Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:27060 |
Source: file.exe, 00000000.00000003.1100429335.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: file.exe, 00000000.00000003.1100429335.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: file.exe, 00000000.00000003.1169272115.00000000011A8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169392611.00000000011BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169350686.00000000011AA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.microsoft. |
Source: file.exe, 00000000.00000003.1100429335.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: file.exe, 00000000.00000003.1100429335.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: file.exe, 00000000.00000003.1100429335.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: file.exe, 00000000.00000003.1100429335.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: file.exe, 00000000.00000003.1100429335.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: file.exe, 00000000.00000003.1100429335.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: file.exe, 00000000.00000003.1100429335.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: file.exe, 00000000.00000003.1322651471.0000000005B2C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B14000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1100179520.000000000123E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1245252856.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B18000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076218654.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967308864.000000000118D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322651471.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163199247.000000000123D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: file.exe, 00000000.00000003.1047110900.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047476865.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047261962.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047315391.0000000005AC3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/p |
Source: file.exe, 00000000.00000003.1322651471.0000000005B2C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B14000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1100179520.000000000123E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1245252856.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B18000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076218654.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967308864.000000000118D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322651471.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163199247.000000000123D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: file.exe, 00000000.00000003.1322651471.0000000005B2C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B14000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1100179520.000000000123E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1245252856.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B18000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076218654.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967308864.000000000118D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047110900.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047476865.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322651471.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047261962.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047315391.0000000005AC3000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349818035.000000000120A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: file.exe, 00000000.00000003.1100429335.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: file.exe, 00000000.00000003.1100429335.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: file.exe, 00000000.00000003.994764200.0000000005B0B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org?q= |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://api.steampowered.com/ |
Source: file.exe, 00000000.00000003.1047110900.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047476865.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1048118715.0000000005ACC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047261962.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047315391.0000000005AC3000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1048880161.0000000005ACC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158f |
Source: file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://broadcast.st.dl.eccdnx.com |
Source: file.exe, 00000000.00000003.994764200.0000000005B0B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/ |
Source: file.exe, 00000000.00000003.994764200.0000000005B0B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: file.exe, 00000000.00000003.994764200.0000000005B0B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://checkout.steampowered.com/ |
Source: file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.f |
Source: file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fa |
Source: file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fast |
Source: file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastl |
Source: file.exe, 00000000.00000003.1047642823.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1048923308.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047199578.0000000005AA6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastlC |
Source: file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastlG |
Source: file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly |
Source: file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly. |
Source: file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamsD |
Source: file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic. |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/ |
Source: file.exe, 00000000.00000002.1352044644.0000000005B14000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1245252856.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076218654.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967308864.000000000118D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047110900.0000000005AB3000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322651471.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=J1-T6FXbrr0Z&a |
Source: file.exe, 00000000.00000003.1166622128.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1167329534.0000000005B05000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322905656.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1228434054.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348387143.000000000120C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349797667.0000000001204000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163504014.0000000005AB9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=GlKQ1cghJWE2&l=english&_c |
Source: file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349797667.0000000001204000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap& |
Source: file.exe, 00000000.00000003.1166622128.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1167329534.0000000005B05000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1228434054.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163504014.0000000005AB9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/fatalerror.css?v=OFUqlcDNiD6y&l=engli |
Source: file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349797667.0000000001204000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163504014.0000000005AB9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349797667.0000000001204000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng |
Source: file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322905656.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348387143.000000000120C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349797667.0000000001204000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis |
Source: file.exe, 00000000.00000002.1352044644.0000000005B14000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076218654.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967308864.000000000118D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047110900.0000000005AB3000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047110900.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047476865.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322651471.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047261962.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047315391.0000000005AC3000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif |
Source: file.exe, 00000000.00000003.1322651471.0000000005B2C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B14000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1100179520.000000000123E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1245252856.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B18000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076218654.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967308864.000000000118D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047110900.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047476865.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322651471.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047261962.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047315391.0000000005AC3000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: file.exe, 00000000.00000002.1352044644.0000000005B14000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1245252856.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076218654.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967308864.000000000118D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047110900.0000000005AB3000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322651471.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: file.exe, 00000000.00000002.1352044644.0000000005B14000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1245252856.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076218654.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967308864.000000000118D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047110900.0000000005AB3000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322651471.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=jfdbROVe |
Source: file.exe, 00000000.00000002.1352044644.0000000005B14000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1245252856.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076218654.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967308864.000000000118D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047110900.0000000005AB3000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322651471.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=39xC |
Source: file.exe, 00000000.00000003.1166622128.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1167329534.0000000005B05000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1228434054.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047642823.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1048923308.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047199578.0000000005AA6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163504014.0000000005AB9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=cMt-H-zOgNUp&l=english&am |
Source: file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQH |
Source: file.exe, 00000000.00000003.1166622128.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1167329534.0000000005B05000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1228434054.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047642823.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1048923308.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047199578.0000000005AA6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163504014.0000000005AB9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047642823.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1048923308.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047199578.0000000005AA6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl |
Source: file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047642823.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1048923308.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047199578.0000000005AA6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a |
Source: file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047642823.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1048923308.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047199578.0000000005AA6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a |
Source: file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en |
Source: file.exe, 00000000.00000003.1166622128.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1167329534.0000000005B05000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1228434054.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e |
Source: file.exe, 00000000.00000003.1322905656.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348387143.000000000120C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v |
Source: file.exe, 00000000.00000003.1166622128.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1167329534.0000000005B05000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1228434054.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047642823.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1048923308.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047199578.0000000005AA6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=whw8EcafG167&l=e |
Source: file.exe, 00000000.00000003.1322905656.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348387143.000000000120C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/ |
Source: file.exe, 00000000.00000003.1322905656.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/ |
Source: file.exe, 00000000.00000003.1166622128.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1167329534.0000000005B05000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322905656.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1228434054.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348387143.000000000120C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349797667.0000000001204000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163504014.0000000005AB9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: file.exe, 00000000.00000003.1047315391.0000000005ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047220528.0000000005ACF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_s |
Source: file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348387143.000000000120C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349797667.0000000001204000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163504014.0000000005AB9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=Eq36AUaEgab8&l=en |
Source: file.exe, 00000000.00000003.1166622128.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1167329534.0000000005B05000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1228434054.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349797667.0000000001204000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163504014.0000000005AB9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349818035.000000000120A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349818035.000000000120A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: file.exe, 00000000.00000003.1166622128.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1167329534.0000000005B05000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322905656.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1228434054.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047642823.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1048923308.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047199578.0000000005AA6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348387143.000000000120C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: file.exe, 00000000.00000003.1166622128.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1167329534.0000000005B05000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1228434054.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047642823.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1048923308.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047199578.0000000005AA6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=PCCoCNLxwF4M&am |
Source: file.exe, 00000000.00000003.1166622128.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1167329534.0000000005B05000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1228434054.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: file.exe, 00000000.00000003.1166622128.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1167329534.0000000005B05000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1228434054.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B0A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047642823.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1048923308.0000000005AA8000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047199578.0000000005AA6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B02000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227779678.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: file.exe, 00000000.00000003.994764200.0000000005B0B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: file.exe, 00000000.00000003.994764200.0000000005B0B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtabv20 |
Source: file.exe, 00000000.00000003.994764200.0000000005B0B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: file.exe, 00000000.00000003.994764200.0000000005B0B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://gemini.google.com/app?q= |
Source: file.exe, 00000000.00000003.1348723372.000000000122B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1272099593.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348387143.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348701843.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349905815.000000000122C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295116371.000000000122B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://guntac.bet/ |
Source: file.exe, 00000000.00000003.1348723372.000000000122B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1272099593.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348387143.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348701843.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349905815.000000000122C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295116371.000000000122B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://guntac.bet/2$ |
Source: file.exe, 00000000.00000003.1348723372.000000000122B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348387143.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348701843.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349905815.000000000122C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://guntac.bet/4$ |
Source: file.exe, 00000000.00000003.1348723372.000000000122B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1272099593.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322997431.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348387143.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348701843.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349905815.000000000122C000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295116371.000000000122B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://guntac.bet/H$ |
Source: file.exe, 00000000.00000003.1348701843.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295029623.00000000011AB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047261962.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349797667.0000000001204000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349760361.00000000011BD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://guntac.bet/bSHsyZD |
Source: file.exe, 00000000.00000003.1348478286.00000000011AD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348633206.00000000011BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349760361.00000000011BD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://guntac.bet/bSHsyZDF |
Source: file.exe, 00000000.00000003.1047476865.0000000005AAB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047110900.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047261962.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://guntac.bet/bSHsyZDT |
Source: file.exe, 00000000.00000003.1169203308.0000000001210000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.st |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/ |
Source: file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163504014.0000000005AB9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.steampowered.com/ |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lv.queniujq.cn |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://medal.tv |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://player.vimeo.com |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://recaptcha.net/recaptcha/; |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://s.ytimg.com; |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://sketchfab.com |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steam.tv/ |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast-test.akamaized.net |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcast.akamaized.net |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steambroadcastchat.akamaized.net |
Source: file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcomm._; |
Source: file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com |
Source: file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163504014.0000000005AB9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163504014.0000000005AB9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: file.exe, 00000000.00000003.1295137716.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1272099593.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349862759.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322997431.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348387143.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348701843.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169203308.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1245526492.0000000001222000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/e |
Source: file.exe, 00000000.00000003.1322651471.0000000005B2C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B14000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1100179520.000000000123E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1245252856.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B18000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076218654.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967308864.000000000118D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047110900.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047476865.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322651471.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047261962.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047315391.0000000005AC3000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199822375128 |
Source: file.exe, 00000000.00000003.1169203308.0000000001222000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/m |
Source: file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163504014.0000000005AB9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349818035.000000000120A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: file.exe, 00000000.00000003.1047110900.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047476865.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047261962.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047315391.0000000005AC3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles |
Source: file.exe, file.exe, 00000000.00000003.1295137716.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1272099593.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1323025095.00000000011AC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349862759.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322997431.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348387143.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348701843.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163644722.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.967308864.0000000001193000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1245526492.0000000001222000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199822375128 |
Source: file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199822375128$0 |
Source: file.exe, 00000000.00000003.967308864.0000000001193000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199822375128-oP |
Source: file.exe, 00000000.00000002.1352044644.0000000005B14000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076218654.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967308864.000000000118D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047110900.0000000005AB3000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047110900.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047476865.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322651471.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348596402.0000000005C03000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1048118715.0000000005ACC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047261962.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047315391.0000000005AC3000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1048880161.0000000005ACC000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199822375128/badges |
Source: file.exe, file.exe, 00000000.00000002.1352044644.0000000005B14000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1100179520.000000000123E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076218654.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1323025095.00000000011AC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348478286.00000000011AD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322651471.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348633206.00000000011BC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295029623.00000000011AB000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349760361.00000000011BD000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163199247.000000000123D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199822375128/inventory/ |
Source: file.exe, 00000000.00000003.1227604567.0000000001222000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199822375128E |
Source: file.exe, 00000000.00000003.1322997431.0000000001222000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199822375128m |
Source: file.exe, 00000000.00000003.1169272115.00000000011A8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169350686.00000000011AA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ro(( |
Source: file.exe, 00000000.00000003.1295137716.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1272099593.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322997431.0000000001222000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1245526492.0000000001222000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/u |
Source: file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163504014.0000000005AB9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamloopback.host |
Source: file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.s |
Source: file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steam |
Source: file.exe | String found in binary or memory: https://store.steampowe |
Source: file.exe, 00000000.00000003.1169252310.0000000001201000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.c |
Source: file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: file.exe, file.exe, 00000000.00000003.1165147720.0000000005ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1323025095.00000000011AC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AD4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047199578.0000000005AA6000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1100659516.0000000005AD3000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1271711124.0000000005ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169272115.0000000001193000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1351974237.0000000005ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322829829.0000000005ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967353527.00000000011CF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169083027.0000000005ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076319740.0000000005AB1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1245252856.0000000005ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1348330462.0000000005ACF000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/; |
Source: file.exe, 00000000.00000003.1323025095.00000000011AC000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1169272115.0000000001193000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076319740.0000000005AB1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/;X-Frame-OptionsSAMEORIGINPersistent-AuthWWW-AuthenticateVarysteamCou |
Source: file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163504014.0000000005AB9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: file.exe, 00000000.00000003.1322651471.0000000005B2C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B14000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1100179520.000000000123E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1245252856.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B18000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005AB4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076218654.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967308864.000000000118D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047110900.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047476865.0000000005ACA000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1322651471.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1295004953.0000000001201000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047261962.0000000005AC1000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047315391.0000000005AC3000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349818035.000000000120A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349818035.000000000120A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349818035.000000000120A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: file.exe, 00000000.00000003.1348614310.0000000001208000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227604567.0000000001210000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163055639.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1349818035.000000000120A000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: file.exe, 00000000.00000003.1101696075.0000000005BC6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: file.exe, 00000000.00000003.1101696075.0000000005BC6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: file.exe, 00000000.00000003.994764200.0000000005B0B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/v20 |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com |
Source: file.exe, 00000000.00000003.994764200.0000000005B0B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/recaptcha/ |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.cn/recaptcha/ |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.gstatic.com/recaptcha/ |
Source: file.exe, 00000000.00000003.1101696075.0000000005BC6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.jXqaKJMO4ZEP |
Source: file.exe, 00000000.00000003.1101696075.0000000005BC6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.NYz0wxyUaYSW |
Source: file.exe, 00000000.00000003.1101696075.0000000005BC6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/gro.allizom.www.d |
Source: file.exe, 00000000.00000003.1101696075.0000000005BC6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: file.exe, 00000000.00000003.1101696075.0000000005BC6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: file.exe, 00000000.00000003.1322651471.0000000005B2C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.1352044644.0000000005B14000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1245252856.0000000005B10000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005B18000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163181143.0000000005AB0000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1227405938.0000000005AB7000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047110900.0000000005AB3000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1163029494.0000000005B53000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076091419.0000000005ABB000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000003.967240912.0000000001207000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1076199595.0000000001236000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1047076826.0000000005AD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com |
Source: file.exe, 00000000.00000003.967271913.00000000011BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.youtube.com/ |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5062F6 second address: 505AC4 instructions: 0x00000000 rdtsc 0x00000002 je 00007FF154E37328h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f jmp 00007FF154E3732Bh 0x00000014 pop eax 0x00000015 pushad 0x00000016 pushad 0x00000017 popad 0x00000018 jno 00007FF154E37326h 0x0000001e popad 0x0000001f popad 0x00000020 nop 0x00000021 jmp 00007FF154E37337h 0x00000026 jns 00007FF154E37332h 0x0000002c push dword ptr [ebp+122D0B0Dh] 0x00000032 sub dword ptr [ebp+122D1CEAh], ebx 0x00000038 call dword ptr [ebp+122D1CA4h] 0x0000003e pushad 0x0000003f js 00007FF154E37332h 0x00000045 xor eax, eax 0x00000047 jns 00007FF154E3733Bh 0x0000004d mov edx, dword ptr [esp+28h] 0x00000051 jmp 00007FF154E37331h 0x00000056 mov dword ptr [ebp+122D38BEh], eax 0x0000005c mov dword ptr [ebp+122D22D7h], eax 0x00000062 mov esi, 0000003Ch 0x00000067 add dword ptr [ebp+122D1D6Dh], ebx 0x0000006d add esi, dword ptr [esp+24h] 0x00000071 je 00007FF154E3732Eh 0x00000077 jng 00007FF154E37328h 0x0000007d pushad 0x0000007e popad 0x0000007f lodsw 0x00000081 jmp 00007FF154E37337h 0x00000086 add eax, dword ptr [esp+24h] 0x0000008a mov dword ptr [ebp+122D22D7h], edi 0x00000090 mov ebx, dword ptr [esp+24h] 0x00000094 sub dword ptr [ebp+122D22D7h], edx 0x0000009a nop 0x0000009b push eax 0x0000009c push edx 0x0000009d jmp 00007FF154E37339h 0x000000a2 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 505AC4 second address: 505AE2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E32A4Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jnp 00007FF154E32A54h 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 684839 second address: 68483F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 68483F second address: 684844 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 668111 second address: 668117 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 68397B second address: 683998 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FF154E32A46h 0x0000000a jmp 00007FF154E32A4Ch 0x0000000f popad 0x00000010 pop edx 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 683998 second address: 68399E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 68399E second address: 6839A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 683B14 second address: 683B3E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E3732Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a jmp 00007FF154E37337h 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 683B3E second address: 683B44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 683C92 second address: 683C9C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 683F33 second address: 683F38 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 683F38 second address: 683F3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 68407D second address: 684085 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 687070 second address: 505AC4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 add dword ptr [esp], 7670F129h 0x0000000e mov edx, dword ptr [ebp+122D39C2h] 0x00000014 push dword ptr [ebp+122D0B0Dh] 0x0000001a call dword ptr [ebp+122D1CA4h] 0x00000020 pushad 0x00000021 js 00007FF154E37332h 0x00000027 xor eax, eax 0x00000029 jns 00007FF154E3733Bh 0x0000002f mov edx, dword ptr [esp+28h] 0x00000033 jmp 00007FF154E37331h 0x00000038 mov dword ptr [ebp+122D38BEh], eax 0x0000003e mov dword ptr [ebp+122D22D7h], eax 0x00000044 mov esi, 0000003Ch 0x00000049 add dword ptr [ebp+122D1D6Dh], ebx 0x0000004f add esi, dword ptr [esp+24h] 0x00000053 je 00007FF154E3732Eh 0x00000059 jng 00007FF154E37328h 0x0000005f pushad 0x00000060 popad 0x00000061 lodsw 0x00000063 jmp 00007FF154E37337h 0x00000068 add eax, dword ptr [esp+24h] 0x0000006c mov dword ptr [ebp+122D22D7h], edi 0x00000072 mov ebx, dword ptr [esp+24h] 0x00000076 sub dword ptr [ebp+122D22D7h], edx 0x0000007c nop 0x0000007d push eax 0x0000007e push edx 0x0000007f jmp 00007FF154E37339h 0x00000084 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6870C1 second address: 6870C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6872EC second address: 6872F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 687392 second address: 6873A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF154E32A4Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6873A4 second address: 6873A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6873A8 second address: 6873F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b mov ch, 11h 0x0000000d push 00000000h 0x0000000f mov cx, dx 0x00000012 call 00007FF154E32A49h 0x00000017 jmp 00007FF154E32A4Dh 0x0000001c push eax 0x0000001d jmp 00007FF154E32A53h 0x00000022 mov eax, dword ptr [esp+04h] 0x00000026 je 00007FF154E32A54h 0x0000002c push eax 0x0000002d push edx 0x0000002e pushad 0x0000002f popad 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6873F2 second address: 687476 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FF154E37326h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [eax] 0x0000000c push edi 0x0000000d pushad 0x0000000e jmp 00007FF154E3732Ah 0x00000013 jg 00007FF154E37326h 0x00000019 popad 0x0000001a pop edi 0x0000001b mov dword ptr [esp+04h], eax 0x0000001f jmp 00007FF154E3732Fh 0x00000024 pop eax 0x00000025 mov cl, bh 0x00000027 push 00000003h 0x00000029 mov esi, dword ptr [ebp+122D3906h] 0x0000002f mov ecx, 624FB782h 0x00000034 push 00000000h 0x00000036 pushad 0x00000037 sub dword ptr [ebp+122D18ACh], edi 0x0000003d mov eax, edx 0x0000003f popad 0x00000040 push 00000003h 0x00000042 sub ch, FFFFFFC9h 0x00000045 call 00007FF154E37329h 0x0000004a jmp 00007FF154E3732Ch 0x0000004f push eax 0x00000050 jmp 00007FF154E37331h 0x00000055 mov eax, dword ptr [esp+04h] 0x00000059 push eax 0x0000005a push edx 0x0000005b push esi 0x0000005c push eax 0x0000005d push edx 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 687476 second address: 68747B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 68747B second address: 68749E instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a jmp 00007FF154E3732Ch 0x0000000f mov dword ptr [esp+04h], eax 0x00000013 jo 00007FF154E3732Eh 0x00000019 push esi 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 68749E second address: 687511 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop eax 0x00000006 push 00000000h 0x00000008 push ebx 0x00000009 call 00007FF154E32A48h 0x0000000e pop ebx 0x0000000f mov dword ptr [esp+04h], ebx 0x00000013 add dword ptr [esp+04h], 00000018h 0x0000001b inc ebx 0x0000001c push ebx 0x0000001d ret 0x0000001e pop ebx 0x0000001f ret 0x00000020 add dword ptr [ebp+122D1D4Bh], edx 0x00000026 add edi, 1E064C2Fh 0x0000002c lea ebx, dword ptr [ebp+12454FB1h] 0x00000032 cld 0x00000033 jg 00007FF154E32A5Ch 0x00000039 xchg eax, ebx 0x0000003a push eax 0x0000003b push edx 0x0000003c pushad 0x0000003d push edi 0x0000003e pop edi 0x0000003f jmp 00007FF154E32A57h 0x00000044 popad 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 698C42 second address: 698C48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A6573 second address: 6A657D instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FF154E32A46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A657D second address: 6A6582 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A6A44 second address: 6A6A63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 jmp 00007FF154E32A58h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A6A63 second address: 6A6A78 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FF154E3732Eh 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A6BF2 second address: 6A6BF8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A6DD6 second address: 6A6DE6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007FF154E37326h 0x0000000a je 00007FF154E37326h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A6F89 second address: 6A6F93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A6F93 second address: 6A6FC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 jnp 00007FF154E37326h 0x0000000c jmp 00007FF154E37339h 0x00000011 pop ebx 0x00000012 popad 0x00000013 jnp 00007FF154E3734Eh 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A727F second address: 6A7291 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FF154E32A46h 0x0000000a jc 00007FF154E32A46h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 69CDAE second address: 69CDB4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 67C011 second address: 67C025 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007FF154E32A46h 0x0000000a jmp 00007FF154E32A4Ah 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 67C025 second address: 67C04D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37339h 0x00000007 jp 00007FF154E37326h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A799D second address: 6A79A8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A79A8 second address: 6A79D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jc 00007FF154E3732Eh 0x0000000d jbe 00007FF154E37326h 0x00000013 pushad 0x00000014 popad 0x00000015 pushad 0x00000016 jmp 00007FF154E37337h 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A79D7 second address: 6A79DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A7B7D second address: 6A7B9C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF154E37338h 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A7B9C second address: 6A7BC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 push eax 0x00000007 pop eax 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jo 00007FF154E32A5Ch 0x00000013 jmp 00007FF154E32A50h 0x00000018 jne 00007FF154E32A46h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A7BC5 second address: 6A7BD1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 jnp 00007FF154E37326h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A80B0 second address: 6A80C0 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jo 00007FF154E32A46h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f pop ecx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A80C0 second address: 6A80C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A80C6 second address: 6A80CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A80CC second address: 6A80D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A80D0 second address: 6A80D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A80D4 second address: 6A80FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jp 00007FF154E3733Dh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6A80FE second address: 6A8108 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FF154E32A46h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6AB9A5 second address: 6AB9C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pushad 0x00000006 popad 0x00000007 pop eax 0x00000008 pop edx 0x00000009 jl 00007FF154E3734Bh 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FF154E37333h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6ADDEB second address: 6ADE04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a jng 00007FF154E32A54h 0x00000010 pushad 0x00000011 ja 00007FF154E32A46h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B0588 second address: 6B058C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 66EB02 second address: 66EB0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FF154E32A46h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 66EB0D second address: 66EB2B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF154E37338h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B6055 second address: 6B605A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B53FF second address: 6B5406 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B56CC second address: 6B56D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B56D2 second address: 6B56D6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B56D6 second address: 6B56F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF154E32A52h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B56F4 second address: 6B56F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B5892 second address: 6B589D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FF154E32A46h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B589D second address: 6B58B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FF154E3732Dh 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B58B7 second address: 6B58BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B58BB second address: 6B58D5 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FF154E37326h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jnl 00007FF154E37326h 0x00000014 jne 00007FF154E37326h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B5C97 second address: 6B5CC0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FF154E32A4Bh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FF154E32A58h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B5CC0 second address: 6B5CF5 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FF154E3733Ch 0x00000008 push eax 0x00000009 pop eax 0x0000000a jmp 00007FF154E37334h 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 js 00007FF154E37333h 0x00000019 pushad 0x0000001a popad 0x0000001b jmp 00007FF154E3732Bh 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B5CF5 second address: 6B5D0E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF154E32A54h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B5D0E second address: 6B5D1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push edi 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B5EB6 second address: 6B5EBA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B5EBA second address: 6B5ED6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF154E3732Bh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jp 00007FF154E37326h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B8640 second address: 6B86BF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E32A56h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor dword ptr [esp], 2C900E04h 0x00000010 push 00000000h 0x00000012 push edx 0x00000013 call 00007FF154E32A48h 0x00000018 pop edx 0x00000019 mov dword ptr [esp+04h], edx 0x0000001d add dword ptr [esp+04h], 0000001Ch 0x00000025 inc edx 0x00000026 push edx 0x00000027 ret 0x00000028 pop edx 0x00000029 ret 0x0000002a call 00007FF154E32A49h 0x0000002f jmp 00007FF154E32A4Dh 0x00000034 push eax 0x00000035 push ecx 0x00000036 jl 00007FF154E32A4Ch 0x0000003c jns 00007FF154E32A46h 0x00000042 pop ecx 0x00000043 mov eax, dword ptr [esp+04h] 0x00000047 jl 00007FF154E32A4Ah 0x0000004d push esi 0x0000004e push ebx 0x0000004f pop ebx 0x00000050 pop esi 0x00000051 mov eax, dword ptr [eax] 0x00000053 pushad 0x00000054 push eax 0x00000055 push edx 0x00000056 push ecx 0x00000057 pop ecx 0x00000058 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B89E2 second address: 6B89E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B98BB second address: 6B98BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B9D6F second address: 6B9D73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B9D73 second address: 6B9D87 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FF154E32A4Ch 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B9D87 second address: 6B9DFC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37330h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b jne 00007FF154E37346h 0x00000011 nop 0x00000012 movsx edi, ax 0x00000015 push 00000000h 0x00000017 stc 0x00000018 push 00000000h 0x0000001a push 00000000h 0x0000001c push esi 0x0000001d call 00007FF154E37328h 0x00000022 pop esi 0x00000023 mov dword ptr [esp+04h], esi 0x00000027 add dword ptr [esp+04h], 0000001Ch 0x0000002f inc esi 0x00000030 push esi 0x00000031 ret 0x00000032 pop esi 0x00000033 ret 0x00000034 xchg eax, ebx 0x00000035 push eax 0x00000036 push edx 0x00000037 pushad 0x00000038 je 00007FF154E37326h 0x0000003e push eax 0x0000003f push edx 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B9DFC second address: 6B9E01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B9E01 second address: 6B9E07 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B9E07 second address: 6B9E0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B9E0B second address: 6B9E31 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jl 00007FF154E37338h 0x00000010 jmp 00007FF154E37332h 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B9E31 second address: 6B9E35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6BA61D second address: 6BA621 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6BD9F3 second address: 6BD9FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pushad 0x0000000a popad 0x0000000b pop ebx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6BD9FF second address: 6BDA86 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37334h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push ecx 0x0000000d call 00007FF154E37328h 0x00000012 pop ecx 0x00000013 mov dword ptr [esp+04h], ecx 0x00000017 add dword ptr [esp+04h], 0000001Ch 0x0000001f inc ecx 0x00000020 push ecx 0x00000021 ret 0x00000022 pop ecx 0x00000023 ret 0x00000024 jnc 00007FF154E3733Dh 0x0000002a push 00000000h 0x0000002c mov dword ptr [ebp+1245014Fh], edx 0x00000032 push 00000000h 0x00000034 mov dword ptr [ebp+12479392h], ebx 0x0000003a xchg eax, ebx 0x0000003b push eax 0x0000003c push edx 0x0000003d pushad 0x0000003e jmp 00007FF154E37337h 0x00000043 push eax 0x00000044 push edx 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6BDA86 second address: 6BDA8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C04EB second address: 6C04EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C04EF second address: 6C04FE instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C04FE second address: 6C0503 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C1992 second address: 6C1996 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C1996 second address: 6C199C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C199C second address: 6C19A1 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C2F99 second address: 6C302D instructions: 0x00000000 rdtsc 0x00000002 jp 00007FF154E37326h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c pop eax 0x0000000d jnc 00007FF154E37326h 0x00000013 popad 0x00000014 popad 0x00000015 mov dword ptr [esp], eax 0x00000018 cmc 0x00000019 push 00000000h 0x0000001b push 00000000h 0x0000001d push ecx 0x0000001e call 00007FF154E37328h 0x00000023 pop ecx 0x00000024 mov dword ptr [esp+04h], ecx 0x00000028 add dword ptr [esp+04h], 0000001Ch 0x00000030 inc ecx 0x00000031 push ecx 0x00000032 ret 0x00000033 pop ecx 0x00000034 ret 0x00000035 push 00000000h 0x00000037 push 00000000h 0x00000039 push ebx 0x0000003a call 00007FF154E37328h 0x0000003f pop ebx 0x00000040 mov dword ptr [esp+04h], ebx 0x00000044 add dword ptr [esp+04h], 00000019h 0x0000004c inc ebx 0x0000004d push ebx 0x0000004e ret 0x0000004f pop ebx 0x00000050 ret 0x00000051 adc bx, 3FE3h 0x00000056 xchg eax, esi 0x00000057 pushad 0x00000058 jl 00007FF154E3732Ch 0x0000005e jc 00007FF154E37326h 0x00000064 jmp 00007FF154E37339h 0x00000069 popad 0x0000006a push eax 0x0000006b pushad 0x0000006c pushad 0x0000006d push eax 0x0000006e push edx 0x0000006f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C4028 second address: 6C402E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C402E second address: 6C4032 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C02A0 second address: 6C02C0 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF154E32A55h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C4032 second address: 6C4057 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37339h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C31DB second address: 6C31EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 je 00007FF154E32A4Ch 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C4057 second address: 6C4069 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF154E3732Dh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C4069 second address: 6C406E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C406E second address: 6C40EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ebp 0x0000000b call 00007FF154E37328h 0x00000010 pop ebp 0x00000011 mov dword ptr [esp+04h], ebp 0x00000015 add dword ptr [esp+04h], 00000018h 0x0000001d inc ebp 0x0000001e push ebp 0x0000001f ret 0x00000020 pop ebp 0x00000021 ret 0x00000022 mov ebx, dword ptr [ebp+122D3125h] 0x00000028 push 00000000h 0x0000002a push 00000000h 0x0000002c push edx 0x0000002d call 00007FF154E37328h 0x00000032 pop edx 0x00000033 mov dword ptr [esp+04h], edx 0x00000037 add dword ptr [esp+04h], 00000014h 0x0000003f inc edx 0x00000040 push edx 0x00000041 ret 0x00000042 pop edx 0x00000043 ret 0x00000044 pushad 0x00000045 mov dword ptr [ebp+12489C45h], ebx 0x0000004b cld 0x0000004c popad 0x0000004d push 00000000h 0x0000004f jmp 00007FF154E37333h 0x00000054 jmp 00007FF154E3732Dh 0x00000059 xchg eax, esi 0x0000005a push eax 0x0000005b push edx 0x0000005c push ebx 0x0000005d pushad 0x0000005e popad 0x0000005f pop ebx 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C432F second address: 6C435C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jno 00007FF154E32A48h 0x0000000c popad 0x0000000d push eax 0x0000000e pushad 0x0000000f jns 00007FF154E32A48h 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FF154E32A52h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C435C second address: 6C4360 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C6F3B second address: 6C6FA9 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 mov dword ptr [esp], eax 0x0000000a mov edi, edx 0x0000000c push 00000000h 0x0000000e jmp 00007FF154E32A50h 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push esi 0x00000018 call 00007FF154E32A48h 0x0000001d pop esi 0x0000001e mov dword ptr [esp+04h], esi 0x00000022 add dword ptr [esp+04h], 0000001Ch 0x0000002a inc esi 0x0000002b push esi 0x0000002c ret 0x0000002d pop esi 0x0000002e ret 0x0000002f mov ebx, dword ptr [ebp+122D37EEh] 0x00000035 mov ebx, dword ptr [ebp+122D37FEh] 0x0000003b xchg eax, esi 0x0000003c jmp 00007FF154E32A4Bh 0x00000041 push eax 0x00000042 pushad 0x00000043 jno 00007FF154E32A4Ch 0x00000049 push eax 0x0000004a push edx 0x0000004b push eax 0x0000004c push edx 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C6FA9 second address: 6C6FAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C6160 second address: 6C6164 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C6164 second address: 6C621A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jbe 00007FF154E37326h 0x0000000d push edx 0x0000000e pop edx 0x0000000f popad 0x00000010 popad 0x00000011 push eax 0x00000012 pushad 0x00000013 jo 00007FF154E3732Ch 0x00000019 jne 00007FF154E37326h 0x0000001f jmp 00007FF154E3732Ah 0x00000024 popad 0x00000025 nop 0x00000026 mov ebx, dword ptr [ebp+122D3732h] 0x0000002c push dword ptr fs:[00000000h] 0x00000033 push 00000000h 0x00000035 push esi 0x00000036 call 00007FF154E37328h 0x0000003b pop esi 0x0000003c mov dword ptr [esp+04h], esi 0x00000040 add dword ptr [esp+04h], 0000001Ch 0x00000048 inc esi 0x00000049 push esi 0x0000004a ret 0x0000004b pop esi 0x0000004c ret 0x0000004d adc bx, 6746h 0x00000052 movsx edi, ax 0x00000055 mov dword ptr fs:[00000000h], esp 0x0000005c xor dword ptr [ebp+12467880h], esi 0x00000062 mov eax, dword ptr [ebp+122D15C9h] 0x00000068 mov edi, esi 0x0000006a push FFFFFFFFh 0x0000006c mov edi, dword ptr [ebp+122D3802h] 0x00000072 jmp 00007FF154E37339h 0x00000077 nop 0x00000078 jnp 00007FF154E3732Eh 0x0000007e push edx 0x0000007f jp 00007FF154E37326h 0x00000085 pop edx 0x00000086 push eax 0x00000087 push eax 0x00000088 push edx 0x00000089 jmp 00007FF154E3732Ah 0x0000008e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6C621A second address: 6C6220 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6CCA63 second address: 6CCAAD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 push ebx 0x0000000a xor bx, EACAh 0x0000000f pop edi 0x00000010 push 00000000h 0x00000012 xor bx, 7A86h 0x00000017 push 00000000h 0x00000019 mov dword ptr [ebp+122D1D35h], edi 0x0000001f xchg eax, esi 0x00000020 jmp 00007FF154E3732Fh 0x00000025 push eax 0x00000026 pushad 0x00000027 jmp 00007FF154E37336h 0x0000002c push esi 0x0000002d push eax 0x0000002e push edx 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6CBBCE second address: 6CBBD4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6CBBD4 second address: 6CBBD8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6CDA38 second address: 6CDA3C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6CDA3C second address: 6CDA46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6CDA46 second address: 6CDA4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6CDA4A second address: 6CDAC9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37333h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b pushad 0x0000000c jno 00007FF154E3732Ch 0x00000012 jns 00007FF154E37328h 0x00000018 popad 0x00000019 nop 0x0000001a push 00000000h 0x0000001c push eax 0x0000001d call 00007FF154E37328h 0x00000022 pop eax 0x00000023 mov dword ptr [esp+04h], eax 0x00000027 add dword ptr [esp+04h], 00000016h 0x0000002f inc eax 0x00000030 push eax 0x00000031 ret 0x00000032 pop eax 0x00000033 ret 0x00000034 add ebx, dword ptr [ebp+122D59F5h] 0x0000003a push 00000000h 0x0000003c push 00000000h 0x0000003e push 00000000h 0x00000040 push ecx 0x00000041 call 00007FF154E37328h 0x00000046 pop ecx 0x00000047 mov dword ptr [esp+04h], ecx 0x0000004b add dword ptr [esp+04h], 00000019h 0x00000053 inc ecx 0x00000054 push ecx 0x00000055 ret 0x00000056 pop ecx 0x00000057 ret 0x00000058 push eax 0x00000059 push ecx 0x0000005a push eax 0x0000005b push edx 0x0000005c push eax 0x0000005d push edx 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6CDAC9 second address: 6CDACD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6CEA1B second address: 6CEA1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6CEA1F second address: 6CEA25 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6CEA25 second address: 6CEA55 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E3732Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jo 00007FF154E3733Ah 0x00000012 jmp 00007FF154E37334h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6CEA55 second address: 6CEABB instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FF154E32A4Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b jmp 00007FF154E32A53h 0x00000010 mov di, ax 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push ecx 0x00000018 call 00007FF154E32A48h 0x0000001d pop ecx 0x0000001e mov dword ptr [esp+04h], ecx 0x00000022 add dword ptr [esp+04h], 00000017h 0x0000002a inc ecx 0x0000002b push ecx 0x0000002c ret 0x0000002d pop ecx 0x0000002e ret 0x0000002f push 00000000h 0x00000031 xchg eax, esi 0x00000032 jmp 00007FF154E32A50h 0x00000037 push eax 0x00000038 push eax 0x00000039 push edx 0x0000003a push ecx 0x0000003b jne 00007FF154E32A46h 0x00000041 pop ecx 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6CEABB second address: 6CEACC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF154E3732Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6CEC31 second address: 6CEC36 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6CCCF8 second address: 6CCD10 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E3732Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6CCD10 second address: 6CCD14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6CECEB second address: 6CED23 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FF154E37326h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b jmp 00007FF154E37338h 0x00000010 pop ecx 0x00000011 popad 0x00000012 push eax 0x00000013 push eax 0x00000014 push edx 0x00000015 push edi 0x00000016 jmp 00007FF154E3732Eh 0x0000001b pop edi 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6D382E second address: 6D384B instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FF154E32A51h 0x0000000f push eax 0x00000010 pop eax 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6D384B second address: 6D3853 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6D4E05 second address: 6D4E12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push esi 0x0000000b pop esi 0x0000000c pop eax 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6D410B second address: 6D4111 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6D4F40 second address: 6D4F4B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007FF154E32A46h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6D4F4B second address: 6D4FEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a mov ebx, dword ptr [ebp+122D398Ah] 0x00000010 push dword ptr fs:[00000000h] 0x00000017 mov bx, 2CE0h 0x0000001b mov dword ptr fs:[00000000h], esp 0x00000022 push 00000000h 0x00000024 push edi 0x00000025 call 00007FF154E37328h 0x0000002a pop edi 0x0000002b mov dword ptr [esp+04h], edi 0x0000002f add dword ptr [esp+04h], 00000014h 0x00000037 inc edi 0x00000038 push edi 0x00000039 ret 0x0000003a pop edi 0x0000003b ret 0x0000003c and edi, dword ptr [ebp+122D374Ah] 0x00000042 mov eax, dword ptr [ebp+122D0BB9h] 0x00000048 call 00007FF154E3732Ah 0x0000004d mov edi, 3BD382B0h 0x00000052 pop edi 0x00000053 push FFFFFFFFh 0x00000055 push 00000000h 0x00000057 push edx 0x00000058 call 00007FF154E37328h 0x0000005d pop edx 0x0000005e mov dword ptr [esp+04h], edx 0x00000062 add dword ptr [esp+04h], 0000001Ch 0x0000006a inc edx 0x0000006b push edx 0x0000006c ret 0x0000006d pop edx 0x0000006e ret 0x0000006f mov dword ptr [ebp+1245F167h], ecx 0x00000075 nop 0x00000076 pushad 0x00000077 jmp 00007FF154E37335h 0x0000007c push esi 0x0000007d push eax 0x0000007e push edx 0x0000007f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6DD765 second address: 6DD786 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FF154E32A52h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push esi 0x0000000c jno 00007FF154E32A46h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6DD786 second address: 6DD78B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6DD78B second address: 6DD7B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF154E32A54h 0x00000009 jmp 00007FF154E32A51h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6DD90B second address: 6DD913 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6DD913 second address: 6DD917 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6DD917 second address: 6DD921 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF154E37326h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6E2CAC second address: 6E2CB6 instructions: 0x00000000 rdtsc 0x00000002 js 00007FF154E32A46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6E2F38 second address: 6E2F42 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007FF154E37326h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6E2FF9 second address: 6E2FFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6E2FFE second address: 505AC4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37331h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor dword ptr [esp], 6A036276h 0x00000010 pushad 0x00000011 jng 00007FF154E3732Ch 0x00000017 mov ecx, esi 0x00000019 popad 0x0000001a push dword ptr [ebp+122D0B0Dh] 0x00000020 jmp 00007FF154E3732Ah 0x00000025 call dword ptr [ebp+122D1CA4h] 0x0000002b pushad 0x0000002c js 00007FF154E37332h 0x00000032 xor eax, eax 0x00000034 jns 00007FF154E3733Bh 0x0000003a mov edx, dword ptr [esp+28h] 0x0000003e jmp 00007FF154E37331h 0x00000043 mov dword ptr [ebp+122D38BEh], eax 0x00000049 mov dword ptr [ebp+122D22D7h], eax 0x0000004f mov esi, 0000003Ch 0x00000054 add dword ptr [ebp+122D1D6Dh], ebx 0x0000005a add esi, dword ptr [esp+24h] 0x0000005e je 00007FF154E3732Eh 0x00000064 jng 00007FF154E37328h 0x0000006a pushad 0x0000006b popad 0x0000006c lodsw 0x0000006e jmp 00007FF154E37337h 0x00000073 add eax, dword ptr [esp+24h] 0x00000077 mov dword ptr [ebp+122D22D7h], edi 0x0000007d mov ebx, dword ptr [esp+24h] 0x00000081 sub dword ptr [ebp+122D22D7h], edx 0x00000087 nop 0x00000088 push eax 0x00000089 push edx 0x0000008a jmp 00007FF154E37339h 0x0000008f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6E7CC3 second address: 6E7CC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 67F577 second address: 67F58E instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF154E3732Eh 0x00000008 ja 00007FF154E37326h 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 67F58E second address: 67F5B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 jbe 00007FF154E32A74h 0x0000000d jmp 00007FF154E32A53h 0x00000012 push esi 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6E6A1C second address: 6E6A22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6E6A22 second address: 6E6A26 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6E6A26 second address: 6E6A2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6E6A2C second address: 6E6A32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6E6A32 second address: 6E6A3F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 js 00007FF154E37326h 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6E6FBA second address: 6E6FBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6E6FBF second address: 6E6FC4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6E6FC4 second address: 6E701E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FF154E32A46h 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007FF154E32A4Bh 0x00000011 popad 0x00000012 jmp 00007FF154E32A4Bh 0x00000017 pop edx 0x00000018 pop eax 0x00000019 pushad 0x0000001a jmp 00007FF154E32A55h 0x0000001f jmp 00007FF154E32A57h 0x00000024 push eax 0x00000025 push edx 0x00000026 jo 00007FF154E32A46h 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6E701E second address: 6E7022 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6EBFED second address: 6EBFF9 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FF154E32A46h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6EBFF9 second address: 6EC02B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E3732Eh 0x00000007 jbe 00007FF154E3732Eh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push edi 0x00000012 jnl 00007FF154E37326h 0x00000018 pop edi 0x00000019 jnl 00007FF154E37328h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6EC02B second address: 6EC040 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF154E32A51h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B702C second address: 6B703A instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FF154E37326h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B703A second address: 6B703E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B703E second address: 69CDAE instructions: 0x00000000 rdtsc 0x00000002 jne 00007FF154E37326h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d pushad 0x0000000e jmp 00007FF154E3732Ah 0x00000013 jne 00007FF154E37326h 0x00000019 popad 0x0000001a jmp 00007FF154E3732Ch 0x0000001f popad 0x00000020 nop 0x00000021 push 00000000h 0x00000023 push edi 0x00000024 call 00007FF154E37328h 0x00000029 pop edi 0x0000002a mov dword ptr [esp+04h], edi 0x0000002e add dword ptr [esp+04h], 00000015h 0x00000036 inc edi 0x00000037 push edi 0x00000038 ret 0x00000039 pop edi 0x0000003a ret 0x0000003b mov dword ptr [ebp+122D1D63h], edx 0x00000041 call dword ptr [ebp+12455682h] 0x00000047 push eax 0x00000048 push edx 0x00000049 jmp 00007FF154E3732Ch 0x0000004e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B7146 second address: 6B7201 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FF154E32A59h 0x0000000e xchg eax, ebx 0x0000000f mov ecx, dword ptr [ebp+122D1C1Bh] 0x00000015 push dword ptr fs:[00000000h] 0x0000001c mov dh, B3h 0x0000001e mov dword ptr fs:[00000000h], esp 0x00000025 sub dx, 956Dh 0x0000002a mov dword ptr [ebp+12484DBDh], esp 0x00000030 mov dword ptr [ebp+122D1D63h], ebx 0x00000036 cmp dword ptr [ebp+122D37F6h], 00000000h 0x0000003d jne 00007FF154E32B1Dh 0x00000043 and ecx, 32810451h 0x00000049 jns 00007FF154E32A4Ch 0x0000004f mov byte ptr [ebp+122D1CCAh], 00000047h 0x00000056 call 00007FF154E32A50h 0x0000005b mov edi, dword ptr [ebp+122D3792h] 0x00000061 pop edx 0x00000062 mov eax, D49AA7D2h 0x00000067 mov edi, dword ptr [ebp+122D364Ah] 0x0000006d mov dword ptr [ebp+122D1C9Fh], ebx 0x00000073 nop 0x00000074 jmp 00007FF154E32A55h 0x00000079 push eax 0x0000007a push eax 0x0000007b push edx 0x0000007c jmp 00007FF154E32A4Ah 0x00000081 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B7201 second address: 6B7212 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF154E3732Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B74A6 second address: 505AC4 instructions: 0x00000000 rdtsc 0x00000002 js 00007FF154E32A48h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b mov ecx, dword ptr [ebp+122D380Ah] 0x00000011 mov cx, F078h 0x00000015 push dword ptr [ebp+122D0B0Dh] 0x0000001b sub dword ptr [ebp+122D1D35h], edx 0x00000021 call dword ptr [ebp+122D1CA4h] 0x00000027 pushad 0x00000028 js 00007FF154E32A52h 0x0000002e xor eax, eax 0x00000030 jns 00007FF154E32A5Bh 0x00000036 mov edx, dword ptr [esp+28h] 0x0000003a jmp 00007FF154E32A51h 0x0000003f mov dword ptr [ebp+122D38BEh], eax 0x00000045 mov dword ptr [ebp+122D22D7h], eax 0x0000004b mov esi, 0000003Ch 0x00000050 add dword ptr [ebp+122D1D6Dh], ebx 0x00000056 add esi, dword ptr [esp+24h] 0x0000005a je 00007FF154E32A4Eh 0x00000060 jng 00007FF154E32A48h 0x00000066 pushad 0x00000067 popad 0x00000068 lodsw 0x0000006a jmp 00007FF154E32A57h 0x0000006f add eax, dword ptr [esp+24h] 0x00000073 mov dword ptr [ebp+122D22D7h], edi 0x00000079 mov ebx, dword ptr [esp+24h] 0x0000007d sub dword ptr [ebp+122D22D7h], edx 0x00000083 nop 0x00000084 push eax 0x00000085 push edx 0x00000086 jmp 00007FF154E32A59h 0x0000008b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B7718 second address: 6B771F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B7780 second address: 6B77C2 instructions: 0x00000000 rdtsc 0x00000002 je 00007FF154E32A46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop eax 0x0000000b push eax 0x0000000c jp 00007FF154E32A4Ah 0x00000012 xchg eax, esi 0x00000013 js 00007FF154E32A47h 0x00000019 cld 0x0000001a and edi, dword ptr [ebp+122D39AEh] 0x00000020 push eax 0x00000021 push ebx 0x00000022 pushad 0x00000023 jmp 00007FF154E32A59h 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B7E57 second address: 6B7E5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B8178 second address: 6B817D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 69D8A6 second address: 69D8C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pushad 0x0000000a jnl 00007FF154E37328h 0x00000010 push eax 0x00000011 push edx 0x00000012 jns 00007FF154E37326h 0x00000018 jno 00007FF154E37326h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 69D8C6 second address: 69D8D0 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 69D8D0 second address: 69D8D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 67A5F8 second address: 67A604 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 67A604 second address: 67A608 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 67A608 second address: 67A60E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6EB180 second address: 6EB189 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6EB413 second address: 6EB419 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6EB419 second address: 6EB41D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6EB41D second address: 6EB422 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6EB422 second address: 6EB428 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6EB428 second address: 6EB42E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6EB9E6 second address: 6EB9EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6EB9EC second address: 6EB9F0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6EBB3A second address: 6EBB3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6EBB3F second address: 6EBB44 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F10CA second address: 6F10CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F10CE second address: 6F10D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F10D2 second address: 6F10DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F10DD second address: 6F10E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F13BC second address: 6F13CD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E3732Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F13CD second address: 6F13D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jno 00007FF154E32A46h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F1565 second address: 6F158B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FF154E37336h 0x0000000f jc 00007FF154E37326h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F158B second address: 6F158F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F158F second address: 6F159E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F159E second address: 6F15A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F15A2 second address: 6F15A8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F15A8 second address: 6F15AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F1A02 second address: 6F1A1F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E3732Dh 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FF154E3732Ch 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F1A1F second address: 6F1A23 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F2349 second address: 6F234D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F234D second address: 6F2362 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E32A51h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F2362 second address: 6F2368 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F2368 second address: 6F2389 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007FF154E32A46h 0x00000009 jmp 00007FF154E32A4Ah 0x0000000e jnp 00007FF154E32A46h 0x00000014 popad 0x00000015 pushad 0x00000016 push edx 0x00000017 pop edx 0x00000018 pushad 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F0B1E second address: 6F0B22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F0B22 second address: 6F0B26 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F59BF second address: 6F59C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F59C3 second address: 6F59C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6F59C9 second address: 6F59D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 pushad 0x00000008 popad 0x00000009 pop edi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 67066A second address: 670687 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007FF154E32A58h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6FE7D7 second address: 6FE7E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF154E3732Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6FE7E7 second address: 6FE7FE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 ja 00007FF154E32A46h 0x0000000d pushad 0x0000000e popad 0x0000000f jbe 00007FF154E32A46h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6FD4C7 second address: 6FD4D4 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FF154E37326h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6FD4D4 second address: 6FD4DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6FDA4A second address: 6FDA56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FF154E37326h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6FDA56 second address: 6FDA72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FF154E32A50h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6FDA72 second address: 6FDA78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6FDA78 second address: 6FDA88 instructions: 0x00000000 rdtsc 0x00000002 js 00007FF154E32A46h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6FDA88 second address: 6FDA8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6FDA8C second address: 6FDAA7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E32A57h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6FDC00 second address: 6FDC06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6FDC06 second address: 6FDC0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6FE009 second address: 6FE015 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jne 00007FF154E37326h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6FE015 second address: 6FE020 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jno 00007FF154E32A46h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6FE45B second address: 6FE46B instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push esi 0x00000004 pop esi 0x00000005 pushad 0x00000006 popad 0x00000007 pop edi 0x00000008 push eax 0x00000009 push edx 0x0000000a jl 00007FF154E37326h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6FE46B second address: 6FE48B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FF154E32A4Fh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d jg 00007FF154E32A4Eh 0x00000013 push ebx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 700AFA second address: 700B0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF154E37331h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 700B0F second address: 700B13 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 70065C second address: 700660 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 700660 second address: 7006C7 instructions: 0x00000000 rdtsc 0x00000002 je 00007FF154E32A46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jc 00007FF154E32A5Dh 0x00000010 jmp 00007FF154E32A57h 0x00000015 pushad 0x00000016 jmp 00007FF154E32A4Dh 0x0000001b jmp 00007FF154E32A59h 0x00000020 jmp 00007FF154E32A4Ah 0x00000025 popad 0x00000026 push eax 0x00000027 push edx 0x00000028 jbe 00007FF154E32A46h 0x0000002e ja 00007FF154E32A46h 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7030DB second address: 7030E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 703256 second address: 70325A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7092F2 second address: 7092F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7092F6 second address: 709308 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jng 00007FF154E32A46h 0x00000010 push edx 0x00000011 pop edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 708575 second address: 708585 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FF154E37326h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 708585 second address: 7085A5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FF154E32A54h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7085A5 second address: 7085A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7089C4 second address: 7089F9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jbe 00007FF154E32A46h 0x0000000d pop edx 0x0000000e pushad 0x0000000f jnl 00007FF154E32A46h 0x00000015 jng 00007FF154E32A46h 0x0000001b popad 0x0000001c pushad 0x0000001d jmp 00007FF154E32A56h 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 708B72 second address: 708B7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FF154E37326h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 708B7C second address: 708B82 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 708E66 second address: 708E6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 708E6A second address: 708E84 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FF154E32A51h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 70C323 second address: 70C32E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FF154E37326h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 70C32E second address: 70C33F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF154E32A4Bh 0x00000009 push edx 0x0000000a pop edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 70C33F second address: 70C343 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 70BA2F second address: 70BA33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 711A7C second address: 711A84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 710276 second address: 710280 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FF154E32A46h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 710280 second address: 710291 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E3732Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 71055A second address: 710562 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 710562 second address: 710568 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 710819 second address: 71081F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 71081F second address: 71084E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007FF154E37338h 0x0000000c jmp 00007FF154E3732Ch 0x00000011 popad 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7109B0 second address: 7109B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7109B4 second address: 7109C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jg 00007FF154E37328h 0x0000000e push edx 0x0000000f pop edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7109C4 second address: 7109FA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF154E32A58h 0x00000008 jnc 00007FF154E32A46h 0x0000000e jnl 00007FF154E32A46h 0x00000014 jns 00007FF154E32A46h 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d jc 00007FF154E32A46h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7109FA second address: 7109FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7109FE second address: 710A04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B7C51 second address: 6B7C57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B7C57 second address: 6B7C9E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E32A56h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push ecx 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 pop ecx 0x00000014 nop 0x00000015 mov dword ptr [ebp+1247769Ch], ecx 0x0000001b mov ebx, dword ptr [ebp+12484DA4h] 0x00000021 sub dword ptr [ebp+122D1C25h], eax 0x00000027 mov edx, dword ptr [ebp+122D38E6h] 0x0000002d add eax, ebx 0x0000002f clc 0x00000030 nop 0x00000031 pushad 0x00000032 push eax 0x00000033 push edx 0x00000034 pushad 0x00000035 popad 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B7C9E second address: 6B7CA8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6B7CA8 second address: 6B7D0C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E32A58h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push esi 0x0000000c pushad 0x0000000d jbe 00007FF154E32A46h 0x00000013 push eax 0x00000014 pop eax 0x00000015 popad 0x00000016 pop esi 0x00000017 nop 0x00000018 jmp 00007FF154E32A51h 0x0000001d push 00000004h 0x0000001f push 00000000h 0x00000021 push eax 0x00000022 call 00007FF154E32A48h 0x00000027 pop eax 0x00000028 mov dword ptr [esp+04h], eax 0x0000002c add dword ptr [esp+04h], 00000015h 0x00000034 inc eax 0x00000035 push eax 0x00000036 ret 0x00000037 pop eax 0x00000038 ret 0x00000039 movzx edi, dx 0x0000003c push eax 0x0000003d push esi 0x0000003e push eax 0x0000003f push edx 0x00000040 pushad 0x00000041 popad 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 710B61 second address: 710B6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 711735 second address: 711739 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 711739 second address: 711762 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jp 00007FF154E37343h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7177DD second address: 7177E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 717944 second address: 717956 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jg 00007FF154E37326h 0x0000000c popad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 71809C second address: 7180A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7180A0 second address: 7180C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jns 00007FF154E37326h 0x0000000e jmp 00007FF154E37338h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 719493 second address: 719497 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 719497 second address: 71949D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 71949D second address: 7194A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7194A3 second address: 7194A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7194A7 second address: 7194AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 71E0C1 second address: 71E0C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 71E0C5 second address: 71E0CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 721124 second address: 721148 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF154E37337h 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c jc 00007FF154E37326h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7218BD second address: 7218D9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E32A58h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 721A22 second address: 721A38 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF154E37330h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 721A38 second address: 721A41 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 728A64 second address: 728A6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 728A6A second address: 728A6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 728A6E second address: 728A7C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jbe 00007FF154E3732Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 728A7C second address: 728AA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 jmp 00007FF154E32A56h 0x0000000b push eax 0x0000000c push edx 0x0000000d jns 00007FF154E32A46h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 728EB2 second address: 728EC4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E3732Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 72902D second address: 729033 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7294AF second address: 7294C8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37335h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7294C8 second address: 7294F9 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FF154E32A4Eh 0x00000008 pushad 0x00000009 push edx 0x0000000a pop edx 0x0000000b pushad 0x0000000c popad 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push ebx 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 jnl 00007FF154E32A46h 0x0000001e push edi 0x0000001f pop edi 0x00000020 popad 0x00000021 push eax 0x00000022 push edx 0x00000023 js 00007FF154E32A46h 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7297BD second address: 7297C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7285E8 second address: 728631 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF154E32A53h 0x00000009 popad 0x0000000a pushad 0x0000000b jno 00007FF154E32A46h 0x00000011 pushad 0x00000012 popad 0x00000013 jmp 00007FF154E32A57h 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b jp 00007FF154E32A4Eh 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 728631 second address: 728653 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37339h 0x00000007 pushad 0x00000008 push edx 0x00000009 pop edx 0x0000000a push edi 0x0000000b pop edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7319D0 second address: 7319D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7319D6 second address: 7319FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FF154E37333h 0x0000000b popad 0x0000000c push ebx 0x0000000d jmp 00007FF154E3732Bh 0x00000012 push eax 0x00000013 pop eax 0x00000014 pop ebx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7319FF second address: 731A04 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 731A04 second address: 731A0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 731A0A second address: 731A12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 731CEC second address: 731D15 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E3732Eh 0x00000007 jmp 00007FF154E37337h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 731D15 second address: 731D29 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007FF154E32A46h 0x0000000a jmp 00007FF154E32A4Ah 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 735081 second address: 735087 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 735087 second address: 735090 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 735090 second address: 735098 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 735098 second address: 7350A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7350A0 second address: 7350A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7350A9 second address: 7350BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF154E32A4Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 73DE7B second address: 73DE8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF154E3732Ch 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 73DE8F second address: 73DE9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FF154E32A46h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 73DE9B second address: 73DEA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 73DEA0 second address: 73DEBF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF154E32A52h 0x00000008 pushad 0x00000009 popad 0x0000000a ja 00007FF154E32A46h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 73DD12 second address: 73DD16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 73DD16 second address: 73DD1A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7460DB second address: 7460E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 66B6CA second address: 66B6D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75655B second address: 756562 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7563D8 second address: 756403 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jp 00007FF154E32A46h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF154E32A4Fh 0x00000013 jc 00007FF154E32A4Eh 0x00000019 pushad 0x0000001a popad 0x0000001b jbe 00007FF154E32A46h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 758877 second address: 75887B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75887B second address: 758881 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75AB87 second address: 75ABA3 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FF154E37326h 0x00000008 js 00007FF154E37326h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pop ebx 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 push edi 0x00000015 pop edi 0x00000016 jo 00007FF154E37326h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75ABA3 second address: 75ABDB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E32A58h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FF154E32A4Eh 0x0000000e jmp 00007FF154E32A4Bh 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75FCFE second address: 75FD04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75FD04 second address: 75FD08 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75FD08 second address: 75FD12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75FD12 second address: 75FD18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75FD18 second address: 75FD40 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FF154E37326h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FF154E37332h 0x0000000f popad 0x00000010 pushad 0x00000011 js 00007FF154E3732Eh 0x00000017 pushad 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75FE83 second address: 75FEAF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E32A55h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a pushad 0x0000000b jmp 00007FF154E32A4Dh 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 75FFFA second address: 75FFFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 760BAF second address: 760BCF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007FF154E32A55h 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 760BCF second address: 760BEE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37339h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 760BEE second address: 760BF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 760BF2 second address: 760BF6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 763BC7 second address: 763BE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF154E32A59h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 763BE4 second address: 763C39 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37338h 0x00000007 ja 00007FF154E37326h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jmp 00007FF154E37331h 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 jbe 00007FF154E3732Eh 0x0000001d jmp 00007FF154E37331h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7638F9 second address: 76391D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E32A50h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d js 00007FF154E32A46h 0x00000013 jl 00007FF154E32A46h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 766B77 second address: 766B7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 766B7D second address: 766B96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF154E32A51h 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 76E001 second address: 76E010 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jo 00007FF154E37326h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 76E010 second address: 76E025 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 jnc 00007FF154E32A56h 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 pop eax 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 76F774 second address: 76F77A instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 76F77A second address: 76F780 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 775631 second address: 775639 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 775639 second address: 77563F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77563F second address: 775643 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 779272 second address: 77927C instructions: 0x00000000 rdtsc 0x00000002 jo 00007FF154E32A46h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 77927C second address: 779281 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 779281 second address: 779287 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7726F8 second address: 7726FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79A2AC second address: 79A2D0 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007FF154E32A56h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jc 00007FF154E32A48h 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79ABBB second address: 79ABDE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37330h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jc 00007FF154E37326h 0x00000010 je 00007FF154E37326h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79ABDE second address: 79AC0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FF154E32A46h 0x0000000a popad 0x0000000b pop edi 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 jmp 00007FF154E32A59h 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79AC0D second address: 79AC17 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FF154E37326h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79AC17 second address: 79AC1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79AC1D second address: 79AC24 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79AEEE second address: 79AF0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jmp 00007FF154E32A54h 0x0000000c pop ecx 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 push esi 0x00000011 pop esi 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79AF0F second address: 79AF1E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jnp 00007FF154E37326h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 79F753 second address: 79F758 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A23FE second address: 7A2415 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37333h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A2415 second address: 7A241A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A241A second address: 7A2420 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A2420 second address: 7A2426 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A3E3B second address: 7A3E3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 7A3E3F second address: 7A3E4B instructions: 0x00000000 rdtsc 0x00000002 jng 00007FF154E32A46h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 6BCB9E second address: 6BCBCC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37338h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FF154E3732Eh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130832 second address: 5130836 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130836 second address: 513083C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 513083C second address: 5130890 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E32A4Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a jmp 00007FF154E32A4Eh 0x0000000f xchg eax, esi 0x00000010 pushad 0x00000011 jmp 00007FF154E32A4Eh 0x00000016 jmp 00007FF154E32A52h 0x0000001b popad 0x0000001c push eax 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007FF154E32A4Eh 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130890 second address: 51308E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, edx 0x00000005 pushfd 0x00000006 jmp 00007FF154E3732Dh 0x0000000b add ah, 00000006h 0x0000000e jmp 00007FF154E37331h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 xchg eax, esi 0x00000018 pushad 0x00000019 mov si, DC53h 0x0000001d mov ax, EAAFh 0x00000021 popad 0x00000022 lea eax, dword ptr [ebp-04h] 0x00000025 jmp 00007FF154E37332h 0x0000002a nop 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 popad 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51308E2 second address: 51308E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51308E6 second address: 51308EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51308EC second address: 51308FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF154E32A4Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51308FB second address: 5130929 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37339h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF154E3732Ch 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130929 second address: 5130979 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF154E32A51h 0x00000009 adc si, C186h 0x0000000e jmp 00007FF154E32A51h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 nop 0x00000018 pushad 0x00000019 pushad 0x0000001a mov edx, 49C0C03Ch 0x0000001f call 00007FF154E32A55h 0x00000024 pop esi 0x00000025 popad 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51309A4 second address: 51309BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF154E37333h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51309BC second address: 5130A3B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edi, ax 0x00000006 pushfd 0x00000007 jmp 00007FF154E32A50h 0x0000000c adc cx, CB48h 0x00000011 jmp 00007FF154E32A4Bh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a cmp dword ptr [ebp-04h], 00000000h 0x0000001e jmp 00007FF154E32A56h 0x00000023 mov esi, eax 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 pushfd 0x00000029 jmp 00007FF154E32A4Dh 0x0000002e sbb ah, 00000016h 0x00000031 jmp 00007FF154E32A51h 0x00000036 popfd 0x00000037 call 00007FF154E32A50h 0x0000003c pop eax 0x0000003d popad 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130A9C second address: 5120035 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37331h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a jmp 00007FF154E3732Eh 0x0000000f leave 0x00000010 jmp 00007FF154E37330h 0x00000015 retn 0004h 0x00000018 nop 0x00000019 sub esp, 04h 0x0000001c xor ebx, ebx 0x0000001e cmp eax, 00000000h 0x00000021 je 00007FF154E3748Fh 0x00000027 mov dword ptr [esp], 0000000Dh 0x0000002e call 00007FF159A783E5h 0x00000033 mov edi, edi 0x00000035 jmp 00007FF154E3732Eh 0x0000003a xchg eax, ebp 0x0000003b pushad 0x0000003c mov si, B38Dh 0x00000040 mov ax, FB89h 0x00000044 popad 0x00000045 push eax 0x00000046 push eax 0x00000047 push edx 0x00000048 pushad 0x00000049 jmp 00007FF154E37330h 0x0000004e mov esi, 21C0AE31h 0x00000053 popad 0x00000054 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120035 second address: 51200DF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FF154E32A4Dh 0x00000008 pop ecx 0x00000009 mov di, DEB4h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 xchg eax, ebp 0x00000011 pushad 0x00000012 mov dh, 50h 0x00000014 movzx eax, dx 0x00000017 popad 0x00000018 mov ebp, esp 0x0000001a jmp 00007FF154E32A4Dh 0x0000001f sub esp, 2Ch 0x00000022 pushad 0x00000023 pushad 0x00000024 mov ah, A6h 0x00000026 mov ax, di 0x00000029 popad 0x0000002a pushfd 0x0000002b jmp 00007FF154E32A4Bh 0x00000030 or ecx, 23CDAFAEh 0x00000036 jmp 00007FF154E32A59h 0x0000003b popfd 0x0000003c popad 0x0000003d xchg eax, ebx 0x0000003e pushad 0x0000003f mov bx, cx 0x00000042 push esi 0x00000043 pop edi 0x00000044 popad 0x00000045 push eax 0x00000046 jmp 00007FF154E32A51h 0x0000004b xchg eax, ebx 0x0000004c jmp 00007FF154E32A4Eh 0x00000051 xchg eax, edi 0x00000052 push eax 0x00000053 push edx 0x00000054 jmp 00007FF154E32A57h 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 512019F second address: 51201B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF154E37334h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120212 second address: 5120251 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cl, dh 0x00000005 pushfd 0x00000006 jmp 00007FF154E32A4Ch 0x0000000b or eax, 4E769B48h 0x00000011 jmp 00007FF154E32A4Bh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a nop 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007FF154E32A55h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120251 second address: 512029B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37331h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov ax, bx 0x0000000e pushfd 0x0000000f jmp 00007FF154E37333h 0x00000014 jmp 00007FF154E37333h 0x00000019 popfd 0x0000001a popad 0x0000001b nop 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 512029B second address: 51202A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51202C2 second address: 51202D7 instructions: 0x00000000 rdtsc 0x00000002 movsx ebx, si 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov edx, esi 0x00000009 popad 0x0000000a jg 00007FF1C64054E6h 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51202D7 second address: 5120331 instructions: 0x00000000 rdtsc 0x00000002 call 00007FF154E32A54h 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov edx, 65120496h 0x0000000f popad 0x00000010 js 00007FF154E32AD1h 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 pushfd 0x0000001a jmp 00007FF154E32A59h 0x0000001f xor ecx, 7F8F85F6h 0x00000025 jmp 00007FF154E32A51h 0x0000002a popfd 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120331 second address: 51203CF instructions: 0x00000000 rdtsc 0x00000002 mov ah, 82h 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 cmp dword ptr [ebp-14h], edi 0x0000000a pushad 0x0000000b movsx edi, ax 0x0000000e push esi 0x0000000f mov ecx, ebx 0x00000011 pop edx 0x00000012 popad 0x00000013 jne 00007FF1C640547Dh 0x00000019 pushad 0x0000001a movzx esi, dx 0x0000001d pushfd 0x0000001e jmp 00007FF154E37337h 0x00000023 xor esi, 7C5C888Eh 0x00000029 jmp 00007FF154E37339h 0x0000002e popfd 0x0000002f popad 0x00000030 mov ebx, dword ptr [ebp+08h] 0x00000033 jmp 00007FF154E3732Eh 0x00000038 lea eax, dword ptr [ebp-2Ch] 0x0000003b jmp 00007FF154E37330h 0x00000040 xchg eax, esi 0x00000041 jmp 00007FF154E37330h 0x00000046 push eax 0x00000047 jmp 00007FF154E3732Bh 0x0000004c xchg eax, esi 0x0000004d push eax 0x0000004e push edx 0x0000004f push eax 0x00000050 push edx 0x00000051 pushad 0x00000052 popad 0x00000053 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51203CF second address: 51203D5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51203D5 second address: 5120417 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E3732Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a jmp 00007FF154E37330h 0x0000000f push eax 0x00000010 pushad 0x00000011 mov edi, 274056A4h 0x00000016 mov bx, 3910h 0x0000001a popad 0x0000001b nop 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f jmp 00007FF154E37330h 0x00000024 pushad 0x00000025 popad 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120417 second address: 512041D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 512041D second address: 5120421 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120421 second address: 5120447 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 jmp 00007FF154E32A54h 0x0000000e mov dword ptr [esp], ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120447 second address: 512044B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 512044B second address: 512044F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 512044F second address: 5120455 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120492 second address: 51204A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov esi, eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51204A0 second address: 51204A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51204A4 second address: 51204AA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51204AA second address: 51204CA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF154E37330h 0x00000008 mov dh, ah 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d test esi, esi 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51204CA second address: 51204CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51204CE second address: 51204D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51204D4 second address: 5110D25 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E32A51h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FF1C6400BB2h 0x0000000f xor eax, eax 0x00000011 jmp 00007FF154E0C17Ah 0x00000016 pop esi 0x00000017 pop edi 0x00000018 pop ebx 0x00000019 leave 0x0000001a retn 0004h 0x0000001d nop 0x0000001e sub esp, 04h 0x00000021 mov esi, eax 0x00000023 cmp esi, 00000000h 0x00000026 setne al 0x00000029 xor ebx, ebx 0x0000002b test al, 01h 0x0000002d jne 00007FF154E32A47h 0x0000002f jmp 00007FF154E32B83h 0x00000034 call 00007FF159A646C3h 0x00000039 mov edi, edi 0x0000003b push eax 0x0000003c push edx 0x0000003d pushad 0x0000003e pushad 0x0000003f popad 0x00000040 mov edi, 1F63C61Ah 0x00000045 popad 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5110D25 second address: 5110D97 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF154E3732Eh 0x00000009 sbb cx, 7E58h 0x0000000e jmp 00007FF154E3732Bh 0x00000013 popfd 0x00000014 pushfd 0x00000015 jmp 00007FF154E37338h 0x0000001a sbb ax, 08B8h 0x0000001f jmp 00007FF154E3732Bh 0x00000024 popfd 0x00000025 popad 0x00000026 pop edx 0x00000027 pop eax 0x00000028 xchg eax, ebp 0x00000029 push eax 0x0000002a push edx 0x0000002b pushad 0x0000002c mov edx, 124D2CA6h 0x00000031 call 00007FF154E37337h 0x00000036 pop ecx 0x00000037 popad 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5110D97 second address: 5110E1A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E32A56h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FF154E32A4Bh 0x0000000f xchg eax, ebp 0x00000010 pushad 0x00000011 mov eax, 096C14CBh 0x00000016 mov bx, si 0x00000019 popad 0x0000001a mov ebp, esp 0x0000001c pushad 0x0000001d mov edx, eax 0x0000001f pushad 0x00000020 pushfd 0x00000021 jmp 00007FF154E32A52h 0x00000026 jmp 00007FF154E32A55h 0x0000002b popfd 0x0000002c mov ecx, 4F492977h 0x00000031 popad 0x00000032 popad 0x00000033 xchg eax, ecx 0x00000034 jmp 00007FF154E32A4Ah 0x00000039 push eax 0x0000003a push eax 0x0000003b push edx 0x0000003c jmp 00007FF154E32A4Eh 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5110EB5 second address: 51208C2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37335h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 ret 0x0000000a nop 0x0000000b jmp 00007FF154E37322h 0x0000000d and bl, 00000001h 0x00000010 movzx eax, bl 0x00000013 add esp, 3Ch 0x00000016 pop esi 0x00000017 pop edi 0x00000018 pop ebx 0x00000019 pop ebp 0x0000001a ret 0x0000001b add esp, 04h 0x0000001e mov eax, dword ptr [004F3010h+ebx*4] 0x00000025 mov ecx, 3C17A731h 0x0000002a xor ecx, dword ptr [004F3018h] 0x00000030 add eax, ecx 0x00000032 inc eax 0x00000033 jmp eax 0x00000035 mov eax, dword ptr [004F301Ch] 0x0000003a mov ecx, EB7ED259h 0x0000003f xor ecx, dword ptr [004F3024h] 0x00000045 add eax, ecx 0x00000047 inc eax 0x00000048 jmp eax 0x0000004a push edi 0x0000004b call 00007FF154E63050h 0x00000050 push ebp 0x00000051 push ebx 0x00000052 push edi 0x00000053 push esi 0x00000054 sub esp, 44h 0x00000057 push 00000000h 0x00000059 call 00007FF159A78B1Bh 0x0000005e mov edi, edi 0x00000060 push eax 0x00000061 push edx 0x00000062 jmp 00007FF154E3732Ah 0x00000067 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51208C2 second address: 5120913 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FF154E32A51h 0x00000008 pop eax 0x00000009 pushfd 0x0000000a jmp 00007FF154E32A51h 0x0000000f adc cx, 0CE6h 0x00000014 jmp 00007FF154E32A51h 0x00000019 popfd 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d xchg eax, ebp 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007FF154E32A4Dh 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120913 second address: 5120923 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF154E3732Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120923 second address: 5120937 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a pushad 0x0000000b mov ah, 95h 0x0000000d push edx 0x0000000e pop eax 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push ebx 0x00000013 pop ecx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120937 second address: 5120949 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, ebp 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b mov edi, eax 0x0000000d mov cx, 5173h 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120949 second address: 51209E0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FF154E32A4Fh 0x00000008 pop ecx 0x00000009 jmp 00007FF154E32A59h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 mov ebp, esp 0x00000013 pushad 0x00000014 mov ebx, ecx 0x00000016 pushfd 0x00000017 jmp 00007FF154E32A58h 0x0000001c or al, 00000008h 0x0000001f jmp 00007FF154E32A4Bh 0x00000024 popfd 0x00000025 popad 0x00000026 cmp dword ptr [7674459Ch], 05h 0x0000002d jmp 00007FF154E32A56h 0x00000032 je 00007FF1C63F0A82h 0x00000038 jmp 00007FF154E32A50h 0x0000003d pop ebp 0x0000003e push eax 0x0000003f push edx 0x00000040 push eax 0x00000041 push edx 0x00000042 push eax 0x00000043 push edx 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51209E0 second address: 51209E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 51209E4 second address: 5120A01 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E32A59h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120A01 second address: 5120A11 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF154E3732Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120A11 second address: 5120A15 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120A36 second address: 5120A7E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E3732Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push 559D7703h 0x0000000e jmp 00007FF154E37331h 0x00000013 xor dword ptr [esp], 23EEEB2Bh 0x0000001a jmp 00007FF154E3732Eh 0x0000001f call 00007FF1C63FC425h 0x00000024 push 766E2B70h 0x00000029 push dword ptr fs:[00000000h] 0x00000030 mov eax, dword ptr [esp+10h] 0x00000034 mov dword ptr [esp+10h], ebp 0x00000038 lea ebp, dword ptr [esp+10h] 0x0000003c sub esp, eax 0x0000003e push ebx 0x0000003f push esi 0x00000040 push edi 0x00000041 mov eax, dword ptr [76744538h] 0x00000046 xor dword ptr [ebp-04h], eax 0x00000049 xor eax, ebp 0x0000004b push eax 0x0000004c mov dword ptr [ebp-18h], esp 0x0000004f push dword ptr [ebp-08h] 0x00000052 mov eax, dword ptr [ebp-04h] 0x00000055 mov dword ptr [ebp-04h], FFFFFFFEh 0x0000005c mov dword ptr [ebp-08h], eax 0x0000005f lea eax, dword ptr [ebp-10h] 0x00000062 mov dword ptr fs:[00000000h], eax 0x00000068 ret 0x00000069 push eax 0x0000006a push edx 0x0000006b push eax 0x0000006c push edx 0x0000006d pushad 0x0000006e popad 0x0000006f rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120A7E second address: 5120A9B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E32A59h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120A9B second address: 5120AFD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37331h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub esi, esi 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FF154E3732Dh 0x00000012 add eax, 3EA05D66h 0x00000018 jmp 00007FF154E37331h 0x0000001d popfd 0x0000001e mov ecx, 22076997h 0x00000023 popad 0x00000024 mov dword ptr [ebp-1Ch], esi 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007FF154E37339h 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120AFD second address: 5120B0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF154E32A4Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120B39 second address: 5120B3D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120B3D second address: 5120B43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120B43 second address: 5120B48 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5120B48 second address: 5120B70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop edx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FF1C63E687Ah 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FF154E32A57h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130B18 second address: 5130B27 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E3732Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130B27 second address: 5130B3B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF154E32A4Fh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130B3B second address: 5130BCB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov ebp, esp 0x00000009 jmp 00007FF154E37334h 0x0000000e xchg eax, esi 0x0000000f pushad 0x00000010 call 00007FF154E3732Eh 0x00000015 pushfd 0x00000016 jmp 00007FF154E37332h 0x0000001b or eax, 74B7F568h 0x00000021 jmp 00007FF154E3732Bh 0x00000026 popfd 0x00000027 pop ecx 0x00000028 mov ebx, 629E3DACh 0x0000002d popad 0x0000002e push eax 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 movsx edx, cx 0x00000035 pushfd 0x00000036 jmp 00007FF154E37338h 0x0000003b jmp 00007FF154E37335h 0x00000040 popfd 0x00000041 popad 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130BCB second address: 5130C0E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E32A51h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a jmp 00007FF154E32A4Eh 0x0000000f mov esi, dword ptr [ebp+0Ch] 0x00000012 pushad 0x00000013 movzx eax, dx 0x00000016 mov bh, 8Ch 0x00000018 popad 0x00000019 test esi, esi 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007FF154E32A51h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130C0E second address: 5130C31 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E37331h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FF1C63E4ABAh 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 mov eax, 5FDB3E65h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130C31 second address: 5130C86 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FF154E32A52h 0x00000008 add ch, 00000078h 0x0000000b jmp 00007FF154E32A4Bh 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 popad 0x00000014 cmp dword ptr [7674459Ch], 05h 0x0000001b pushad 0x0000001c mov edi, ecx 0x0000001e push esi 0x0000001f mov dx, 72F2h 0x00000023 pop edi 0x00000024 popad 0x00000025 je 00007FF1C63F8274h 0x0000002b push eax 0x0000002c push edx 0x0000002d jmp 00007FF154E32A55h 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130C86 second address: 5130C8C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130C8C second address: 5130C90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130D5F second address: 5130D88 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bh, DCh 0x00000005 pushfd 0x00000006 jmp 00007FF154E3732Ah 0x0000000b xor ch, 00000078h 0x0000000e jmp 00007FF154E3732Bh 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 pop esi 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130D88 second address: 5130DA3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF154E32A57h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130DA3 second address: 5130DA9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130DA9 second address: 5130DAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130DAD second address: 5130DB1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\file.exe | RDTSC instruction interceptor: First address: 5130DB1 second address: 5130DC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF154E32A4Ah 0x00000010 rdtsc |