Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: file.exe, 00000000.00000003.1456675460.000000000548D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: file.exe, 00000000.00000003.1456675460.000000000548D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: file.exe, 00000000.00000003.1516756974.00000000005FC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569048058.00000000005FC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1663155024.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512694064.00000000005FA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613567721.00000000005FD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.microsoft. |
Source: file.exe, 00000000.00000003.1456675460.000000000548D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: file.exe, 00000000.00000003.1456675460.000000000548D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: file.exe, 00000000.00000003.1456675460.000000000548D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: file.exe, 00000000.00000003.1456675460.000000000548D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: file.exe, 00000000.00000003.1456675460.000000000548D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: file.exe, 00000000.00000003.1456675460.000000000548D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: file.exe, 00000000.00000003.1456675460.000000000548D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: file.exe, 00000000.00000003.1706844025.00000000005BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1456508027.0000000005398000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707282504.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.00000000053B0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455952679.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.000000000539C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053A4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425265170.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308869469.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1392608971.000000000539C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: file.exe, 00000000.00000003.1706844025.00000000005BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1456508027.0000000005398000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707282504.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.00000000053B0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455952679.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.000000000539C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053A4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425265170.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308869469.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1392608971.000000000539C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: file.exe, 00000000.00000003.1706844025.00000000005BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1456508027.0000000005398000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707282504.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.00000000053B0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455952679.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.000000000539C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053A4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425265170.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308869469.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1392608971.000000000539C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: file.exe, 00000000.00000003.1456675460.000000000548D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: file.exe, 00000000.00000003.1456675460.000000000548D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: file.exe, 00000000.00000003.1341131806.00000000053B9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org?q= |
Source: file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: file.exe, 00000000.00000003.1512397076.0000000005471000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1513026628.0000000005471000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://avatars.cloudflare.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff |
Source: file.exe, 00000000.00000003.1573122592.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1573019521.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512397076.0000000005471000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1513026628.0000000005471000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://avatars.cloudflare.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full. |
Source: file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://avatars.cloudflare.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://broadcast.st.dl.eccdnx.com |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.cloudflare.steamstatic.com/steamcommunity/public/assets/ |
Source: file.exe, 00000000.00000003.1341131806.00000000053B9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: file.exe, 00000000.00000003.1341131806.00000000053B9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: file.exe, 00000000.00000003.1341131806.00000000053B9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: file.exe, 00000000.00000002.1707828889.0000000000603000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.st |
Source: file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: file.exe, 00000000.00000003.1456183125.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512524682.00000000053E9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.stea |
Source: file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/ |
Source: file.exe, 00000000.00000003.1456508027.0000000005398000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512524682.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455952679.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.000000000539C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053A4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425265170.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568879563.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308869469.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/applications/community/main.css?v=V4P4q3q732 |
Source: file.exe, 00000000.00000003.1568879563.00000000053E4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1517052354.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1456183125.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1627431632.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1571861148.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512524682.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710476850.00000000053D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/globalv2.css?v=N4H9vOOxi8kG&l=english&am |
Source: file.exe, 00000000.00000003.1517052354.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1627431632.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1571861148.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/promo/summer2017/stickers.css?v=INiZALwvDIbb |
Source: file.exe, 00000000.00000003.1568879563.00000000053E4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1456183125.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512524682.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710476850.00000000053D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1708019521.0000000000641000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/skin_1/fatalerror.css?v=OFUqlcDNiD6y&l=e |
Source: file.exe, 00000000.00000003.1568879563.00000000053E4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1517052354.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1456183125.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.0000000005393000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512524682.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710476850.00000000053D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/skin_1/header.css?v=EZbG2DEumYDH&l=engli |
Source: file.exe, 00000000.00000003.1517052354.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1627431632.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1571861148.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l |
Source: file.exe, 00000000.00000003.1517052354.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1627431632.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1571861148.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/css/skin_1/profilev2.css?v=l1VAyDrxeeyo&l=en |
Source: file.exe, 00000000.00000003.1512524682.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.000000000539C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053A4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568879563.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308869469.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1392608971.000000000539C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/images/skin_1/arrowDn9x5.gif |
Source: file.exe, 00000000.00000003.1706844025.00000000005BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1456508027.0000000005398000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.00000000053B0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455952679.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.000000000539C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053A4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425265170.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1707828889.00000000005BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1392608971.000000000539C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1392662404.0000000005381000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: file.exe, 00000000.00000003.1456508027.0000000005398000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512524682.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455952679.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.000000000539C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053A4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425265170.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568879563.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308869469.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/applications/community/libraries~b28b |
Source: file.exe, 00000000.00000003.1456508027.0000000005398000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512524682.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455952679.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.000000000539C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053A4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425265170.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568879563.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308869469.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/applications/community/main.js?v=jfdb |
Source: file.exe, 00000000.00000003.1456508027.0000000005398000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512524682.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455952679.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.000000000539C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053A4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425265170.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568879563.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308869469.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/applications/community/manifest.js?v= |
Source: file.exe, 00000000.00000003.1568879563.00000000053E4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1517052354.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1456183125.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.0000000005393000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512524682.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710476850.00000000053D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/global.js?v=D1VziU1eIKI3&l=englis |
Source: file.exe, 00000000.00000003.1568879563.00000000053E4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1517052354.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.0000000005393000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710476850.00000000053D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&a |
Source: file.exe, 00000000.00000003.1517052354.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/modalContent.js?v=XfYrwi9zUC4b&l= |
Source: file.exe, 00000000.00000003.1517052354.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=engli |
Source: file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/profile.js?v=47omfdMZRDiz&l=engli |
Source: file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/promo/stickers.js?v=iGFW_JMULCcZ& |
Source: file.exe, 00000000.00000003.1568879563.00000000053E4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1517052354.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1456183125.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.0000000005393000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512524682.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710476850.00000000053D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l |
Source: file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8& |
Source: file.exe, 00000000.00000003.1568879563.00000000053E4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1517052354.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1456183125.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.0000000005393000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512524682.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710476850.00000000053D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcD |
Source: file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1513026628.0000000005471000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/javascript/webui/clientcom.js?v=whw8EcafG167& |
Source: file.exe, 00000000.00000003.1568879563.00000000053E4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1517052354.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1456183125.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1627431632.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1571861148.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512524682.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710476850.00000000053D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/buttons.css?v=G3UTKgHH4xLD&l=engl |
Source: file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1708019521.0000000000641000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/motiva_sans.css?v=nc69vwog8R9p&l= |
Source: file.exe, 00000000.00000003.1568879563.00000000053E4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1517052354.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1456183125.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1627431632.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1571861148.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512524682.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710476850.00000000053D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/shared_global.css?v=sd6kCnGQW5Ji& |
Source: file.exe, 00000000.00000003.1568879563.00000000053E4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1517052354.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1456183125.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.0000000005393000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512524682.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710476850.00000000053D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/css/shared_responsive.css?v=n4_f9JKDa7wP& |
Source: file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568798556.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.p |
Source: file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: file.exe, 00000000.00000003.1568879563.00000000053E4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1517052354.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.0000000005393000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710476850.00000000053D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S |
Source: file.exe, 00000000.00000003.1568879563.00000000053E4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1517052354.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.0000000005393000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710476850.00000000053D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_global.js?v=oQ1d_VAfa_o |
Source: file.exe, 00000000.00000003.1573122592.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1573019521.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512397076.0000000005471000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1513026628.0000000005471000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_ |
Source: file.exe, 00000000.00000003.1568879563.00000000053E4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.0000000005393000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710476850.00000000053D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v |
Source: file.exe, 00000000.00000003.1568879563.00000000053E4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1517052354.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613402976.00000000053E0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.0000000005393000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710476850.00000000053D6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.cloudflare.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN& |
Source: file.exe, 00000000.00000003.1341131806.00000000053B9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: file.exe, 00000000.00000003.1341131806.00000000053B9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtabv20 |
Source: file.exe, 00000000.00000003.1341131806.00000000053B9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: file.exe, 00000000.00000003.1341131806.00000000053B9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://gemini.google.com/app?q= |
Source: file.exe, 00000000.00000003.1663155024.00000000005E6000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512586845.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1392749507.000000000065B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://guntac.bet/ |
Source: file.exe, 00000000.00000003.1392749507.000000000065B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://guntac.bet/7 |
Source: file.exe, 00000000.00000003.1663155024.00000000005E6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://guntac.bet/A |
Source: file.exe, file.exe, 00000000.00000003.1568798556.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706844025.00000000005BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707282504.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706844025.0000000000603000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512503550.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1707828889.00000000005C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1663155024.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1707828889.0000000000603000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1663155024.00000000005C0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1392749507.000000000065B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://guntac.bet/bSHsyZD |
Source: file.exe, 00000000.00000003.1627658648.000000000065B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://guntac.bet/bSHsyZD9 |
Source: file.exe, 00000000.00000003.1569048058.00000000005FC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1663155024.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613567721.00000000005FD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://guntac.bet/bSHsyZDTq1 |
Source: file.exe, 00000000.00000003.1512586845.000000000065B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://guntac.bet/bSHsyZDf |
Source: file.exe, 00000000.00000003.1568798556.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1708074193.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1627658648.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1516271711.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512586845.000000000065B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://guntac.bet/o |
Source: file.exe, 00000000.00000002.1707828889.0000000000603000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered. |
Source: file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: file.exe, 00000000.00000003.1573122592.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1573019521.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613460004.0000000005472000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512397076.0000000005471000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1708074193.000000000064D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1513026628.0000000005471000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: file.exe, 00000000.00000003.1706844025.0000000000603000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1516756974.00000000005FC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569048058.00000000005FC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1663155024.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512694064.00000000005FA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613567721.00000000005FD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1707828889.0000000000603000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.(a |
Source: file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1516756974.00000000005FC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569048058.00000000005FC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1663155024.00000000005FB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512694064.00000000005FA000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613567721.00000000005FD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1707828889.0000000000603000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://player.vimeo.com |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: file.exe | String found in binary or memory: https://steambroadcastchat.ak |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: file.exe, 00000000.00000003.1706844025.00000000005BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1456508027.0000000005398000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.00000000053B0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455952679.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425265170.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1707828889.00000000005BC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com |
Source: file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1392749507.000000000065B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: file.exe, 00000000.00000003.1456231593.000000000065B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/) |
Source: file.exe, 00000000.00000003.1568798556.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1627658648.000000000065B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/1 |
Source: file.exe, 00000000.00000003.1613357364.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1708074193.000000000065B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/9 |
Source: file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1708074193.000000000064D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: file.exe, 00000000.00000003.1706790563.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1708074193.000000000065B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/a |
Source: file.exe, 00000000.00000003.1573122592.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1573019521.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512397076.0000000005471000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1708074193.000000000064D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1513026628.0000000005471000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: file.exe, 00000000.00000003.1613357364.000000000065B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/k |
Source: file.exe, 00000000.00000003.1706844025.00000000005BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1456508027.0000000005398000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.00000000053B0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455952679.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.000000000539C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053A4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425265170.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308869469.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1707828889.00000000005BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1392608971.000000000539C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199822375128 |
Source: file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1708074193.000000000064D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: file.exe, 00000000.00000003.1573122592.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1573019521.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568798556.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512397076.0000000005471000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1513026628.0000000005471000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: file.exe, 00000000.00000003.1308747684.0000000000638000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/p |
Source: file.exe, 00000000.00000003.1308869469.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199822375128 |
Source: file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053A4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1392608971.000000000539C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199822375128/badges |
Source: file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.000000000539C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053A4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308869469.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1392608971.000000000539C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199822375128/inventory/ |
Source: file.exe, 00000000.00000003.1706790563.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1708074193.000000000065B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/765611998223751281 |
Source: file.exe, 00000000.00000003.1568798556.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1627658648.000000000065B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/765611998223751289 |
Source: file.exe, 00000000.00000003.1706790563.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1708074193.000000000065B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/q |
Source: file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1708074193.000000000064D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: file.exe, 00000000.00000003.1456231593.000000000065B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com:443/profiles/76561199822375128 |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamloopback.host |
Source: file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: file.exe, file.exe, 00000000.00000003.1568798556.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710261932.0000000005380000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1456183125.00000000053D8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308966636.000000000062A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1708074193.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1516470447.0000000005490000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455994116.0000000005387000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000638000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1627658648.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.0000000005388000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1627547937.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/; |
Source: file.exe, 00000000.00000003.1568798556.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710261932.0000000005380000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1708074193.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455994116.0000000005387000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000638000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1627658648.000000000065B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.0000000005388000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/;X-Frame-OptionsSAMEORIGINPersistent-AuthWWW-AuthenticateVarysteamCou |
Source: file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: file.exe, 00000000.00000003.1573122592.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1573019521.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568798556.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512397076.0000000005471000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1513026628.0000000005471000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: file.exe, 00000000.00000003.1706844025.00000000005BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1456508027.0000000005398000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707282504.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.0000000000639000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.00000000053B0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455952679.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.000000000539C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710283561.00000000053A4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425265170.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308869469.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1392608971.000000000539C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: file.exe, 00000000.00000003.1573122592.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1573019521.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613460004.0000000005472000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512397076.0000000005471000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1513026628.0000000005471000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568798556.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512397076.0000000005471000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1513026628.0000000005471000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568798556.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1512397076.0000000005471000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1513026628.0000000005471000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707243241.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613357364.000000000064A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613295548.0000000005468000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: file.exe, 00000000.00000003.1458323227.00000000056AD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: file.exe, 00000000.00000003.1458323227.00000000056AD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: file.exe, 00000000.00000003.1341131806.00000000053B9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/v20 |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: file.exe, 00000000.00000003.1341131806.00000000053B9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico |
Source: file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: file.exe, 00000000.00000003.1458323227.00000000056AD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.d-GHL1OW1fkT |
Source: file.exe, 00000000.00000003.1458323227.00000000056AD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.sYEKgG4Or0s6 |
Source: file.exe, 00000000.00000003.1458323227.00000000056AD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: file.exe, 00000000.00000003.1458323227.00000000056AD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: file.exe, 00000000.00000003.1458323227.00000000056AD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: file.exe, 00000000.00000003.1706844025.00000000005BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1456508027.0000000005398000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707282504.00000000005BE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568748032.0000000005468000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308696532.000000000063F000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1707031094.00000000053B0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455952679.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425201943.00000000053D7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706729304.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425265170.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425283778.00000000053AC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005397000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613319363.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1613179988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568502988.0000000005467000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1455930712.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1392608971.000000000539C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1308747684.0000000000648000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1568771752.0000000000667000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706790563.0000000000643000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: file.exe, 00000000.00000003.1369763488.0000000005384000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1706660277.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1425224003.0000000005389000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1710674432.000000000548A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1369728196.0000000005390000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1569141379.000000000548A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 88D26F second address: 88D27A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F41851B0BE6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 88D27A second address: 88D280 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 88D280 second address: 88D290 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jbe 00007F41851B0BE6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 88D290 second address: 88D294 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 88D402 second address: 88D424 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BF7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 88D424 second address: 88D428 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 88D5C4 second address: 88D5E6 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F41851B0BE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F41851B0BF0h 0x0000000f jne 00007F41851B0BEEh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 88D764 second address: 88D795 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F4184CD4C76h 0x00000008 jo 00007F4184CD4C76h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jnp 00007F4184CD4C91h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 88D795 second address: 88D79F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007F41851B0BE6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 88D79F second address: 88D7B5 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F4184CD4C76h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 jp 00007F4184CD4C76h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 88D7B5 second address: 88D7B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 88D923 second address: 88D929 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 88D929 second address: 88D931 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 88DAB1 second address: 88DABB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F4184CD4C76h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 88DABB second address: 88DAC9 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnl 00007F41851B0BE6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 890C8D second address: 890D1D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007F4184CD4C7Dh 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 jng 00007F4184CD4C7Ah 0x00000016 push ebx 0x00000017 pushad 0x00000018 popad 0x00000019 pop ebx 0x0000001a mov eax, dword ptr [eax] 0x0000001c push edx 0x0000001d jmp 00007F4184CD4C7Ch 0x00000022 pop edx 0x00000023 mov dword ptr [esp+04h], eax 0x00000027 jp 00007F4184CD4C80h 0x0000002d pop eax 0x0000002e call 00007F4184CD4C80h 0x00000033 mov dx, 9FB7h 0x00000037 pop ecx 0x00000038 push 00000003h 0x0000003a sub ecx, dword ptr [ebp+122D37E3h] 0x00000040 push 00000000h 0x00000042 movsx esi, cx 0x00000045 push 00000003h 0x00000047 sub dword ptr [ebp+122D34BDh], edx 0x0000004d call 00007F4184CD4C79h 0x00000052 jmp 00007F4184CD4C7Ch 0x00000057 push eax 0x00000058 js 00007F4184CD4C80h 0x0000005e pushad 0x0000005f push eax 0x00000060 push edx 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 890D1D second address: 890D44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b push esi 0x0000000c jno 00007F41851B0BECh 0x00000012 pop esi 0x00000013 mov eax, dword ptr [eax] 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F41851B0BEAh 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 890D44 second address: 890D76 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007F4184CD4C85h 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f push esi 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F4184CD4C80h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AE41F second address: 8AE423 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AE423 second address: 8AE47A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C82h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a jmp 00007F4184CD4C7Fh 0x0000000f pop ebx 0x00000010 pushad 0x00000011 jbe 00007F4184CD4C7Ch 0x00000017 js 00007F4184CD4C7Ch 0x0000001d jns 00007F4184CD4C76h 0x00000023 push ecx 0x00000024 jnp 00007F4184CD4C76h 0x0000002a jmp 00007F4184CD4C7Ch 0x0000002f pop ecx 0x00000030 pushad 0x00000031 push eax 0x00000032 push edx 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AE47A second address: 8AE482 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AE6F1 second address: 8AE70D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4184CD4C86h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AE9B8 second address: 8AE9E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F41851B0BEDh 0x00000009 jnl 00007F41851B0BE6h 0x0000000f popad 0x00000010 pop ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 push ebx 0x00000014 jmp 00007F41851B0BF1h 0x00000019 push ecx 0x0000001a pop ecx 0x0000001b pop ebx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AE9E8 second address: 8AEA11 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jnp 00007F4184CD4C76h 0x00000009 pushad 0x0000000a popad 0x0000000b pop ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 jmp 00007F4184CD4C89h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AEB77 second address: 8AEB84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop esi 0x00000008 push edi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AEB84 second address: 8AEB88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AEB88 second address: 8AEBCE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BEBh 0x00000007 jmp 00007F41851B0BF9h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f jns 00007F41851B0BE6h 0x00000015 jmp 00007F41851B0BF3h 0x0000001a push edi 0x0000001b pop edi 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AECE7 second address: 8AECEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AEE4C second address: 8AEE52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AEFA3 second address: 8AEFA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AEFA7 second address: 8AEFAD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AEFAD second address: 8AEFB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AF38A second address: 8AF399 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jnl 00007F41851B0BE6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AF399 second address: 8AF3A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F4184CD4C76h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AF3A4 second address: 8AF3AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AF3AA second address: 8AF3B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AF3B0 second address: 8AF3C0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BECh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AF3C0 second address: 8AF3D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F4184CD4C7Eh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8A3B07 second address: 8A3B20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jmp 00007F41851B0BF2h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8867F9 second address: 8867FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8867FD second address: 88681F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BEDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pushad 0x0000000b jmp 00007F41851B0BEBh 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AF511 second address: 8AF517 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AFAE1 second address: 8AFAE8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AFC7D second address: 8AFC9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F4184CD4C89h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AFC9F second address: 8AFCA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AFCA3 second address: 8AFCA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8AFF52 second address: 8AFF5D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8B3279 second address: 8B327D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8B327D second address: 8B3283 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8B3782 second address: 8B37AE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007F4184CD4C76h 0x00000009 jmp 00007F4184CD4C7Ah 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F4184CD4C83h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8B37AE second address: 8B37B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8B37B4 second address: 8B37B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8B3922 second address: 8B3926 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8B3926 second address: 8B396C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F4184CD4C87h 0x0000000b popad 0x0000000c push eax 0x0000000d jbe 00007F4184CD4C8Ah 0x00000013 jp 00007F4184CD4C84h 0x00000019 jmp 00007F4184CD4C7Eh 0x0000001e mov eax, dword ptr [esp+04h] 0x00000022 pushad 0x00000023 jnl 00007F4184CD4C7Ch 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8B396C second address: 8B398C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007F41851B0BEEh 0x0000000c popad 0x0000000d popad 0x0000000e mov eax, dword ptr [eax] 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8B398C second address: 8B3991 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8B27FB second address: 8B2826 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007F41851B0BEFh 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f jmp 00007F41851B0BF0h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8B2826 second address: 8B282B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8B3ADE second address: 8B3AE4 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8B3AE4 second address: 8B3AEA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8B3C84 second address: 8B3C8E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F41851B0BE6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8B5504 second address: 8B550A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8B550A second address: 8B550F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8B550F second address: 8B551A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8B551A second address: 8B5520 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 87764A second address: 87764E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 87764E second address: 877654 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BD991 second address: 8BD999 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BDC73 second address: 8BDC77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BDC77 second address: 8BDC7B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BDC7B second address: 8BDC81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BDC81 second address: 8BDCA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 pop eax 0x00000009 pushad 0x0000000a popad 0x0000000b push edi 0x0000000c pop edi 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F4184CD4C7Eh 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BDDF7 second address: 8BDE1C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007F41851B0BF7h 0x0000000c jmp 00007F41851B0BEFh 0x00000011 pushad 0x00000012 popad 0x00000013 jnp 00007F41851B0BECh 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C017E second address: 8C0189 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnp 00007F4184CD4C76h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C0403 second address: 8C0407 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C0CBF second address: 8C0CCE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4184CD4C7Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C0CCE second address: 8C0CFF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BF1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F41851B0BF7h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C0CFF second address: 8C0D05 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C0D05 second address: 8C0D09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C1130 second address: 8C1146 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f jo 00007F4184CD4C76h 0x00000015 pop ecx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C12F2 second address: 8C12FC instructions: 0x00000000 rdtsc 0x00000002 jo 00007F41851B0BE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C12FC second address: 8C1336 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 jmp 00007F4184CD4C89h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push esi 0x00000011 jmp 00007F4184CD4C84h 0x00000016 pop esi 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C1336 second address: 8C133C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C1818 second address: 8C181C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C181C second address: 8C182A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jns 00007F41851B0BE6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C224F second address: 8C2268 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F4184CD4C76h 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d pushad 0x0000000e jne 00007F4184CD4C78h 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C2058 second address: 8C206E instructions: 0x00000000 rdtsc 0x00000002 js 00007F41851B0BECh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 875B7E second address: 875B90 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F4184CD4C7Ch 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C48D3 second address: 8C4954 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F41851B0BECh 0x00000009 popad 0x0000000a mov dword ptr [esp], eax 0x0000000d mov edi, dword ptr [ebp+1244E140h] 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push edi 0x00000018 call 00007F41851B0BE8h 0x0000001d pop edi 0x0000001e mov dword ptr [esp+04h], edi 0x00000022 add dword ptr [esp+04h], 00000015h 0x0000002a inc edi 0x0000002b push edi 0x0000002c ret 0x0000002d pop edi 0x0000002e ret 0x0000002f jmp 00007F41851B0BEDh 0x00000034 push 00000000h 0x00000036 push 00000000h 0x00000038 push ebx 0x00000039 call 00007F41851B0BE8h 0x0000003e pop ebx 0x0000003f mov dword ptr [esp+04h], ebx 0x00000043 add dword ptr [esp+04h], 00000019h 0x0000004b inc ebx 0x0000004c push ebx 0x0000004d ret 0x0000004e pop ebx 0x0000004f ret 0x00000050 mov esi, edx 0x00000052 xchg eax, ebx 0x00000053 push eax 0x00000054 push edx 0x00000055 pushad 0x00000056 jmp 00007F41851B0BEBh 0x0000005b ja 00007F41851B0BE6h 0x00000061 popad 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C4954 second address: 8C495A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C5197 second address: 8C51A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F41851B0BEBh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C5E2D second address: 8C5E31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C5ECD second address: 8C5ED3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C6893 second address: 8C68A8 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push edx 0x00000004 pop edx 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jo 00007F4184CD4C78h 0x00000010 push esi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C68A8 second address: 8C691C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push ecx 0x0000000a call 00007F41851B0BE8h 0x0000000f pop ecx 0x00000010 mov dword ptr [esp+04h], ecx 0x00000014 add dword ptr [esp+04h], 0000001Ch 0x0000001c inc ecx 0x0000001d push ecx 0x0000001e ret 0x0000001f pop ecx 0x00000020 ret 0x00000021 mov di, 195Dh 0x00000025 push 00000000h 0x00000027 push 00000000h 0x00000029 push ebp 0x0000002a call 00007F41851B0BE8h 0x0000002f pop ebp 0x00000030 mov dword ptr [esp+04h], ebp 0x00000034 add dword ptr [esp+04h], 0000001Ch 0x0000003c inc ebp 0x0000003d push ebp 0x0000003e ret 0x0000003f pop ebp 0x00000040 ret 0x00000041 jmp 00007F41851B0BF0h 0x00000046 push 00000000h 0x00000048 mov edi, esi 0x0000004a mov dword ptr [ebp+122D1D86h], eax 0x00000050 push eax 0x00000051 pushad 0x00000052 pushad 0x00000053 push eax 0x00000054 push edx 0x00000055 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C5BE0 second address: 8C5BE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8C7301 second address: 8C730B instructions: 0x00000000 rdtsc 0x00000002 jp 00007F41851B0BE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8CAEA3 second address: 8CAF28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 nop 0x00000006 jmp 00007F4184CD4C7Ch 0x0000000b push 00000000h 0x0000000d push 00000000h 0x0000000f push ebx 0x00000010 call 00007F4184CD4C78h 0x00000015 pop ebx 0x00000016 mov dword ptr [esp+04h], ebx 0x0000001a add dword ptr [esp+04h], 00000018h 0x00000022 inc ebx 0x00000023 push ebx 0x00000024 ret 0x00000025 pop ebx 0x00000026 ret 0x00000027 xor ebx, 4615FF91h 0x0000002d push 00000000h 0x0000002f push 00000000h 0x00000031 push ebp 0x00000032 call 00007F4184CD4C78h 0x00000037 pop ebp 0x00000038 mov dword ptr [esp+04h], ebp 0x0000003c add dword ptr [esp+04h], 00000017h 0x00000044 inc ebp 0x00000045 push ebp 0x00000046 ret 0x00000047 pop ebp 0x00000048 ret 0x00000049 xchg eax, esi 0x0000004a push esi 0x0000004b jno 00007F4184CD4C7Ch 0x00000051 pop esi 0x00000052 push eax 0x00000053 pushad 0x00000054 jc 00007F4184CD4C81h 0x0000005a jmp 00007F4184CD4C7Bh 0x0000005f push eax 0x00000060 push edx 0x00000061 ja 00007F4184CD4C76h 0x00000067 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8CAF28 second address: 8CAF2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8CDF36 second address: 8CDF83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 jnc 00007F4184CD4C76h 0x0000000e popad 0x0000000f popad 0x00000010 push eax 0x00000011 jmp 00007F4184CD4C89h 0x00000016 nop 0x00000017 mov bh, dh 0x00000019 push 00000000h 0x0000001b or dword ptr [ebp+122D2A18h], esi 0x00000021 push 00000000h 0x00000023 jno 00007F4184CD4C7Ch 0x00000029 xchg eax, esi 0x0000002a push eax 0x0000002b je 00007F4184CD4C7Ch 0x00000031 push eax 0x00000032 push edx 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8CDF83 second address: 8CDF9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F41851B0BF0h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D0066 second address: 8D006C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8CC188 second address: 8CC192 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007F41851B0BE6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8CB0E2 second address: 8CB0E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D02A6 second address: 8D02AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D208C second address: 8D2090 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D2259 second address: 8D225D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D41D6 second address: 8D41DB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D41DB second address: 8D41EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b jl 00007F41851B0BE6h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D41EC second address: 8D41FA instructions: 0x00000000 rdtsc 0x00000002 jng 00007F4184CD4C76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D41FA second address: 8D41FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D5188 second address: 8D51DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 mov dword ptr [esp], eax 0x00000008 push 00000000h 0x0000000a push ebx 0x0000000b call 00007F4184CD4C78h 0x00000010 pop ebx 0x00000011 mov dword ptr [esp+04h], ebx 0x00000015 add dword ptr [esp+04h], 0000001Ch 0x0000001d inc ebx 0x0000001e push ebx 0x0000001f ret 0x00000020 pop ebx 0x00000021 ret 0x00000022 add edi, 2D4011F9h 0x00000028 push 00000000h 0x0000002a push 00000000h 0x0000002c mov ebx, dword ptr [ebp+122D1CBFh] 0x00000032 xchg eax, esi 0x00000033 push eax 0x00000034 jmp 00007F4184CD4C7Ch 0x00000039 pop eax 0x0000003a push eax 0x0000003b js 00007F4184CD4C80h 0x00000041 push eax 0x00000042 push edx 0x00000043 pushad 0x00000044 popad 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D6259 second address: 8D62D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jno 00007F41851B0BECh 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f add bx, 3E50h 0x00000014 push 00000000h 0x00000016 push 00000000h 0x00000018 push ebx 0x00000019 call 00007F41851B0BE8h 0x0000001e pop ebx 0x0000001f mov dword ptr [esp+04h], ebx 0x00000023 add dword ptr [esp+04h], 00000015h 0x0000002b inc ebx 0x0000002c push ebx 0x0000002d ret 0x0000002e pop ebx 0x0000002f ret 0x00000030 jnc 00007F41851B0BECh 0x00000036 push ecx 0x00000037 movsx edi, dx 0x0000003a pop edi 0x0000003b push 00000000h 0x0000003d mov di, bx 0x00000040 xchg eax, esi 0x00000041 jnl 00007F41851B0C06h 0x00000047 push eax 0x00000048 push esi 0x00000049 push eax 0x0000004a push edx 0x0000004b jns 00007F41851B0BE6h 0x00000051 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D62D9 second address: 8D62DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D43A6 second address: 8D43AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D443F second address: 8D445F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C83h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D721E second address: 8D7222 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D7222 second address: 8D7228 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D7228 second address: 8D722E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D6436 second address: 8D64CD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jnl 00007F4184CD4C76h 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d mov dword ptr [ebp+1246EB8Eh], edx 0x00000013 push dword ptr fs:[00000000h] 0x0000001a push 00000000h 0x0000001c push esi 0x0000001d call 00007F4184CD4C78h 0x00000022 pop esi 0x00000023 mov dword ptr [esp+04h], esi 0x00000027 add dword ptr [esp+04h], 00000016h 0x0000002f inc esi 0x00000030 push esi 0x00000031 ret 0x00000032 pop esi 0x00000033 ret 0x00000034 sub dword ptr [ebp+122D2667h], esi 0x0000003a jne 00007F4184CD4C7Ch 0x00000040 mov dword ptr fs:[00000000h], esp 0x00000047 push 00000000h 0x00000049 push ebp 0x0000004a call 00007F4184CD4C78h 0x0000004f pop ebp 0x00000050 mov dword ptr [esp+04h], ebp 0x00000054 add dword ptr [esp+04h], 0000001Bh 0x0000005c inc ebp 0x0000005d push ebp 0x0000005e ret 0x0000005f pop ebp 0x00000060 ret 0x00000061 mov edi, edx 0x00000063 movsx edi, di 0x00000066 mov eax, dword ptr [ebp+122D018Dh] 0x0000006c add bx, 451Ah 0x00000071 push FFFFFFFFh 0x00000073 js 00007F4184CD4C7Ch 0x00000079 mov edi, dword ptr [ebp+122D2284h] 0x0000007f nop 0x00000080 pushad 0x00000081 pushad 0x00000082 push eax 0x00000083 push edx 0x00000084 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D64CD second address: 8D64FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F41851B0BF7h 0x00000009 popad 0x0000000a jmp 00007F41851B0BEDh 0x0000000f popad 0x00000010 push eax 0x00000011 push edi 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D64FC second address: 8D6502 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D8134 second address: 8D8138 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D8138 second address: 8D813C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D8FC3 second address: 8D8FC7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8DA036 second address: 8DA03A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8DA03A second address: 8DA0B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F41851B0BEDh 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f jo 00007F41851B0BECh 0x00000015 mov dword ptr [ebp+122D2B02h], esi 0x0000001b push 00000000h 0x0000001d push 00000000h 0x0000001f push edi 0x00000020 call 00007F41851B0BE8h 0x00000025 pop edi 0x00000026 mov dword ptr [esp+04h], edi 0x0000002a add dword ptr [esp+04h], 00000019h 0x00000032 inc edi 0x00000033 push edi 0x00000034 ret 0x00000035 pop edi 0x00000036 ret 0x00000037 or bl, 00000038h 0x0000003a push 00000000h 0x0000003c push 00000000h 0x0000003e push esi 0x0000003f call 00007F41851B0BE8h 0x00000044 pop esi 0x00000045 mov dword ptr [esp+04h], esi 0x00000049 add dword ptr [esp+04h], 00000016h 0x00000051 inc esi 0x00000052 push esi 0x00000053 ret 0x00000054 pop esi 0x00000055 ret 0x00000056 push eax 0x00000057 push eax 0x00000058 push edx 0x00000059 jmp 00007F41851B0BECh 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8DA0B2 second address: 8DA0B9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D912B second address: 8D912F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D912F second address: 8D9133 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D9133 second address: 8D91CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jno 00007F41851B0BF3h 0x0000000e nop 0x0000000f push dword ptr fs:[00000000h] 0x00000016 add dword ptr [ebp+122D223Ah], eax 0x0000001c mov dword ptr fs:[00000000h], esp 0x00000023 cmc 0x00000024 mov edi, 48429565h 0x00000029 mov eax, dword ptr [ebp+122D001Dh] 0x0000002f push 00000000h 0x00000031 push edi 0x00000032 call 00007F41851B0BE8h 0x00000037 pop edi 0x00000038 mov dword ptr [esp+04h], edi 0x0000003c add dword ptr [esp+04h], 00000015h 0x00000044 inc edi 0x00000045 push edi 0x00000046 ret 0x00000047 pop edi 0x00000048 ret 0x00000049 jnc 00007F41851B0BE8h 0x0000004f mov dword ptr [ebp+122D1E5Fh], edx 0x00000055 push FFFFFFFFh 0x00000057 mov dword ptr [ebp+122D1C1Ah], eax 0x0000005d jmp 00007F41851B0BF5h 0x00000062 push eax 0x00000063 push eax 0x00000064 push edx 0x00000065 jmp 00007F41851B0BF2h 0x0000006a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8D91CC second address: 8D91D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8DEA80 second address: 8DEA85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8DEA85 second address: 8DEABA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jo 00007F4184CD4C76h 0x00000009 jmp 00007F4184CD4C86h 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 jmp 00007F4184CD4C81h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8E1B49 second address: 8E1B64 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BF7h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8E1B64 second address: 8E1B6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8E1B6E second address: 8E1B72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8E1B72 second address: 8E1B78 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8E1B78 second address: 8E1B8B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BEEh 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 87C767 second address: 87C77B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4184CD4C7Fh 0x00000009 pop edi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 87C77B second address: 87C793 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F41851B0BF2h 0x00000009 push edi 0x0000000a pop edi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 87C793 second address: 87C797 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8EBADF second address: 8EBAED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop esi 0x00000008 push eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c push esi 0x0000000d pop esi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8EBAED second address: 8EBB07 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C82h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8EBB07 second address: 8EBB0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8EBB0B second address: 8EBB56 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F4184CD4C76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f pushad 0x00000010 jg 00007F4184CD4C8Bh 0x00000016 pushad 0x00000017 push esi 0x00000018 pop esi 0x00000019 push eax 0x0000001a pop eax 0x0000001b popad 0x0000001c popad 0x0000001d mov eax, dword ptr [eax] 0x0000001f ja 00007F4184CD4C7Eh 0x00000025 mov dword ptr [esp+04h], eax 0x00000029 push esi 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d popad 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8F0702 second address: 8F0717 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F41851B0BF1h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8F0717 second address: 8F0721 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F4184CD4C76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8F10E2 second address: 8F10E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8F1389 second address: 8F138D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8F14C9 second address: 8F14D6 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8F1787 second address: 8F178C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8F178C second address: 8F179B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jne 00007F41851B0BE6h 0x0000000b push edx 0x0000000c pop edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8F179B second address: 8F17C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F4184CD4C85h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f jbe 00007F4184CD4C76h 0x00000015 push edi 0x00000016 pop edi 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8F78BC second address: 8F78DA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BF8h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8F78DA second address: 8F78E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8FE8BE second address: 8FE8C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F41851B0BE6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8FE8C9 second address: 8FE8EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4184CD4C84h 0x00000009 jmp 00007F4184CD4C7Eh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8FE8EF second address: 8FE8F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8FEA14 second address: 8FEA36 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F4184CD4C86h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8FEA36 second address: 8FEA3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8FEA3A second address: 8FEA46 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jng 00007F4184CD4C76h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8FEA46 second address: 8FEA4B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8FEA4B second address: 8FEA75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jmp 00007F4184CD4C88h 0x0000000b jnp 00007F4184CD4C76h 0x00000011 popad 0x00000012 push edi 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8FEE49 second address: 8FEE53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F41851B0BE6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8FEE53 second address: 8FEE70 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C7Fh 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jnc 00007F4184CD4C76h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8FF105 second address: 8FF119 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jbe 00007F41851B0BECh 0x0000000e ja 00007F41851B0BE6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8FF621 second address: 8FF634 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4184CD4C7Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8FF77A second address: 8FF78E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 jmp 00007F41851B0BEDh 0x0000000b pop esi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8A470C second address: 8A4716 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edi 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8A4716 second address: 8A4739 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F41851B0BEAh 0x0000000c jmp 00007F41851B0BF2h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8FFBC2 second address: 8FFBC6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8FFBC6 second address: 8FFBDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jns 00007F41851B0BEEh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8FFBDA second address: 8FFBF9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C89h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8FFBF9 second address: 8FFBFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8FFBFD second address: 8FFC01 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 905E54 second address: 905E5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 905E5F second address: 905E63 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 905E63 second address: 905E7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push edi 0x0000000a push edx 0x0000000b pop edx 0x0000000c pushad 0x0000000d popad 0x0000000e pop edi 0x0000000f push eax 0x00000010 push edx 0x00000011 js 00007F41851B0BE6h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BE81E second address: 8BE824 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BE824 second address: 8A3B20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ecx 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push ecx 0x0000000c call 00007F41851B0BE8h 0x00000011 pop ecx 0x00000012 mov dword ptr [esp+04h], ecx 0x00000016 add dword ptr [esp+04h], 0000001Ah 0x0000001e inc ecx 0x0000001f push ecx 0x00000020 ret 0x00000021 pop ecx 0x00000022 ret 0x00000023 lea eax, dword ptr [ebp+1247C5DBh] 0x00000029 xor ecx, 7ECC47ADh 0x0000002f push eax 0x00000030 jmp 00007F41851B0BF9h 0x00000035 mov dword ptr [esp], eax 0x00000038 push 00000000h 0x0000003a push ebp 0x0000003b call 00007F41851B0BE8h 0x00000040 pop ebp 0x00000041 mov dword ptr [esp+04h], ebp 0x00000045 add dword ptr [esp+04h], 00000015h 0x0000004d inc ebp 0x0000004e push ebp 0x0000004f ret 0x00000050 pop ebp 0x00000051 ret 0x00000052 xor dword ptr [ebp+12448B2Bh], ecx 0x00000058 xor dword ptr [ebp+122D1AB8h], edi 0x0000005e call dword ptr [ebp+122D2A97h] 0x00000064 push ecx 0x00000065 jl 00007F41851B0BECh 0x0000006b pushad 0x0000006c jmp 00007F41851B0BF2h 0x00000071 push eax 0x00000072 push edx 0x00000073 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BEF25 second address: 8BEF2B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BEF2B second address: 8BEF2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BEF2F second address: 8BEF33 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BEF33 second address: 8BEF77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F41851B0BF3h 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 pushad 0x00000013 push edi 0x00000014 jmp 00007F41851B0BEFh 0x00000019 pop edi 0x0000001a jmp 00007F41851B0BEBh 0x0000001f popad 0x00000020 mov eax, dword ptr [eax] 0x00000022 pushad 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BEF77 second address: 8BEF80 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BEF80 second address: 8BEF84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BEF84 second address: 8BEF88 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BF0D6 second address: 8BF0DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BF0DB second address: 8BF0E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007F4184CD4C76h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BF0E5 second address: 8BF144 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], esi 0x0000000b push 00000000h 0x0000000d push eax 0x0000000e call 00007F41851B0BE8h 0x00000013 pop eax 0x00000014 mov dword ptr [esp+04h], eax 0x00000018 add dword ptr [esp+04h], 00000017h 0x00000020 inc eax 0x00000021 push eax 0x00000022 ret 0x00000023 pop eax 0x00000024 ret 0x00000025 or dh, FFFFFFFAh 0x00000028 nop 0x00000029 pushad 0x0000002a pushad 0x0000002b jns 00007F41851B0BE6h 0x00000031 jnc 00007F41851B0BE6h 0x00000037 popad 0x00000038 push edx 0x00000039 jmp 00007F41851B0BF5h 0x0000003e pop edx 0x0000003f popad 0x00000040 push eax 0x00000041 push edi 0x00000042 push eax 0x00000043 push edx 0x00000044 js 00007F41851B0BE6h 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BF7B7 second address: 8BF7BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BF7BC second address: 8BF7C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push esi 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BFB7A second address: 8BFBC7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C7Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c mov ecx, 133DDFB1h 0x00000011 lea eax, dword ptr [ebp+1247C61Fh] 0x00000017 push 00000000h 0x00000019 push ebx 0x0000001a call 00007F4184CD4C78h 0x0000001f pop ebx 0x00000020 mov dword ptr [esp+04h], ebx 0x00000024 add dword ptr [esp+04h], 00000019h 0x0000002c inc ebx 0x0000002d push ebx 0x0000002e ret 0x0000002f pop ebx 0x00000030 ret 0x00000031 mov edx, dword ptr [ebp+122D3553h] 0x00000037 nop 0x00000038 jl 00007F4184CD4C94h 0x0000003e pushad 0x0000003f push eax 0x00000040 push edx 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BFBC7 second address: 8BFBF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F41851B0BF6h 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F41851B0BF4h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BFBF9 second address: 8BFC7A instructions: 0x00000000 rdtsc 0x00000002 jp 00007F4184CD4C7Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push esi 0x0000000e call 00007F4184CD4C78h 0x00000013 pop esi 0x00000014 mov dword ptr [esp+04h], esi 0x00000018 add dword ptr [esp+04h], 0000001Ch 0x00000020 inc esi 0x00000021 push esi 0x00000022 ret 0x00000023 pop esi 0x00000024 ret 0x00000025 mov di, 92F7h 0x00000029 lea eax, dword ptr [ebp+1247C5DBh] 0x0000002f push 00000000h 0x00000031 push ebx 0x00000032 call 00007F4184CD4C78h 0x00000037 pop ebx 0x00000038 mov dword ptr [esp+04h], ebx 0x0000003c add dword ptr [esp+04h], 00000015h 0x00000044 inc ebx 0x00000045 push ebx 0x00000046 ret 0x00000047 pop ebx 0x00000048 ret 0x00000049 nop 0x0000004a jp 00007F4184CD4C8Eh 0x00000050 push eax 0x00000051 pushad 0x00000052 push eax 0x00000053 push edx 0x00000054 push eax 0x00000055 push edx 0x00000056 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BFC7A second address: 8BFC7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BFC7E second address: 8BFC96 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C80h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BFC96 second address: 8BFC9A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BFC9A second address: 8A470C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ecx 0x0000000b call 00007F4184CD4C78h 0x00000010 pop ecx 0x00000011 mov dword ptr [esp+04h], ecx 0x00000015 add dword ptr [esp+04h], 0000001Bh 0x0000001d inc ecx 0x0000001e push ecx 0x0000001f ret 0x00000020 pop ecx 0x00000021 ret 0x00000022 jp 00007F4184CD4C78h 0x00000028 mov edi, ebx 0x0000002a call dword ptr [ebp+122D1AEFh] 0x00000030 jmp 00007F4184CD4C7Fh 0x00000035 pushad 0x00000036 push edi 0x00000037 push eax 0x00000038 push edx 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 905162 second address: 905167 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 905167 second address: 905191 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C84h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F4184CD4C80h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 90583F second address: 905845 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 90A2D6 second address: 90A2E6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C7Ch 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 90A2E6 second address: 90A31A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007F41851B0BF4h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f je 00007F41851B0BF7h 0x00000015 jg 00007F41851B0BE6h 0x0000001b jmp 00007F41851B0BEBh 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 90A31A second address: 90A321 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 90A485 second address: 90A489 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 90A489 second address: 90A4AE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F4184CD4C89h 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 90AA1E second address: 90AA24 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 909FB7 second address: 909FBB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 909FBB second address: 909FCD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b pop ecx 0x0000000c pop edi 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 909FCD second address: 909FD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 909FD3 second address: 909FEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jbe 00007F41851B0BE6h 0x0000000c popad 0x0000000d jmp 00007F41851B0BEAh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 90B033 second address: 90B039 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 90B2F4 second address: 90B2FF instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edi 0x00000008 pop edi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 87918D second address: 879198 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F4184CD4C76h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 879198 second address: 8791BC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BF8h 0x00000007 jc 00007F41851B0BEEh 0x0000000d push esi 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 90E19D second address: 90E1A7 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F4184CD4C7Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 90E1A7 second address: 90E1B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 90E2D7 second address: 90E2DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 91056B second address: 91056F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 910700 second address: 910704 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 917EEA second address: 917F0C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BF7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d push edx 0x0000000e pop edx 0x0000000f pop edi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 917F0C second address: 917F12 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 917F12 second address: 917F18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 917F18 second address: 917F22 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F4184CD4C76h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 917F22 second address: 917F2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9168B4 second address: 9168C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jnl 00007F4184CD4C7Ch 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9168C5 second address: 9168DA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F41851B0BF0h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9168DA second address: 9168E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 916B84 second address: 916B97 instructions: 0x00000000 rdtsc 0x00000002 je 00007F41851B0BE6h 0x00000008 jg 00007F41851B0BE6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 916EDB second address: 916EF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push edx 0x00000009 pop edx 0x0000000a push edi 0x0000000b pop edi 0x0000000c popad 0x0000000d push ecx 0x0000000e jc 00007F4184CD4C76h 0x00000014 pop ecx 0x00000015 popad 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b push eax 0x0000001c pop eax 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 916EF8 second address: 916EFE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 916EFE second address: 916F0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jno 00007F4184CD4C76h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 916F0E second address: 916F12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BF5E9 second address: 8BF5ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BF5ED second address: 8BF6A8 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007F41851B0BF4h 0x0000000c nop 0x0000000d jnl 00007F41851B0BECh 0x00000013 mov ebx, dword ptr [ebp+1247C61Ah] 0x00000019 cld 0x0000001a push edi 0x0000001b jp 00007F41851B0BF3h 0x00000021 pop edi 0x00000022 add eax, ebx 0x00000024 xor edx, 1B867203h 0x0000002a nop 0x0000002b jmp 00007F41851B0BECh 0x00000030 push eax 0x00000031 jmp 00007F41851B0BF5h 0x00000036 nop 0x00000037 jmp 00007F41851B0BF5h 0x0000003c push 00000004h 0x0000003e push 00000000h 0x00000040 push eax 0x00000041 call 00007F41851B0BE8h 0x00000046 pop eax 0x00000047 mov dword ptr [esp+04h], eax 0x0000004b add dword ptr [esp+04h], 00000015h 0x00000053 inc eax 0x00000054 push eax 0x00000055 ret 0x00000056 pop eax 0x00000057 ret 0x00000058 or edx, 7DBF04D5h 0x0000005e jnp 00007F41851B0BE6h 0x00000064 push eax 0x00000065 push eax 0x00000066 push edx 0x00000067 jg 00007F41851B0BE8h 0x0000006d push ebx 0x0000006e pop ebx 0x0000006f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 8BF6A8 second address: 8BF6AD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 917070 second address: 917080 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 jng 00007F41851B0BE6h 0x0000000d pushad 0x0000000e popad 0x0000000f pop esi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 917080 second address: 917093 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jl 00007F4184CD4C76h 0x0000000b jng 00007F4184CD4C76h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 91AB94 second address: 91AB9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 925F4F second address: 925F67 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F4184CD4C76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jne 00007F4184CD4C76h 0x00000011 jng 00007F4184CD4C76h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 925F67 second address: 925F72 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 je 00007F41851B0BE6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 925F72 second address: 925F7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 925F7B second address: 925F7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9240DF second address: 9240F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F4184CD4C7Eh 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 pop ebx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 924281 second address: 92429B instructions: 0x00000000 rdtsc 0x00000002 jg 00007F41851B0BE6h 0x00000008 jnc 00007F41851B0BE6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jo 00007F41851B0BE6h 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92429B second address: 92429F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9246BA second address: 9246BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9246BE second address: 9246D9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C87h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92590A second address: 925912 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 925912 second address: 925928 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jp 00007F4184CD4C7Eh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 925928 second address: 92592E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92592E second address: 925932 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 925932 second address: 925936 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 925936 second address: 92595C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4184CD4C7Dh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F4184CD4C81h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92749B second address: 92749F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92749F second address: 9274AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F4184CD4C76h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9274AB second address: 9274BE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BEEh 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9274BE second address: 9274D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F4184CD4C76h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 je 00007F4184CD4C76h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9274D6 second address: 9274DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9274DB second address: 9274E0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92D4FF second address: 92D50B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jng 00007F41851B0BE6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92C62E second address: 92C632 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92C632 second address: 92C644 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push esi 0x00000008 pop esi 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b jp 00007F41851B0BE6h 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92C936 second address: 92C946 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F4184CD4C7Bh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92C946 second address: 92C968 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push esi 0x00000007 pop esi 0x00000008 jns 00007F41851B0BE6h 0x0000000e push esi 0x0000000f pop esi 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F41851B0BEAh 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92C968 second address: 92C986 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C7Bh 0x00000007 jo 00007F4184CD4C76h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push ebx 0x00000010 jnp 00007F4184CD4C76h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92CB0B second address: 92CB11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92CB11 second address: 92CB20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jc 00007F4184CD4C76h 0x0000000d push edx 0x0000000e pop edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92CB20 second address: 92CB24 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92CB24 second address: 92CB2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92CB2F second address: 92CB3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 ja 00007F41851B0BE6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92CF18 second address: 92CF26 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F4184CD4C76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92CF26 second address: 92CF2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 92CF2C second address: 92CF54 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push esi 0x00000008 pop esi 0x00000009 pushad 0x0000000a popad 0x0000000b pop ebx 0x0000000c popad 0x0000000d push ecx 0x0000000e jmp 00007F4184CD4C85h 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9438AA second address: 9438BA instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jbe 00007F41851B0BE6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push esi 0x0000000d pushad 0x0000000e popad 0x0000000f pop esi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 943314 second address: 94332A instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F4184CD4C7Eh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 94332A second address: 943340 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BF0h 0x00000007 push eax 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 943340 second address: 943348 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 943348 second address: 94334C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 94334C second address: 943369 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 jmp 00007F4184CD4C80h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 943369 second address: 943373 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F41851B0BE6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 949817 second address: 949835 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F4184CD4C7Bh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 949835 second address: 949839 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 949839 second address: 94983F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 953925 second address: 95392A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 95354F second address: 953557 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 95636D second address: 956371 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 956371 second address: 956375 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 956375 second address: 956397 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F41851B0BE6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F41851B0BF4h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 956397 second address: 95639D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 95639D second address: 9563CA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BF9h 0x00000007 push ecx 0x00000008 push eax 0x00000009 pop eax 0x0000000a ja 00007F41851B0BE6h 0x00000010 pop ecx 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9563CA second address: 9563CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9563CE second address: 9563D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 955D42 second address: 955D60 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F4184CD4C89h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 95ACB8 second address: 95ACD6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F41851B0BEBh 0x00000009 jmp 00007F41851B0BEFh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9624A6 second address: 9624AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9624AA second address: 9624BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 jc 00007F41851B0BF0h 0x0000000d push ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96423C second address: 964242 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 964242 second address: 964246 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 964246 second address: 96424A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96424A second address: 964258 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007F41851B0C00h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 964258 second address: 964277 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4184CD4C84h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 964277 second address: 964292 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F41851B0BF6h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 968218 second address: 968231 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F4184CD4C80h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96808E second address: 9680A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jng 00007F41851B0BE8h 0x0000000e pushad 0x0000000f popad 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96CAEA second address: 96CAEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 96CAEE second address: 96CAF6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 970E3A second address: 970E3E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 970F8A second address: 970F9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jne 00007F41851B0BE6h 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 970F9B second address: 970FBA instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007F4184CD4C89h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 970FBA second address: 970FD6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007F41851B0BF3h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 974F8F second address: 974F95 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 974F95 second address: 974FD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 jmp 00007F41851B0BEFh 0x0000000c jmp 00007F41851B0BEBh 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 jmp 00007F41851B0BF2h 0x0000001a jbe 00007F41851B0BE6h 0x00000020 push ebx 0x00000021 pop ebx 0x00000022 push ecx 0x00000023 pop ecx 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 974FD7 second address: 974FE8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4184CD4C7Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 974FE8 second address: 974FF5 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F41851B0BE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 974FF5 second address: 975013 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4184CD4C88h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 97B6F7 second address: 97B74A instructions: 0x00000000 rdtsc 0x00000002 jne 00007F41851B0BFFh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007F41851B0BEBh 0x00000012 jmp 00007F41851B0BF2h 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 popad 0x0000001a pushad 0x0000001b jnc 00007F41851B0BE6h 0x00000021 pushad 0x00000022 popad 0x00000023 pushad 0x00000024 popad 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 97B74A second address: 97B74F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 98171C second address: 981720 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 981720 second address: 981726 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9862A8 second address: 9862D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 pop eax 0x00000008 jng 00007F41851B0C0Fh 0x0000000e push ecx 0x0000000f push eax 0x00000010 pop eax 0x00000011 jmp 00007F41851B0BF7h 0x00000016 pop ecx 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 986146 second address: 986165 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push edx 0x00000007 pop edx 0x00000008 pushad 0x00000009 popad 0x0000000a jo 00007F4184CD4C76h 0x00000010 jmp 00007F4184CD4C7Eh 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 986165 second address: 986176 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F41851B0BEDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 97E8FA second address: 97E900 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 97E900 second address: 97E904 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 97E904 second address: 97E931 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4184CD4C81h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b js 00007F4184CD4C8Ah 0x00000011 jmp 00007F4184CD4C7Eh 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 993156 second address: 993164 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F41851B0BE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 993164 second address: 993168 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 993168 second address: 99318E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BEEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ecx 0x0000000a pushad 0x0000000b jns 00007F41851B0BEEh 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 99318E second address: 993192 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 993192 second address: 9931A6 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F41851B0BE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jbe 00007F41851B0BE6h 0x00000012 push eax 0x00000013 pop eax 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9A6C84 second address: 9A6C97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4184CD4C7Ah 0x00000009 popad 0x0000000a pushad 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9A74C6 second address: 9A74E0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BF6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9A7629 second address: 9A7631 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9A91D5 second address: 9A91F0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jmp 00007F41851B0BF5h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9A91F0 second address: 9A9200 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jnp 00007F4184CD4C76h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9ABAAD second address: 9ABAB3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9ABE2E second address: 9ABE43 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9ABE43 second address: 9ABE69 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BF2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c push edx 0x0000000d jnc 00007F41851B0BECh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 9AD930 second address: 9AD94F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C85h 0x00000007 push eax 0x00000008 push edx 0x00000009 jns 00007F4184CD4C76h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D079D second address: 49D07AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F41851B0BECh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D07AD second address: 49D07C5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D07C5 second address: 49D07C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D07C9 second address: 49D07DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C7Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D07DB second address: 49D07E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D07E1 second address: 49D07E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D07E5 second address: 49D081B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BEDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007F41851B0BEEh 0x00000011 mov ebp, esp 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 jmp 00007F41851B0BEDh 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D081B second address: 49D0820 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0820 second address: 49D0825 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0825 second address: 49D082B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D082B second address: 49D083B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d mov eax, edi 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D083B second address: 49D0864 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F4184CD4C86h 0x00000008 mov ax, 53E1h 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov dword ptr [esp], ecx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0864 second address: 49D0868 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0868 second address: 49D0881 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C85h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0881 second address: 49D0966 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, edi 0x00000005 mov si, di 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F41851B0BF0h 0x00000013 jmp 00007F41851B0BF5h 0x00000018 popfd 0x00000019 pushad 0x0000001a mov ebx, eax 0x0000001c jmp 00007F41851B0BEAh 0x00000021 popad 0x00000022 popad 0x00000023 mov dword ptr [esp], esi 0x00000026 pushad 0x00000027 pushfd 0x00000028 jmp 00007F41851B0BEEh 0x0000002d jmp 00007F41851B0BF5h 0x00000032 popfd 0x00000033 pushfd 0x00000034 jmp 00007F41851B0BF0h 0x00000039 xor ecx, 5F0B1DF8h 0x0000003f jmp 00007F41851B0BEBh 0x00000044 popfd 0x00000045 popad 0x00000046 lea eax, dword ptr [ebp-04h] 0x00000049 pushad 0x0000004a jmp 00007F41851B0BF4h 0x0000004f pushad 0x00000050 mov dx, cx 0x00000053 pushfd 0x00000054 jmp 00007F41851B0BECh 0x00000059 or ecx, 07FB2788h 0x0000005f jmp 00007F41851B0BEBh 0x00000064 popfd 0x00000065 popad 0x00000066 popad 0x00000067 nop 0x00000068 push eax 0x00000069 push edx 0x0000006a jmp 00007F41851B0BF5h 0x0000006f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0966 second address: 49D096B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D096B second address: 49D097B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop eax 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D097B second address: 49D097F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D097F second address: 49D0985 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0985 second address: 49D09A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4184CD4C89h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D09A2 second address: 49D09A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D09A6 second address: 49D0A48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007F4184CD4C83h 0x00000010 adc si, 4F3Eh 0x00000015 jmp 00007F4184CD4C89h 0x0000001a popfd 0x0000001b pushfd 0x0000001c jmp 00007F4184CD4C80h 0x00000021 or esi, 35448C38h 0x00000027 jmp 00007F4184CD4C7Bh 0x0000002c popfd 0x0000002d popad 0x0000002e push dword ptr [ebp+08h] 0x00000031 push eax 0x00000032 push edx 0x00000033 pushad 0x00000034 mov esi, edx 0x00000036 pushfd 0x00000037 jmp 00007F4184CD4C87h 0x0000003c adc esi, 52B84EAEh 0x00000042 jmp 00007F4184CD4C89h 0x00000047 popfd 0x00000048 popad 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0A48 second address: 49D0A4E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0A4E second address: 49D0A52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0A52 second address: 49D0A56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0ADE second address: 49D0B40 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F4184CD4C81h 0x00000008 mov dx, ax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov eax, esi 0x00000010 pushad 0x00000011 mov ecx, 504C2DAFh 0x00000016 pushfd 0x00000017 jmp 00007F4184CD4C84h 0x0000001c adc ecx, 3490D4D8h 0x00000022 jmp 00007F4184CD4C7Bh 0x00000027 popfd 0x00000028 popad 0x00000029 pop esi 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007F4184CD4C85h 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0B40 second address: 49C003A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F41851B0BF7h 0x00000009 and cx, 54FEh 0x0000000e jmp 00007F41851B0BF9h 0x00000013 popfd 0x00000014 jmp 00007F41851B0BF0h 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c leave 0x0000001d pushad 0x0000001e push eax 0x0000001f push edx 0x00000020 pop eax 0x00000021 pop edx 0x00000022 mov ax, CCC5h 0x00000026 popad 0x00000027 retn 0004h 0x0000002a nop 0x0000002b sub esp, 04h 0x0000002e xor ebx, ebx 0x00000030 cmp eax, 00000000h 0x00000033 je 00007F41851B0D4Fh 0x00000039 mov dword ptr [esp], 0000000Dh 0x00000040 call 00007F4189481CA5h 0x00000045 mov edi, edi 0x00000047 jmp 00007F41851B0BF2h 0x0000004c xchg eax, ebp 0x0000004d pushad 0x0000004e mov cx, A7DDh 0x00000052 movzx esi, di 0x00000055 popad 0x00000056 push eax 0x00000057 push eax 0x00000058 push edx 0x00000059 pushad 0x0000005a call 00007F41851B0BF1h 0x0000005f pop ecx 0x00000060 mov edx, 32B02814h 0x00000065 popad 0x00000066 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C003A second address: 49C0097 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx ecx, bx 0x00000006 pushfd 0x00000007 jmp 00007F4184CD4C85h 0x0000000c sbb ah, FFFFFF86h 0x0000000f jmp 00007F4184CD4C81h 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 xchg eax, ebp 0x00000019 jmp 00007F4184CD4C7Eh 0x0000001e mov ebp, esp 0x00000020 jmp 00007F4184CD4C80h 0x00000025 sub esp, 2Ch 0x00000028 pushad 0x00000029 push eax 0x0000002a push edx 0x0000002b pushad 0x0000002c popad 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0097 second address: 49C00DA instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F41851B0BEAh 0x00000008 or esi, 681FA488h 0x0000000e jmp 00007F41851B0BEBh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 jmp 00007F41851B0BF8h 0x0000001b popad 0x0000001c xchg eax, ebx 0x0000001d pushad 0x0000001e movzx eax, dx 0x00000021 push eax 0x00000022 push edx 0x00000023 mov bh, 97h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C00DA second address: 49C00DE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C00DE second address: 49C012C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 mov bl, 85h 0x0000000b push eax 0x0000000c pushfd 0x0000000d jmp 00007F41851B0BEFh 0x00000012 xor cx, 6EDEh 0x00000017 jmp 00007F41851B0BF9h 0x0000001c popfd 0x0000001d pop ecx 0x0000001e popad 0x0000001f xchg eax, ebx 0x00000020 pushad 0x00000021 call 00007F41851B0BEDh 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0186 second address: 49C018C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C018C second address: 49C0229 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub ebx, ebx 0x0000000b pushad 0x0000000c push edi 0x0000000d mov ah, 4Bh 0x0000000f pop edx 0x00000010 pushfd 0x00000011 jmp 00007F41851B0BF4h 0x00000016 jmp 00007F41851B0BF5h 0x0000001b popfd 0x0000001c popad 0x0000001d sub edi, edi 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 pushfd 0x00000023 jmp 00007F41851B0BF8h 0x00000028 add si, D9E8h 0x0000002d jmp 00007F41851B0BEBh 0x00000032 popfd 0x00000033 pushfd 0x00000034 jmp 00007F41851B0BF8h 0x00000039 adc ax, 6C48h 0x0000003e jmp 00007F41851B0BEBh 0x00000043 popfd 0x00000044 popad 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0229 second address: 49C02B0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 inc ebx 0x0000000a pushad 0x0000000b call 00007F4184CD4C7Ch 0x00000010 movzx eax, dx 0x00000013 pop edx 0x00000014 pushfd 0x00000015 jmp 00007F4184CD4C7Ch 0x0000001a jmp 00007F4184CD4C85h 0x0000001f popfd 0x00000020 popad 0x00000021 test al, al 0x00000023 pushad 0x00000024 mov al, 58h 0x00000026 mov cx, dx 0x00000029 popad 0x0000002a je 00007F4184CD4DF0h 0x00000030 jmp 00007F4184CD4C7Bh 0x00000035 lea ecx, dword ptr [ebp-14h] 0x00000038 push eax 0x00000039 push edx 0x0000003a jmp 00007F4184CD4C85h 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C02B0 second address: 49C02B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C02B6 second address: 49C02BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C03A6 second address: 49C03B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F41851B0BEEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C03B8 second address: 49C03BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C03BC second address: 49C03FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jne 00007F41F673ECBDh 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007F41851B0BEDh 0x00000015 jmp 00007F41851B0BEBh 0x0000001a popfd 0x0000001b call 00007F41851B0BF8h 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C03FF second address: 49C0428 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 mov ebx, dword ptr [ebp+08h] 0x00000009 jmp 00007F4184CD4C87h 0x0000000e lea eax, dword ptr [ebp-2Ch] 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov dl, D8h 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0428 second address: 49C0440 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F41851B0BF4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0440 second address: 49C0444 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0444 second address: 49C046E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007F41851B0BEAh 0x00000010 sbb esi, 461F7FE8h 0x00000016 jmp 00007F41851B0BEBh 0x0000001b popfd 0x0000001c push eax 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C046E second address: 49C04ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 mov dword ptr [esp], esi 0x00000009 pushad 0x0000000a push ecx 0x0000000b push edx 0x0000000c pop eax 0x0000000d pop edx 0x0000000e pushfd 0x0000000f jmp 00007F4184CD4C86h 0x00000014 and cx, 9D78h 0x00000019 jmp 00007F4184CD4C7Bh 0x0000001e popfd 0x0000001f popad 0x00000020 nop 0x00000021 jmp 00007F4184CD4C86h 0x00000026 push eax 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a mov edi, ecx 0x0000002c pushfd 0x0000002d jmp 00007F4184CD4C88h 0x00000032 sbb ax, 8238h 0x00000037 jmp 00007F4184CD4C7Bh 0x0000003c popfd 0x0000003d popad 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C04ED second address: 49C0513 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, FA5Ah 0x00000007 mov cl, bh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d jmp 00007F41851B0BEAh 0x00000012 xchg eax, ebx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F41851B0BEAh 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0513 second address: 49C0522 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0522 second address: 49C0571 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov ax, 2D79h 0x00000011 pushfd 0x00000012 jmp 00007F41851B0BF6h 0x00000017 sub ecx, 7180F088h 0x0000001d jmp 00007F41851B0BEBh 0x00000022 popfd 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0571 second address: 49C059B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov edi, 7EAF057Eh 0x00000012 mov ax, dx 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C05C8 second address: 49B0C1F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, di 0x00000006 pushfd 0x00000007 jmp 00007F41851B0BEDh 0x0000000c or ecx, 2D4B3916h 0x00000012 jmp 00007F41851B0BF1h 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b test esi, esi 0x0000001d jmp 00007F41851B0BEEh 0x00000022 je 00007F41F673EC34h 0x00000028 xor eax, eax 0x0000002a jmp 00007F418518A31Ah 0x0000002f pop esi 0x00000030 pop edi 0x00000031 pop ebx 0x00000032 leave 0x00000033 retn 0004h 0x00000036 nop 0x00000037 sub esp, 04h 0x0000003a mov esi, eax 0x0000003c cmp esi, 00000000h 0x0000003f setne al 0x00000042 xor ebx, ebx 0x00000044 test al, 01h 0x00000046 jne 00007F41851B0BE7h 0x00000048 jmp 00007F41851B0D23h 0x0000004d call 00007F4189472758h 0x00000052 mov edi, edi 0x00000054 push eax 0x00000055 push edx 0x00000056 jmp 00007F41851B0BEEh 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49B0C1F second address: 49B0C6E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F4184CD4C81h 0x00000009 xor eax, 08AEE5B6h 0x0000000f jmp 00007F4184CD4C81h 0x00000014 popfd 0x00000015 mov bx, ax 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b xchg eax, ebp 0x0000001c jmp 00007F4184CD4C7Ah 0x00000021 push eax 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007F4184CD4C7Eh 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49B0C6E second address: 49B0C8F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007F41851B0BEBh 0x00000012 mov edx, eax 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49B0C8F second address: 49B0CB9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C85h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F4184CD4C7Dh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49B0CB9 second address: 49B0CD5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov al, bl 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F41851B0BF1h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49B0CD5 second address: 49B0D43 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F4184CD4C87h 0x00000009 sbb eax, 5155A86Eh 0x0000000f jmp 00007F4184CD4C89h 0x00000014 popfd 0x00000015 mov ebx, esi 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b jmp 00007F4184CD4C7Dh 0x00000020 xchg eax, ecx 0x00000021 pushad 0x00000022 mov cx, 9E83h 0x00000026 popad 0x00000027 mov dword ptr [ebp-04h], 55534552h 0x0000002e push eax 0x0000002f push edx 0x00000030 jmp 00007F4184CD4C80h 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C09B7 second address: 49C09D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 call 00007F41851B0BECh 0x0000000a mov edx, eax 0x0000000c pop ecx 0x0000000d popad 0x0000000e mov ebp, esp 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 mov bx, cx 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C09D7 second address: 49C09FA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, bx 0x00000006 movsx ebx, cx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c cmp dword ptr [75FA459Ch], 05h 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F4184CD4C7Ch 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C09FA second address: 49C0A09 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0A09 second address: 49C0A21 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4184CD4C84h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0A21 second address: 49C0A3E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b je 00007F41F672EBB3h 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0A3E second address: 49C0A42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0A42 second address: 49C0A48 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0AB3 second address: 49C0AB9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0AB9 second address: 49C0ABF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0ABF second address: 49C0AC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0AC3 second address: 49C0AEA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BF1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [eax] 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F41851B0BECh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0AEA second address: 49C0B47 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4184CD4C7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d pushad 0x0000000e movsx edi, si 0x00000011 mov ax, AB87h 0x00000015 popad 0x00000016 pop eax 0x00000017 jmp 00007F4184CD4C7Ah 0x0000001c call 00007F41F6259CD7h 0x00000021 push 75F42B70h 0x00000026 push dword ptr fs:[00000000h] 0x0000002d mov eax, dword ptr [esp+10h] 0x00000031 mov dword ptr [esp+10h], ebp 0x00000035 lea ebp, dword ptr [esp+10h] 0x00000039 sub esp, eax 0x0000003b push ebx 0x0000003c push esi 0x0000003d push edi 0x0000003e mov eax, dword ptr [75FA4538h] 0x00000043 xor dword ptr [ebp-04h], eax 0x00000046 xor eax, ebp 0x00000048 push eax 0x00000049 mov dword ptr [ebp-18h], esp 0x0000004c push dword ptr [ebp-08h] 0x0000004f mov eax, dword ptr [ebp-04h] 0x00000052 mov dword ptr [ebp-04h], FFFFFFFEh 0x00000059 mov dword ptr [ebp-08h], eax 0x0000005c lea eax, dword ptr [ebp-10h] 0x0000005f mov dword ptr fs:[00000000h], eax 0x00000065 ret 0x00000066 pushad 0x00000067 mov ebx, eax 0x00000069 call 00007F4184CD4C7Ah 0x0000006e mov esi, 24367481h 0x00000073 pop ecx 0x00000074 popad 0x00000075 mov esi, 00000000h 0x0000007a push eax 0x0000007b push edx 0x0000007c push eax 0x0000007d push edx 0x0000007e jmp 00007F4184CD4C84h 0x00000083 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0B47 second address: 49C0B4D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0B4D second address: 49C0B53 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0B53 second address: 49C0B6B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [ebp-1Ch], esi 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F41851B0BEBh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49C0C07 second address: 49C0C0D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0BBC second address: 49D0C68 instructions: 0x00000000 rdtsc 0x00000002 movzx esi, di 0x00000005 pop edx 0x00000006 pop eax 0x00000007 movsx edi, ax 0x0000000a popad 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F41851B0BF0h 0x00000013 sub esi, 4EBCAFE8h 0x00000019 jmp 00007F41851B0BEBh 0x0000001e popfd 0x0000001f pushfd 0x00000020 jmp 00007F41851B0BF8h 0x00000025 or cl, 00000048h 0x00000028 jmp 00007F41851B0BEBh 0x0000002d popfd 0x0000002e popad 0x0000002f mov ebp, esp 0x00000031 pushad 0x00000032 mov eax, 34DFDEDBh 0x00000037 pushfd 0x00000038 jmp 00007F41851B0BF0h 0x0000003d or ah, FFFFFFA8h 0x00000040 jmp 00007F41851B0BEBh 0x00000045 popfd 0x00000046 popad 0x00000047 xchg eax, esi 0x00000048 push eax 0x00000049 push edx 0x0000004a pushad 0x0000004b call 00007F41851B0BEBh 0x00000050 pop ecx 0x00000051 jmp 00007F41851B0BF9h 0x00000056 popad 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0C68 second address: 49D0C72 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, 2FE37D02h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0C72 second address: 49D0C9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 jmp 00007F41851B0BF4h 0x0000000e push esi 0x0000000f push edi 0x00000010 pop ecx 0x00000011 pop edx 0x00000012 popad 0x00000013 xchg eax, esi 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0C9B second address: 49D0C9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0C9F second address: 49D0CA3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0CA3 second address: 49D0CA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0CA9 second address: 49D0CC1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esi, dword ptr [ebp+0Ch] 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0CC1 second address: 49D0CC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov ch, bh 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0CC8 second address: 49D0CCE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0CCE second address: 49D0D61 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test esi, esi 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F4184CD4C89h 0x00000011 xor ch, 00000046h 0x00000014 jmp 00007F4184CD4C81h 0x00000019 popfd 0x0000001a mov dx, ax 0x0000001d popad 0x0000001e je 00007F41F6242321h 0x00000024 jmp 00007F4184CD4C7Ah 0x00000029 cmp dword ptr [75FA459Ch], 05h 0x00000030 jmp 00007F4184CD4C80h 0x00000035 je 00007F41F625A3DAh 0x0000003b jmp 00007F4184CD4C80h 0x00000040 xchg eax, esi 0x00000041 jmp 00007F4184CD4C80h 0x00000046 push eax 0x00000047 push eax 0x00000048 push edx 0x00000049 push eax 0x0000004a push edx 0x0000004b push eax 0x0000004c push edx 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0D61 second address: 49D0D65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0D65 second address: 49D0D69 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0D69 second address: 49D0D6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0D6F second address: 49D0D75 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0D75 second address: 49D0D79 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0D79 second address: 49D0D88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0D88 second address: 49D0D9E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F41851B0BF2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0DCA second address: 49D0E38 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, si 0x00000006 mov ebx, ecx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c pushad 0x0000000d mov esi, 2904BE57h 0x00000012 pushad 0x00000013 jmp 00007F4184CD4C7Ah 0x00000018 pushfd 0x00000019 jmp 00007F4184CD4C82h 0x0000001e xor esi, 69DB69F8h 0x00000024 jmp 00007F4184CD4C7Bh 0x00000029 popfd 0x0000002a popad 0x0000002b popad 0x0000002c push eax 0x0000002d jmp 00007F4184CD4C89h 0x00000032 xchg eax, esi 0x00000033 push eax 0x00000034 push edx 0x00000035 jmp 00007F4184CD4C7Dh 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 49D0E38 second address: 49D0E3E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |