8D9C0h 0x0000001b pop ebp 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007F54D0D8D9C7h 0x00000023 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790011 second address: 4790053 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5101h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov bh, 1Ah 0x0000000f pushfd 0x00000010 jmp 00007F54D04F5104h 0x00000015 add ax, 8EB8h 0x0000001a jmp 00007F54D04F50FBh 0x0000001f popfd 0x00000020 popad 0x00000021 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790053 second address: 47900A2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushfd 0x00000006 jmp 00007F54D0D8D9C5h 0x0000000b and ecx, 5B230156h 0x00000011 jmp 00007F54D0D8D9C1h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b jmp 00007F54D0D8D9C1h 0x00000020 xchg eax, ebp 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 pushad 0x00000026 popad 0x00000027 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47900A2 second address: 47900A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47900A6 second address: 47900AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47900AC second address: 479011C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5102h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007F54D04F50FEh 0x00000012 add ax, DD08h 0x00000017 jmp 00007F54D04F50FBh 0x0000001c popfd 0x0000001d pushfd 0x0000001e jmp 00007F54D04F5108h 0x00000023 xor ax, 7F68h 0x00000028 jmp 00007F54D04F50FBh 0x0000002d popfd 0x0000002e popad 0x0000002f mov eax, dword ptr fs:[00000030h] 0x00000035 push eax 0x00000036 push edx 0x00000037 pushad 0x00000038 mov esi, ebx 0x0000003a popad 0x0000003b rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479011C second address: 4790136 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F54D0D8D9C6h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790136 second address: 479015E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F50FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b sub esp, 18h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F54D04F5100h 0x00000017 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479015E second address: 4790164 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790164 second address: 479016A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479016A second address: 47901C3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebx 0x0000000c pushad 0x0000000d push eax 0x0000000e pop esi 0x0000000f push edx 0x00000010 jmp 00007F54D0D8D9C4h 0x00000015 pop eax 0x00000016 popad 0x00000017 push eax 0x00000018 jmp 00007F54D0D8D9C0h 0x0000001d xchg eax, ebx 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007F54D0D8D9BAh 0x00000027 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47901C3 second address: 47901D2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F50FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47901D2 second address: 4790262 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ah, bl 0x00000005 push eax 0x00000006 pop edx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov ebx, dword ptr [eax+10h] 0x0000000d pushad 0x0000000e call 00007F54D0D8D9C8h 0x00000013 pushfd 0x00000014 jmp 00007F54D0D8D9C2h 0x00000019 or al, 00000038h 0x0000001c jmp 00007F54D0D8D9BBh 0x00000021 popfd 0x00000022 pop ecx 0x00000023 pushad 0x00000024 pushfd 0x00000025 jmp 00007F54D0D8D9C2h 0x0000002a and ch, FFFFFF98h 0x0000002d jmp 00007F54D0D8D9BBh 0x00000032 popfd 0x00000033 popad 0x00000034 popad 0x00000035 xchg eax, esi 0x00000036 jmp 00007F54D0D8D9C6h 0x0000003b push eax 0x0000003c push eax 0x0000003d push edx 0x0000003e pushad 0x0000003f mov di, ax 0x00000042 movzx esi, bx 0x00000045 popad 0x00000046 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790262 second address: 4790268 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790268 second address: 479026C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479026C second address: 479027B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479027B second address: 4790290 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790290 second address: 47902B1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5101h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esi, dword ptr [772406ECh] 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47902B1 second address: 47902C4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9BFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47902C4 second address: 47902CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47902CA second address: 47902E0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test esi, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F54D0D8D9BAh 0x00000011 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47902E0 second address: 4790370 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F54D04F5101h 0x00000009 sub cx, 78B6h 0x0000000e jmp 00007F54D04F5101h 0x00000013 popfd 0x00000014 mov eax, 6310CEA7h 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c jne 00007F54D04F5F81h 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 pushfd 0x00000026 jmp 00007F54D04F50FFh 0x0000002b sub esi, 54A5C5EEh 0x00000031 jmp 00007F54D04F5109h 0x00000036 popfd 0x00000037 pushfd 0x00000038 jmp 00007F54D04F5100h 0x0000003d sub ax, 2568h 0x00000042 jmp 00007F54D04F50FBh 0x00000047 popfd 0x00000048 popad 0x00000049 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790370 second address: 4790394 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, edi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790394 second address: 479039A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479039A second address: 47903AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F54D0D8D9C1h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47903AF second address: 4790426 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F54D04F50FCh 0x0000000e xchg eax, edi 0x0000000f jmp 00007F54D04F5100h 0x00000014 call dword ptr [77210B60h] 0x0000001a mov eax, 766BE5E0h 0x0000001f ret 0x00000020 pushad 0x00000021 jmp 00007F54D04F50FEh 0x00000026 movzx ecx, di 0x00000029 popad 0x0000002a push 00000044h 0x0000002c pushad 0x0000002d pushfd 0x0000002e jmp 00007F54D04F5103h 0x00000033 sbb cl, 0000007Eh 0x00000036 jmp 00007F54D04F5109h 0x0000003b popfd 0x0000003c push eax 0x0000003d push edx 0x0000003e mov edi, esi 0x00000040 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790426 second address: 4790441 instructions: 0x00000000 rdtsc 0x00000002 movzx ecx, dx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 pop edi 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F54D0D8D9C0h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790441 second address: 47904BE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F54D04F50FCh 0x00000009 sbb ecx, 765A06D8h 0x0000000f jmp 00007F54D04F50FBh 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 xchg eax, edi 0x00000019 jmp 00007F54D04F5106h 0x0000001e push eax 0x0000001f pushad 0x00000020 mov di, C8E4h 0x00000024 popad 0x00000025 xchg eax, edi 0x00000026 jmp 00007F54D04F5106h 0x0000002b push dword ptr [eax] 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 mov ax, di 0x00000033 call 00007F54D04F5109h 0x00000038 pop esi 0x00000039 popad 0x0000003a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47904BE second address: 47904EF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9BEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr fs:[00000030h] 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F54D0D8D9C7h 0x00000016 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790578 second address: 479059D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5109h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e mov di, ax 0x00000011 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479059D second address: 47905D6 instructions: 0x00000000 rdtsc 0x00000002 call 00007F54D0D8D9C6h 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov edi, 1B7D1426h 0x0000000f popad 0x00000010 je 00007F55437BCAA0h 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 mov cl, 98h 0x0000001b call 00007F54D0D8D9BBh 0x00000020 pop ecx 0x00000021 popad 0x00000022 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47905D6 second address: 4790612 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, eax 0x00000005 jmp 00007F54D04F5100h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d sub eax, eax 0x0000000f jmp 00007F54D04F5101h 0x00000014 mov dword ptr [esi], edi 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F54D04F50FDh 0x0000001d rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790612 second address: 47906A3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+04h], eax 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F54D0D8D9BCh 0x00000013 or ch, FFFFFFB8h 0x00000016 jmp 00007F54D0D8D9BBh 0x0000001b popfd 0x0000001c mov si, B1EFh 0x00000020 popad 0x00000021 mov dword ptr [esi+08h], eax 0x00000024 jmp 00007F54D0D8D9C2h 0x00000029 mov dword ptr [esi+0Ch], eax 0x0000002c pushad 0x0000002d pushad 0x0000002e jmp 00007F54D0D8D9BCh 0x00000033 mov di, si 0x00000036 popad 0x00000037 mov al, D3h 0x00000039 popad 0x0000003a mov eax, dword ptr [ebx+4Ch] 0x0000003d jmp 00007F54D0D8D9C9h 0x00000042 mov dword ptr [esi+10h], eax 0x00000045 pushad 0x00000046 mov si, 0B43h 0x0000004a pushad 0x0000004b mov dx, ax 0x0000004e push eax 0x0000004f push edx 0x00000050 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47906A3 second address: 479071D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov eax, dword ptr [ebx+50h] 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007F54D04F50FCh 0x00000010 adc ch, 00000008h 0x00000013 jmp 00007F54D04F50FBh 0x00000018 popfd 0x00000019 push ecx 0x0000001a pushfd 0x0000001b jmp 00007F54D04F50FFh 0x00000020 and cx, 544Eh 0x00000025 jmp 00007F54D04F5109h 0x0000002a popfd 0x0000002b pop ecx 0x0000002c popad 0x0000002d mov dword ptr [esi+14h], eax 0x00000030 jmp 00007F54D04F5107h 0x00000035 mov eax, dword ptr [ebx+54h] 0x00000038 push eax 0x00000039 push edx 0x0000003a pushad 0x0000003b push eax 0x0000003c push edx 0x0000003d rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479071D second address: 4790740 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F54D0D8D9C1h 0x0000000a jmp 00007F54D0D8D9BBh 0x0000000f popfd 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790740 second address: 4790746 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790746 second address: 479074A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479074A second address: 479077A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F50FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esi+18h], eax 0x0000000e pushad 0x0000000f push esi 0x00000010 mov cl, bl 0x00000012 pop eax 0x00000013 jmp 00007F54D04F50FDh 0x00000018 popad 0x00000019 mov eax, dword ptr [ebx+58h] 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 popad 0x00000022 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479077A second address: 479077E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479077E second address: 4790784 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790784 second address: 47907CC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F54D0D8D9C0h 0x00000009 and cx, 3B18h 0x0000000e jmp 00007F54D0D8D9BBh 0x00000013 popfd 0x00000014 mov ah, A2h 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 mov dword ptr [esi+1Ch], eax 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f call 00007F54D0D8D9C7h 0x00000024 pop eax 0x00000025 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47907CC second address: 47907E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov eax, 65D6ECCBh 0x00000009 popad 0x0000000a mov eax, dword ptr [ebx+5Ch] 0x0000000d pushad 0x0000000e mov al, 2Ah 0x00000010 push eax 0x00000011 push edx 0x00000012 mov esi, edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47907E0 second address: 47907E4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47907E4 second address: 4790860 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esi+20h], eax 0x0000000a pushad 0x0000000b mov ax, dx 0x0000000e push ebx 0x0000000f mov esi, 4572ACABh 0x00000014 pop eax 0x00000015 popad 0x00000016 mov eax, dword ptr [ebx+60h] 0x00000019 jmp 00007F54D04F5107h 0x0000001e mov dword ptr [esi+24h], eax 0x00000021 pushad 0x00000022 mov di, si 0x00000025 pushad 0x00000026 mov cl, DCh 0x00000028 mov edi, 720457FEh 0x0000002d popad 0x0000002e popad 0x0000002f mov eax, dword ptr [ebx+64h] 0x00000032 pushad 0x00000033 mov ebx, 209968D6h 0x00000038 mov cl, dl 0x0000003a popad 0x0000003b mov dword ptr [esi+28h], eax 0x0000003e pushad 0x0000003f pushfd 0x00000040 jmp 00007F54D04F5104h 0x00000045 or ecx, 3E61AEF8h 0x0000004b jmp 00007F54D04F50FBh 0x00000050 popfd 0x00000051 push eax 0x00000052 push edx 0x00000053 push ecx 0x00000054 pop ebx 0x00000055 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790860 second address: 4790888 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov eax, dword ptr [ebx+68h] 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F54D0D8D9BAh 0x00000016 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790888 second address: 479088E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479088E second address: 47908E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F54D0D8D9BCh 0x00000009 xor eax, 385B13B8h 0x0000000f jmp 00007F54D0D8D9BBh 0x00000014 popfd 0x00000015 mov ch, 4Fh 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a mov dword ptr [esi+2Ch], eax 0x0000001d pushad 0x0000001e mov esi, edi 0x00000020 mov dx, 1F00h 0x00000024 popad 0x00000025 mov ax, word ptr [ebx+6Ch] 0x00000029 pushad 0x0000002a mov edx, 5AAACE18h 0x0000002f mov eax, ebx 0x00000031 popad 0x00000032 mov word ptr [esi+30h], ax 0x00000036 push eax 0x00000037 push edx 0x00000038 jmp 00007F54D0D8D9C6h 0x0000003d rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47908E9 second address: 47908EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47908EF second address: 4790948 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ax, word ptr [ebx+00000088h] 0x0000000f jmp 00007F54D0D8D9C9h 0x00000014 mov word ptr [esi+32h], ax 0x00000018 jmp 00007F54D0D8D9BEh 0x0000001d mov eax, dword ptr [ebx+0000008Ch] 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007F54D0D8D9C7h 0x0000002a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790948 second address: 479094E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479094E second address: 4790952 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790952 second address: 4790956 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790956 second address: 47909BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esi+34h], eax 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007F54D0D8D9BDh 0x00000012 jmp 00007F54D0D8D9BBh 0x00000017 popfd 0x00000018 pushfd 0x00000019 jmp 00007F54D0D8D9C8h 0x0000001e xor esi, 6737C1F8h 0x00000024 jmp 00007F54D0D8D9BBh 0x00000029 popfd 0x0000002a popad 0x0000002b mov eax, dword ptr [ebx+18h] 0x0000002e pushad 0x0000002f mov edi, eax 0x00000031 mov eax, 4A88D127h 0x00000036 popad 0x00000037 mov dword ptr [esi+38h], eax 0x0000003a push eax 0x0000003b push edx 0x0000003c pushad 0x0000003d mov eax, ebx 0x0000003f popad 0x00000040 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47909BD second address: 47909C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47909C3 second address: 47909C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47909C7 second address: 47909EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [ebx+1Ch] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e call 00007F54D04F5107h 0x00000013 pop esi 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47909EF second address: 47909F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47909F4 second address: 4790A78 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5104h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+3Ch], eax 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F54D04F50FEh 0x00000013 sbb ax, 4048h 0x00000018 jmp 00007F54D04F50FBh 0x0000001d popfd 0x0000001e mov cx, FBBFh 0x00000022 popad 0x00000023 mov eax, dword ptr [ebx+20h] 0x00000026 pushad 0x00000027 mov dh, ah 0x00000029 mov esi, edi 0x0000002b popad 0x0000002c mov dword ptr [esi+40h], eax 0x0000002f pushad 0x00000030 mov bx, 82A8h 0x00000034 jmp 00007F54D04F5101h 0x00000039 popad 0x0000003a lea eax, dword ptr [ebx+00000080h] 0x00000040 jmp 00007F54D04F50FEh 0x00000045 push 00000001h 0x00000047 push eax 0x00000048 push edx 0x00000049 pushad 0x0000004a mov si, di 0x0000004d mov cx, di 0x00000050 popad 0x00000051 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790A78 second address: 4790AAA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, ax 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a jmp 00007F54D0D8D9C6h 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F54D0D8D9BDh 0x00000019 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790AAA second address: 4790ABF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5101h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790ABF second address: 4790ACF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F54D0D8D9BCh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790ACF second address: 4790AD3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790AD3 second address: 4790B34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 jmp 00007F54D0D8D9C7h 0x0000000e lea eax, dword ptr [ebp-10h] 0x00000011 pushad 0x00000012 mov esi, 7D338A2Bh 0x00000017 pushfd 0x00000018 jmp 00007F54D0D8D9C0h 0x0000001d xor ax, 39B8h 0x00000022 jmp 00007F54D0D8D9BBh 0x00000027 popfd 0x00000028 popad 0x00000029 nop 0x0000002a push eax 0x0000002b push edx 0x0000002c push eax 0x0000002d push edx 0x0000002e jmp 00007F54D0D8D9C0h 0x00000033 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790B34 second address: 4790B3A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790B3A second address: 4790B75 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, 477CEF73h 0x00000008 mov eax, 172D0FCFh 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 pushad 0x00000012 movsx ebx, cx 0x00000015 pushfd 0x00000016 jmp 00007F54D0D8D9BCh 0x0000001b sbb ax, 5E78h 0x00000020 jmp 00007F54D0D8D9BBh 0x00000025 popfd 0x00000026 popad 0x00000027 nop 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790B75 second address: 4790B79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790B79 second address: 4790B7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790B7D second address: 4790B83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790B83 second address: 4790B89 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790B89 second address: 4790B8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790C0E second address: 4790C3E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop eax 0x00000005 mov ebx, 4AC2AB0Eh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d js 00007F55437BC45Eh 0x00000013 pushad 0x00000014 mov cx, bx 0x00000017 call 00007F54D0D8D9C7h 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790C3E second address: 4790D1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 mov eax, dword ptr [ebp-0Ch] 0x00000009 pushad 0x0000000a mov cl, dh 0x0000000c pushfd 0x0000000d jmp 00007F54D04F50FCh 0x00000012 sbb si, 4CB8h 0x00000017 jmp 00007F54D04F50FBh 0x0000001c popfd 0x0000001d popad 0x0000001e mov dword ptr [esi+04h], eax 0x00000021 pushad 0x00000022 push eax 0x00000023 mov si, dx 0x00000026 pop ebx 0x00000027 jmp 00007F54D04F50FCh 0x0000002c popad 0x0000002d lea eax, dword ptr [ebx+78h] 0x00000030 jmp 00007F54D04F5100h 0x00000035 push 00000001h 0x00000037 pushad 0x00000038 pushfd 0x00000039 jmp 00007F54D04F50FEh 0x0000003e add cx, 7178h 0x00000043 jmp 00007F54D04F50FBh 0x00000048 popfd 0x00000049 pushfd 0x0000004a jmp 00007F54D04F5108h 0x0000004f sbb cl, FFFFFFD8h 0x00000052 jmp 00007F54D04F50FBh 0x00000057 popfd 0x00000058 popad 0x00000059 nop 0x0000005a push eax 0x0000005b push edx 0x0000005c pushad 0x0000005d pushfd 0x0000005e jmp 00007F54D04F50FBh 0x00000063 add esi, 5508DE9Eh 0x00000069 jmp 00007F54D04F5109h 0x0000006e popfd 0x0000006f jmp 00007F54D04F5100h 0x00000074 popad 0x00000075 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790D1F second address: 4790D31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F54D0D8D9BEh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790D31 second address: 4790D58 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a mov di, si 0x0000000d call 00007F54D04F5108h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790D58 second address: 4790D65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 nop 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790D65 second address: 4790D6B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790D6B second address: 4790DD0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 lea eax, dword ptr [ebp-08h] 0x0000000c pushad 0x0000000d mov edi, ecx 0x0000000f jmp 00007F54D0D8D9C0h 0x00000014 popad 0x00000015 nop 0x00000016 pushad 0x00000017 pushfd 0x00000018 jmp 00007F54D0D8D9BEh 0x0000001d adc ch, FFFFFFE8h 0x00000020 jmp 00007F54D0D8D9BBh 0x00000025 popfd 0x00000026 movzx eax, dx 0x00000029 popad 0x0000002a push eax 0x0000002b jmp 00007F54D0D8D9C2h 0x00000030 nop 0x00000031 pushad 0x00000032 mov dx, si 0x00000035 push ecx 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790DEF second address: 4790DFF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F54D04F50FCh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790DFF second address: 4790E03 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790E03 second address: 4790E2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov edi, eax 0x0000000a pushad 0x0000000b mov ecx, edx 0x0000000d pushad 0x0000000e mov dx, 85FAh 0x00000012 mov ecx, edi 0x00000014 popad 0x00000015 popad 0x00000016 test edi, edi 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F54D04F50FFh 0x00000021 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790E2E second address: 4790E4B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790E4B second address: 4790E75 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5101h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 js 00007F5542F2394Fh 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F54D04F50FDh 0x00000016 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790E75 second address: 4790ED5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [ebp-04h] 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007F54D0D8D9C3h 0x00000015 sbb esi, 21F01E6Eh 0x0000001b jmp 00007F54D0D8D9C9h 0x00000020 popfd 0x00000021 jmp 00007F54D0D8D9C0h 0x00000026 popad 0x00000027 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790ED5 second address: 4790EE7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F54D04F50FEh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790EE7 second address: 4790F11 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esi+08h], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e call 00007F54D0D8D9C8h 0x00000013 pop ecx 0x00000014 mov eax, ebx 0x00000016 popad 0x00000017 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790F11 second address: 4790F17 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790F17 second address: 4790F1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790F1B second address: 4790F1F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790F1F second address: 4790F6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 lea eax, dword ptr [ebx+70h] 0x0000000b jmp 00007F54D0D8D9C2h 0x00000010 push 00000001h 0x00000012 pushad 0x00000013 mov si, di 0x00000016 popad 0x00000017 push esp 0x00000018 jmp 00007F54D0D8D9C4h 0x0000001d mov dword ptr [esp], eax 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 jmp 00007F54D0D8D9BDh 0x00000028 mov edx, esi 0x0000002a popad 0x0000002b rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790F6E second address: 4790F8B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov esi, ebx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a lea eax, dword ptr [ebp-18h] 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F54D04F50FEh 0x00000014 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790F8B second address: 4790F9D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F54D0D8D9BEh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790F9D second address: 4790FA1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790FA1 second address: 4790FBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F54D0D8D9C3h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790FBF second address: 4790FD7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F54D04F5104h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790FD7 second address: 4790FDB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4790FDB second address: 4790FEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push esi 0x0000000f pop ebx 0x00000010 mov ebx, eax 0x00000012 popad 0x00000013 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4791046 second address: 479104A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479104A second address: 4791067 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5109h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4791067 second address: 479111E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 js 00007F55437BBFE9h 0x0000000f pushad 0x00000010 push ecx 0x00000011 mov dh, 1Fh 0x00000013 pop ecx 0x00000014 mov di, 8F38h 0x00000018 popad 0x00000019 mov eax, dword ptr [ebp-14h] 0x0000001c jmp 00007F54D0D8D9C7h 0x00000021 mov ecx, esi 0x00000023 jmp 00007F54D0D8D9C6h 0x00000028 mov dword ptr [esi+0Ch], eax 0x0000002b jmp 00007F54D0D8D9C0h 0x00000030 mov edx, 772406ECh 0x00000035 pushad 0x00000036 pushfd 0x00000037 jmp 00007F54D0D8D9BEh 0x0000003c xor esi, 66BC8B28h 0x00000042 jmp 00007F54D0D8D9BBh 0x00000047 popfd 0x00000048 mov ecx, 4D29181Fh 0x0000004d popad 0x0000004e sub eax, eax 0x00000050 pushad 0x00000051 mov eax, edx 0x00000053 mov ecx, edi 0x00000055 popad 0x00000056 lock cmpxchg dword ptr [edx], ecx 0x0000005a push eax 0x0000005b push edx 0x0000005c jmp 00007F54D0D8D9C2h 0x00000061 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479111E second address: 4791123 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4791123 second address: 4791168 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 movsx edi, si 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jmp 00007F54D0D8D9BBh 0x00000013 pushfd 0x00000014 jmp 00007F54D0D8D9C8h 0x00000019 add ecx, 502F3248h 0x0000001f jmp 00007F54D0D8D9BBh 0x00000024 popfd 0x00000025 popad 0x00000026 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4791168 second address: 47911C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F54D04F5105h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d test eax, eax 0x0000000f pushad 0x00000010 mov edi, ecx 0x00000012 mov edx, ecx 0x00000014 popad 0x00000015 jne 00007F5542F23645h 0x0000001b jmp 00007F54D04F5102h 0x00000020 mov edx, dword ptr [ebp+08h] 0x00000023 jmp 00007F54D04F5100h 0x00000028 mov eax, dword ptr [esi] 0x0000002a pushad 0x0000002b mov si, FE4Dh 0x0000002f popad 0x00000030 mov dword ptr [edx], eax 0x00000032 pushad 0x00000033 push eax 0x00000034 push edx 0x00000035 mov esi, ebx 0x00000037 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47911C7 second address: 47912A9 instructions: 0x00000000 rdtsc 0x00000002 movsx edx, ax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushfd 0x00000008 jmp 00007F54D0D8D9C8h 0x0000000d and esi, 0C7C5BC8h 0x00000013 jmp 00007F54D0D8D9BBh 0x00000018 popfd 0x00000019 popad 0x0000001a mov eax, dword ptr [esi+04h] 0x0000001d jmp 00007F54D0D8D9C6h 0x00000022 mov dword ptr [edx+04h], eax 0x00000025 jmp 00007F54D0D8D9C0h 0x0000002a mov eax, dword ptr [esi+08h] 0x0000002d pushad 0x0000002e popad 0x0000002f mov dword ptr [edx+08h], eax 0x00000032 jmp 00007F54D0D8D9C6h 0x00000037 mov eax, dword ptr [esi+0Ch] 0x0000003a pushad 0x0000003b pushfd 0x0000003c jmp 00007F54D0D8D9BEh 0x00000041 add ax, 72E8h 0x00000046 jmp 00007F54D0D8D9BBh 0x0000004b popfd 0x0000004c mov ax, 8ADFh 0x00000050 popad 0x00000051 mov dword ptr [edx+0Ch], eax 0x00000054 pushad 0x00000055 mov ch, F6h 0x00000057 push eax 0x00000058 push edx 0x00000059 pushfd 0x0000005a jmp 00007F54D0D8D9C3h 0x0000005f add esi, 28E63ADEh 0x00000065 jmp 00007F54D0D8D9C9h 0x0000006a popfd 0x0000006b rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47912A9 second address: 47912C0 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, 0EAA31A7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov eax, dword ptr [esi+10h] 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 mov di, 624Ah 0x00000014 mov dh, 59h 0x00000016 popad 0x00000017 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47912C0 second address: 47912EB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9BDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [edx+10h], eax 0x0000000c jmp 00007F54D0D8D9BEh 0x00000011 mov eax, dword ptr [esi+14h] 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47912EB second address: 47912EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47912EF second address: 47912F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47912F5 second address: 4791330 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F54D04F5102h 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [edx+14h], eax 0x0000000e jmp 00007F54D04F5107h 0x00000013 mov eax, dword ptr [esi+18h] 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4791330 second address: 479134B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479134B second address: 47913A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ecx 0x00000005 mov eax, edx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [edx+18h], eax 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F54D04F5103h 0x00000014 sbb al, 0000001Eh 0x00000017 jmp 00007F54D04F5109h 0x0000001c popfd 0x0000001d mov ch, F4h 0x0000001f popad 0x00000020 mov eax, dword ptr [esi+1Ch] 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007F54D04F5106h 0x0000002a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47913A8 second address: 47913C2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [edx+1Ch], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f movsx edi, ax 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47913C2 second address: 47913C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47913C7 second address: 47913E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esi+20h] 0x0000000c pushad 0x0000000d mov edx, esi 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47913E8 second address: 47913EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47913EC second address: 4791419 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9BCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [edx+20h], eax 0x0000000d jmp 00007F54D0D8D9C0h 0x00000012 mov eax, dword ptr [esi+24h] 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4791419 second address: 479141D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479141D second address: 4791421 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4791421 second address: 4791427 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4791427 second address: 4791436 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F54D0D8D9BBh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4791436 second address: 479143A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479143A second address: 479144D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [edx+24h], eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e mov edx, 44047044h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479144D second address: 47914C6 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushfd 0x00000007 jmp 00007F54D04F5109h 0x0000000c or esi, 7B8FF836h 0x00000012 jmp 00007F54D04F5101h 0x00000017 popfd 0x00000018 popad 0x00000019 mov eax, dword ptr [esi+28h] 0x0000001c jmp 00007F54D04F50FEh 0x00000021 mov dword ptr [edx+28h], eax 0x00000024 jmp 00007F54D04F5100h 0x00000029 mov ecx, dword ptr [esi+2Ch] 0x0000002c push eax 0x0000002d push edx 0x0000002e jmp 00007F54D04F5107h 0x00000033 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47914C6 second address: 479150C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [edx+2Ch], ecx 0x0000000c jmp 00007F54D0D8D9BEh 0x00000011 mov ax, word ptr [esi+30h] 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 call 00007F54D0D8D9BDh 0x0000001d pop eax 0x0000001e pushad 0x0000001f popad 0x00000020 popad 0x00000021 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479150C second address: 479160B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F50FCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov word ptr [edx+30h], ax 0x0000000d jmp 00007F54D04F5100h 0x00000012 mov ax, word ptr [esi+32h] 0x00000016 pushad 0x00000017 movzx eax, di 0x0000001a mov dh, CAh 0x0000001c popad 0x0000001d mov word ptr [edx+32h], ax 0x00000021 pushad 0x00000022 movzx esi, di 0x00000025 mov dx, 2820h 0x00000029 popad 0x0000002a mov eax, dword ptr [esi+34h] 0x0000002d jmp 00007F54D04F50FFh 0x00000032 mov dword ptr [edx+34h], eax 0x00000035 pushad 0x00000036 pushfd 0x00000037 jmp 00007F54D04F5104h 0x0000003c jmp 00007F54D04F5105h 0x00000041 popfd 0x00000042 jmp 00007F54D04F5100h 0x00000047 popad 0x00000048 test ecx, 00000700h 0x0000004e pushad 0x0000004f mov al, D5h 0x00000051 popad 0x00000052 jne 00007F5542F23269h 0x00000058 jmp 00007F54D04F5104h 0x0000005d or dword ptr [edx+38h], FFFFFFFFh 0x00000061 jmp 00007F54D04F5100h 0x00000066 or dword ptr [edx+3Ch], FFFFFFFFh 0x0000006a jmp 00007F54D04F5100h 0x0000006f or dword ptr [edx+40h], FFFFFFFFh 0x00000073 jmp 00007F54D04F5100h 0x00000078 pop esi 0x00000079 pushad 0x0000007a push eax 0x0000007b push edx 0x0000007c call 00007F54D04F50FCh 0x00000081 pop esi 0x00000082 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 479160B second address: 47A0589 instructions: 0x00000000 rdtsc 0x00000002 mov si, dx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushfd 0x00000008 jmp 00007F54D0D8D9C7h 0x0000000d jmp 00007F54D0D8D9C3h 0x00000012 popfd 0x00000013 popad 0x00000014 pop ebx 0x00000015 jmp 00007F54D0D8D9C6h 0x0000001a leave 0x0000001b jmp 00007F54D0D8D9C0h 0x00000020 retn 0004h 0x00000023 nop 0x00000024 cmp word ptr [esp+42h], 0000h 0x0000002a je 00007F54D0D8DA7Bh 0x00000030 xor ebx, ebx 0x00000032 mov eax, dword ptr [00408E20h] 0x00000037 cmp dword ptr [eax+ebx*8], FFFFFFFFh 0x0000003b lea esi, dword ptr [eax+ebx*8] 0x0000003e jne 00007F54D0D8D9FFh 0x00000040 test ebx, ebx 0x00000042 mov byte ptr [esi+04h], FFFFFF81h 0x00000046 jne 00007F54D0D8D9B7h 0x00000048 push FFFFFFF6h 0x0000004a pop eax 0x0000004b jmp 00007F54D0D8D9BCh 0x0000004d push eax 0x0000004e call 00007F54D5129362h 0x00000053 mov edi, edi 0x00000055 jmp 00007F54D0D8D9BFh 0x0000005a xchg eax, ebp 0x0000005b pushad 0x0000005c mov ecx, 41A1F2A7h 0x00000061 popad 0x00000062 push eax 0x00000063 jmp 00007F54D0D8D9BDh 0x00000068 xchg eax, ebp 0x00000069 jmp 00007F54D0D8D9BEh 0x0000006e mov ebp, esp 0x00000070 push eax 0x00000071 push edx 0x00000072 jmp 00007F54D0D8D9C7h 0x00000077 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47A04D3 second address: 47A0515 instructions: 0x00000000 rdtsc 0x00000002 mov si, DC17h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a jmp 00007F54D04F50FDh 0x0000000f xchg eax, ebp 0x00000010 pushad 0x00000011 jmp 00007F54D04F50FCh 0x00000016 mov eax, 4070B691h 0x0000001b popad 0x0000001c mov ebp, esp 0x0000001e pushad 0x0000001f mov ah, dh 0x00000021 popad 0x00000022 mov eax, dword ptr [ebp+08h] 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007F54D04F50FAh 0x0000002e rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47A0515 second address: 47A051B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47A0371 second address: 47A0375 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47A0375 second address: 47A0392 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47A0392 second address: 47A047D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F54D04F5107h 0x00000009 xor cl, 0000006Eh 0x0000000c jmp 00007F54D04F5109h 0x00000011 popfd 0x00000012 mov ax, C2F7h 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 push eax 0x0000001a pushad 0x0000001b mov cx, dx 0x0000001e mov edx, 0D3901DAh 0x00000023 popad 0x00000024 xchg eax, ebp 0x00000025 pushad 0x00000026 pushfd 0x00000027 jmp 00007F54D04F5103h 0x0000002c adc ecx, 0D86442Eh 0x00000032 jmp 00007F54D04F5109h 0x00000037 popfd 0x00000038 popad 0x00000039 mov ebp, esp 0x0000003b pushad 0x0000003c push esi 0x0000003d pushfd 0x0000003e jmp 00007F54D04F5103h 0x00000043 adc si, 5A3Eh 0x00000048 jmp 00007F54D04F5109h 0x0000004d popfd 0x0000004e pop esi 0x0000004f mov ax, dx 0x00000052 popad 0x00000053 pop ebp 0x00000054 push eax 0x00000055 push edx 0x00000056 pushad 0x00000057 pushfd 0x00000058 jmp 00007F54D04F5104h 0x0000005d sub esi, 10736668h 0x00000063 jmp 00007F54D04F50FBh 0x00000068 popfd 0x00000069 mov dl, ch 0x0000006b popad 0x0000006c rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47A028B second address: 47A02BE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F54D0D8D9BEh 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 mov eax, 640F6C83h 0x00000018 mov esi, 77524DDFh 0x0000001d popad 0x0000001e rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47A02BE second address: 47A02F1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5105h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F54D04F50FEh 0x0000000f mov ebp, esp 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov edi, 1BAD0D90h 0x00000019 popad 0x0000001a rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47A02F1 second address: 47A0329 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007F54D0D8D9BDh 0x00000012 jmp 00007F54D0D8D9C0h 0x00000017 popad 0x00000018 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47A0329 second address: 47A033B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F54D04F50FEh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47A0649 second address: 47A0661 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F54D0D8D9C4h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47A06D2 second address: 47A06D6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47A06D6 second address: 47A06DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47A06DC second address: 47A06F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F54D04F5105h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47A06F5 second address: 47A073A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov cx, bx 0x00000014 pushfd 0x00000015 jmp 00007F54D0D8D9BFh 0x0000001a jmp 00007F54D0D8D9C3h 0x0000001f popfd 0x00000020 popad 0x00000021 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4780516 second address: 47805A5 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F54D04F5102h 0x00000008 add ah, FFFFFFE8h 0x0000000b jmp 00007F54D04F50FBh 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 popad 0x00000014 xchg eax, ebp 0x00000015 pushad 0x00000016 call 00007F54D04F5104h 0x0000001b pushfd 0x0000001c jmp 00007F54D04F5102h 0x00000021 add ch, 00000078h 0x00000024 jmp 00007F54D04F50FBh 0x00000029 popfd 0x0000002a pop eax 0x0000002b mov ecx, edi 0x0000002d popad 0x0000002e push eax 0x0000002f jmp 00007F54D04F5102h 0x00000034 xchg eax, ebp 0x00000035 jmp 00007F54D04F5100h 0x0000003a mov ebp, esp 0x0000003c push eax 0x0000003d push edx 0x0000003e push eax 0x0000003f push edx 0x00000040 pushad 0x00000041 popad 0x00000042 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47805A5 second address: 47805A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47805A9 second address: 47805AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 478036E second address: 4780372 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4780372 second address: 4780376 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4780376 second address: 478037C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 478037C second address: 47803E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5102h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007F54D04F50FEh 0x00000012 add eax, 26804B58h 0x00000018 jmp 00007F54D04F50FBh 0x0000001d popfd 0x0000001e push eax 0x0000001f push edx 0x00000020 pushfd 0x00000021 jmp 00007F54D04F5106h 0x00000026 xor eax, 228455B8h 0x0000002c jmp 00007F54D04F50FBh 0x00000031 popfd 0x00000032 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47806C4 second address: 4780707 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, 1F23AD23h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebp 0x0000000e pushad 0x0000000f mov eax, 0158F911h 0x00000014 call 00007F54D0D8D9BEh 0x00000019 movzx ecx, bx 0x0000001c pop edi 0x0000001d popad 0x0000001e mov ebp, esp 0x00000020 pushad 0x00000021 mov ecx, 77DDA25Fh 0x00000026 mov bx, si 0x00000029 popad 0x0000002a pop ebp 0x0000002b push eax 0x0000002c push edx 0x0000002d jmp 00007F54D0D8D9BDh 0x00000032 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47801D9 second address: 4780245 instructions: 0x00000000 rdtsc 0x00000002 movsx ebx, si 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 xchg eax, ebp 0x00000009 jmp 00007F54D04F5108h 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007F54D04F50FCh 0x00000018 adc al, FFFFFFC8h 0x0000001b jmp 00007F54D04F50FBh 0x00000020 popfd 0x00000021 pushfd 0x00000022 jmp 00007F54D04F5108h 0x00000027 or si, B528h 0x0000002c jmp 00007F54D04F50FBh 0x00000031 popfd 0x00000032 popad 0x00000033 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4780245 second address: 4780271 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D0D8D9C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov ebx, 29304F1Eh 0x00000012 mov edi, 488E3F2Ah 0x00000017 popad 0x00000018 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4780271 second address: 47802A0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F54D04F5100h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F54D04F5107h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4780080 second address: 4780086 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 4780086 second address: 47800AE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, si 0x00000006 jmp 00007F54D04F5108h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47800AE second address: 47800B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47800B2 second address: 47800B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47800B8 second address: 47800C0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, si 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe RDTSC instruction interceptor: First address: 47800C0 second address: 4780120 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ebp 0x00000008 pushad 0x00000009 mov esi, 54F8575Fh 0x0000000e movzx ecx, bx 0x00000011 popad 0x00000012 mov ebp, esp 0x00000014 jmp 00007F54D04F5107h 0x00000019 push dword ptr [ebp+04h] 0x0000001c jmp 00007F54D04F5106h 0x00000021 push dword ptr [ebp+0Ch] 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007F54D04F5107h 0x0000002b rdtsc
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Special instruction interceptor: First address: 42183B instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Special instruction interceptor: First address: 5A9969 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Special instruction interceptor: First address: 5CF53B instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Special instruction interceptor: First address: 6238F4 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00425039 rdtsc 0_2_00425039
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Window / User API: threadDelayed 1422 Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Window / User API: threadDelayed 1410 Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\E_N60005\krnln.fnr Jump to dropped file
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\E_N60005\dp1.fne Jump to dropped file
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\E_N60005\eAPI.fne Jump to dropped file
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe API coverage: 7.6 %
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe TID: 7448 Thread sleep time: -102051s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe TID: 7420 Thread sleep time: -2845422s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe TID: 7428 Thread sleep time: -2821410s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_100655A0 FindFirstFileA,FindClose, 0_2_100655A0
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_10065610 FindFirstFileA,FindClose, 0_2_10065610
Source: MysticThumbs4.2.0 Patch.exe, MysticThumbs4.2.0 Patch.exe, 00000000.00000002.3763184070.000000000058D000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: MysticThumbs4.2.0 Patch.exe, 00000000.00000002.3763184070.000000000058D000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe System information queried: ModuleInformation Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Open window title or class name: regmonclass
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Open window title or class name: gbdyllo
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Open window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Open window title or class name: procmon_window_class
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Open window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Open window title or class name: ollydbg
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Open window title or class name: filemonclass
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Open window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe File opened: NTICE
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe File opened: SICE
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe File opened: SIWVID
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_00425039 rdtsc 0_2_00425039
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_100D5263 GetModuleHandleA,LoadLibraryA,GetProcAddress,#17,#17,FreeLibrary, 0_2_100D5263
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_1002D07F GetProcessHeap, 0_2_1002D07F
Source: MysticThumbs4.2.0 Patch.exe, 00000000.00000003.1322941486.0000000004B06000.00000004.00000020.00020000.00000000.sdmp, eAPI.fne.0.dr Binary or memory string: Shell_TrayWnd
Source: MysticThumbs4.2.0 Patch.exe, MysticThumbs4.2.0 Patch.exe, 00000000.00000003.1322941486.0000000004B06000.00000004.00000020.00020000.00000000.sdmp, MysticThumbs4.2.0 Patch.exe, 00000000.00000002.3763107135.0000000000401000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: Progman
Source: MysticThumbs4.2.0 Patch.exe, 00000000.00000002.3763107135.0000000000401000.00000040.00000001.01000000.00000003.sdmp, MysticThumbs4.2.0 Patch.exe, 00000000.00000003.1321710760.0000000002560000.00000004.00001000.00020000.00000000.sdmp Binary or memory string: ProgmanSHELLDLL_DefViewSysListView32SystemRoot\Explorer.exekernel32.dllGetSystemWow64DirectoryA@00A83340010B000000002FE41F31300281C168151F31300200002FE481C10058CCBF894C240815FEF4FFFFA7C420FE89H
Source: MysticThumbs4.2.0 Patch.exe, 00000000.00000002.3763184070.000000000058D000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: VProgram Managerh?
Source: MysticThumbs4.2.0 Patch.exe, MysticThumbs4.2.0 Patch.exe, 00000000.00000002.3763184070.000000000058D000.00000040.00000001.01000000.00000003.sdmp Binary or memory string: VProgram Manager
Source: eAPI.fne.0.dr Binary or memory string: *.*index.datdesktop.ini..\*.*-%luS-1-%luSet cdaudio door closed waitSet cdaudio door open waitGlobalMemoryStatusExKernel32.dll %1%s\shell\%s\command.%s%s\shell\%s%c:%C:%s\%s.lnkSoftware\Microsoft\Windows\CurrentVersion\Run\HistoryLastTermTypeLastServiceLastMachineTermType%dService%dSoftware\Microsoft\TelnetMachine%dSoftware\Microsoft\Windows\CurrentVersion\Explorer\RecentDocsSoftware\Microsoft\Windows\CurrentVersion\Explorer\RunMRUSoftware\Microsoft\RAS Autodial\AddressesSoftware\Microsoft\Internet Explorer\IntelliForms\e161255a-37c3-11d2-bcaa-00c04fd929db\Data\Data\e161255a-37c3-11d2-bcaa-00c04fd929dbSoftware\Microsoft\Protected Storage System Provider\Software\Microsoft\Internet Explorer\TypedURLsntdllNtQuerySystemInformationPerfStats\StopStatPerfStats\StatDataKERNEL\CPUUsagePerfStats\StartStat%s\%sbmpicldllexeicoUntitledSOFTWARE\Microsoft\Internet Explorerx86 Family %s Model %s Stepping %s%08X-%08X-%08X-%08X\StringFileInfo\%s\Comments\StringFileInfo\%s\ProductVersion\StringFileInfo\%s\ProductName\StringFileInfo\%s\OriginalFilename\StringFileInfo\%s\LegalTrademarks\StringFileInfo\%s\LegalCopyright\StringFileInfo\%s\InternalName\StringFileInfo\%s\FileDescription\StringFileInfo\%s\CompanyName\StringFileInfo\%s\FileVersion040904E4000%x, \VarFileInfo\TranslationZwUnmapViewOfSectionZwMapViewOfSectionZwOpenSectionntdll.dll\device\physicalmemory\%s%s\%s\%s.lnkExecHotIconIconButtonTextDefault VisibleYesCLSID{1FBA04EE-3024-11D2-8F1F-0000F87ABD16}Software\Microsoft\Internet Explorer\Extensions\{%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}Software\Microsoft\Internet Explorer\Extensions\%sSoftware\Microsoft\Internet Explorer\ExtensionsExt + Alt + Shift + Ctrl + %s,%d%s.lnk.lnkwindowsdevice,,,GetDefaultPrinterAwinspool.drvSetDefaultPrinterATileWallpaperWallpaperStyleWallpaperControl Panel\DesktopShell_TrayWndProgmanRundll32 netplwiz.dll,UsersRunDllrundll32.exe shell32.dll,Control_RunDLL Inetcpl.cpl,,rundll32.exe shell32.dll,Control_RunDLL intl.cpl,,rundll32.exe shell32.dll,Control_RunDLL powercfg.cplrundll32.exe shell32.dll,Control_RunDLL odbccp32.cplrundll32.exe shell32.dll,Control_RunDLL mmsys.cpl,,rundll32.exe shell32.dll,Control_RunDLL main.cpl @1,rundll32.exe shell32.dll,Control_RunDLL main.cpl @0,rundll32.exe shell32.dll,Control_RunDLL joy.cpl,,rundll32.exe shell32.dll,SHHelpShortcuts_RunDLL FontsFolderrundll32.exe shell32.dll,Control_RunDLL timedate.cpl,,rundll32.exe shell32.dll,Control_RunDLL appwiz.cpl,,rundll32.exe shell32.dll,SHHelpShortcuts_RunDLL AddPrinterrundll32.exe shell32.dll,Control_RunDLL access.cpl,,rundll32.exe shell32.dll,Control_RunDLL desk.cpl,,%s%drundll32.exe shell32.dll,Control_RunDLL sysdm.cpl,,rundll32.exe shell32.dll,Control_RunDLLSetLayeredWindowAttributesUSER32.DLLDISPLAYMicrosoft Internet ExplorerMSInfo32.exeMSInfoSoftware\Microsoft\Shared Tools LocationPathSoftware\Microsoft\Shared Tools\MSInfoIsHungThreadIsHungAppWindowUser32
Source: C:\Users\user\Desktop\MysticThumbs4.2.0 Patch.exe Code function: 0_2_100DDF5A GetVersion,GetProcessVersion,LoadCursorA,LoadCursorA,LoadCursorA, 0_2_100DDF5A
No contacted IP infos