Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 113B018 second address: 113B024 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11444A7 second address: 11444AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1144604 second address: 114460E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FF2E55A2C26h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1144796 second address: 114479C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 114479C second address: 11447A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11447A0 second address: 11447B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 je 00007FF2E5514DE6h 0x0000000d jnl 00007FF2E5514DE6h 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 114860C second address: 114862F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jc 00007FF2E55A2C26h 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FF2E55A2C34h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 114862F second address: 1148647 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E5514DF4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1148647 second address: 114864B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 114864B second address: 114866F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c jbe 00007FF2E5514DECh 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 push edx 0x00000016 pop edx 0x00000017 popad 0x00000018 mov eax, dword ptr [eax] 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e jg 00007FF2E5514DE6h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 114866F second address: 1148675 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1148675 second address: 114869D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d push edi 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FF2E5514DF2h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11486F9 second address: 1148703 instructions: 0x00000000 rdtsc 0x00000002 je 00007FF2E55A2C2Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1148703 second address: 114871F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 push ebx 0x00000009 jmp 00007FF2E5514DEEh 0x0000000e pop ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 114871F second address: 1148723 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1148723 second address: 1148740 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 and dl, 0000001Bh 0x0000000b push 00000000h 0x0000000d xor dword ptr [ebp+122D1A23h], esi 0x00000013 push 4EE73472h 0x00000018 push eax 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1148740 second address: 1148744 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1148744 second address: 11487AB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 xor dword ptr [esp], 4EE734F2h 0x0000000e mov ecx, dword ptr [ebp+122D2ADDh] 0x00000014 push 00000003h 0x00000016 jne 00007FF2E5514DECh 0x0000001c mov esi, dword ptr [ebp+122D2815h] 0x00000022 push 00000000h 0x00000024 push 00000000h 0x00000026 push eax 0x00000027 call 00007FF2E5514DE8h 0x0000002c pop eax 0x0000002d mov dword ptr [esp+04h], eax 0x00000031 add dword ptr [esp+04h], 0000001Ch 0x00000039 inc eax 0x0000003a push eax 0x0000003b ret 0x0000003c pop eax 0x0000003d ret 0x0000003e mov dword ptr [ebp+122D23CFh], ebx 0x00000044 push 00000003h 0x00000046 and ecx, 7F146AAAh 0x0000004c push 44534459h 0x00000051 push eax 0x00000052 push edx 0x00000053 push ebx 0x00000054 push ecx 0x00000055 pop ecx 0x00000056 pop ebx 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 114886B second address: 1148870 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1148870 second address: 1148876 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1148876 second address: 11488F2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b pushad 0x0000000c and ebx, dword ptr [ebp+122D28A1h] 0x00000012 call 00007FF2E55A2C2Fh 0x00000017 sub dword ptr [ebp+122D1888h], ebx 0x0000001d pop esi 0x0000001e popad 0x0000001f push 00000000h 0x00000021 push 00000000h 0x00000023 push ecx 0x00000024 call 00007FF2E55A2C28h 0x00000029 pop ecx 0x0000002a mov dword ptr [esp+04h], ecx 0x0000002e add dword ptr [esp+04h], 00000018h 0x00000036 inc ecx 0x00000037 push ecx 0x00000038 ret 0x00000039 pop ecx 0x0000003a ret 0x0000003b jmp 00007FF2E55A2C31h 0x00000040 push C06D0BD7h 0x00000045 push eax 0x00000046 push edx 0x00000047 jmp 00007FF2E55A2C39h 0x0000004c rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1148A9F second address: 1148AB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF2E5514DF0h 0x00000009 popad 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1148AB9 second address: 1148B21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 xor dword ptr [esp], 00E98075h 0x0000000d jmp 00007FF2E55A2C34h 0x00000012 push 00000003h 0x00000014 push 00000000h 0x00000016 push edx 0x00000017 call 00007FF2E55A2C28h 0x0000001c pop edx 0x0000001d mov dword ptr [esp+04h], edx 0x00000021 add dword ptr [esp+04h], 00000018h 0x00000029 inc edx 0x0000002a push edx 0x0000002b ret 0x0000002c pop edx 0x0000002d ret 0x0000002e push 00000000h 0x00000030 sub esi, dword ptr [ebp+122D18BAh] 0x00000036 push 00000003h 0x00000038 mov dword ptr [ebp+122D1A42h], ecx 0x0000003e push 92C0012Ch 0x00000043 pushad 0x00000044 ja 00007FF2E55A2C2Ch 0x0000004a je 00007FF2E55A2C26h 0x00000050 push edx 0x00000051 push eax 0x00000052 push edx 0x00000053 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1132A23 second address: 1132A6C instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FF2E5514E12h 0x00000008 jmp 00007FF2E5514DF7h 0x0000000d jmp 00007FF2E5514DF5h 0x00000012 pop edx 0x00000013 pop eax 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 jmp 00007FF2E5514DEEh 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11670EB second address: 116710C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FF2E55A2C30h 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 116710C second address: 1167112 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1167112 second address: 116711F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jnp 00007FF2E55A2C26h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 116711F second address: 1167123 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1167398 second address: 116739C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 116739C second address: 11673B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FF2E5514DEEh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1167501 second address: 1167507 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1167655 second address: 116767B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 jmp 00007FF2E5514DECh 0x0000000b jmp 00007FF2E5514DEEh 0x00000010 pop esi 0x00000011 push edi 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1167ABD second address: 1167AC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FF2E55A2C26h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1167EC1 second address: 1167EDB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1167EDB second address: 1167EE0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1134565 second address: 1134571 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jg 00007FF2E5514DE6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 116832D second address: 116834B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FF2E55A2C26h 0x0000000a jp 00007FF2E55A2C26h 0x00000010 popad 0x00000011 pop edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jc 00007FF2E55A2C2Eh 0x0000001a pushad 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 116834B second address: 1168352 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1168352 second address: 1168357 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1168357 second address: 1168370 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jbe 00007FF2E5514DE6h 0x00000009 js 00007FF2E5514DE6h 0x0000000f pop ebx 0x00000010 pushad 0x00000011 jnc 00007FF2E5514DE6h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11688EF second address: 11688F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1168B7E second address: 1168B84 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1168CF7 second address: 1168CFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1168CFD second address: 1168D18 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FF2E5514DF2h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1168D18 second address: 1168D1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 116B422 second address: 116B42A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 116E9C6 second address: 116E9D0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 116EB09 second address: 116EB0E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 116EB0E second address: 116EB24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FF2E55A2C26h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 116EB24 second address: 116EB36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF2E5514DEDh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 116EB36 second address: 116EB3B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 116EC38 second address: 116EC51 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FF2E5514DF1h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1170CD1 second address: 1170CDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1170CDE second address: 1170CE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1170CE2 second address: 1170CE6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1170CE6 second address: 1170CF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 pushad 0x00000008 popad 0x00000009 push esi 0x0000000a pop esi 0x0000000b pop esi 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 113E585 second address: 113E58B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1139529 second address: 113952D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1174B74 second address: 1174B8D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C35h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1174B8D second address: 1174B9D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1174B9D second address: 1174BB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF2E55A2C2Bh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1174BB1 second address: 1174BB7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1174BB7 second address: 1174BC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1174D1A second address: 1174D26 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jg 00007FF2E5514DE6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1174D26 second address: 1174D5F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 js 00007FF2E55A2C26h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c je 00007FF2E55A2C41h 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 push ebx 0x00000017 jnc 00007FF2E55A2C26h 0x0000001d pop ebx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11785CF second address: 11785EC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 117889D second address: 11788AE instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF2E55A2C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11788AE second address: 11788B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 117897D second address: 1178982 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1178982 second address: 1178987 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1178987 second address: 1178995 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1178B17 second address: 1178B27 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 117BA2F second address: 117BA37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 117BA37 second address: 117BA80 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 movzx esi, ax 0x0000000c push 00000000h 0x0000000e or si, ABC4h 0x00000013 push edx 0x00000014 sub edi, dword ptr [ebp+122D2232h] 0x0000001a pop edi 0x0000001b push 00000000h 0x0000001d push 00000000h 0x0000001f push ebp 0x00000020 call 00007FF2E5514DE8h 0x00000025 pop ebp 0x00000026 mov dword ptr [esp+04h], ebp 0x0000002a add dword ptr [esp+04h], 0000001Ah 0x00000032 inc ebp 0x00000033 push ebp 0x00000034 ret 0x00000035 pop ebp 0x00000036 ret 0x00000037 push eax 0x00000038 jo 00007FF2E5514DEEh 0x0000003e push esi 0x0000003f push eax 0x00000040 push edx 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 117CC1E second address: 117CC22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 117C293 second address: 117C297 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 117CC22 second address: 117CC38 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C32h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 117C297 second address: 117C2A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 117C2A1 second address: 117C2A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 117C2A5 second address: 117C2B3 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 117D4E8 second address: 117D4EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 117C2B3 second address: 117C2B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 117D85D second address: 117D86B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 117C2B7 second address: 117C2BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 117D86B second address: 117D870 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 117F7ED second address: 117F7F7 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FF2E5514DE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 117F52B second address: 117F53D instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FF2E55A2C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jo 00007FF2E55A2C2Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 117F7F7 second address: 117F81C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF2E5514DEEh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1180316 second address: 118031C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 118031C second address: 1180321 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1182CE4 second address: 1182D2F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 nop 0x00000008 and di, 836Ah 0x0000000d and ebx, 61A24A19h 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push ecx 0x00000018 call 00007FF2E55A2C28h 0x0000001d pop ecx 0x0000001e mov dword ptr [esp+04h], ecx 0x00000022 add dword ptr [esp+04h], 0000001Dh 0x0000002a inc ecx 0x0000002b push ecx 0x0000002c ret 0x0000002d pop ecx 0x0000002e ret 0x0000002f mov ebx, ecx 0x00000031 mov dword ptr [ebp+1244C063h], edi 0x00000037 push 00000000h 0x00000039 mov bl, 7Eh 0x0000003b push eax 0x0000003c push esi 0x0000003d push eax 0x0000003e push eax 0x0000003f push edx 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1185B82 second address: 1185B86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1185B86 second address: 1185B9D instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF2E55A2C2Bh 0x0000000b popad 0x0000000c push eax 0x0000000d pushad 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1185B9D second address: 1185BAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jne 00007FF2E5514DE6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1185BAC second address: 1185C00 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ecx 0x0000000b call 00007FF2E55A2C28h 0x00000010 pop ecx 0x00000011 mov dword ptr [esp+04h], ecx 0x00000015 add dword ptr [esp+04h], 0000001Bh 0x0000001d inc ecx 0x0000001e push ecx 0x0000001f ret 0x00000020 pop ecx 0x00000021 ret 0x00000022 movsx edi, dx 0x00000025 push 00000000h 0x00000027 sub dword ptr [ebp+122D1F90h], ecx 0x0000002d push 00000000h 0x0000002f clc 0x00000030 push eax 0x00000031 push eax 0x00000032 push edx 0x00000033 jmp 00007FF2E55A2C38h 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1182F2A second address: 1182F41 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FF2E5514DECh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1185DAD second address: 1185DB3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1182F41 second address: 1182F45 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1182F45 second address: 1182F4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1185DB3 second address: 1185E43 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007FF2E5514DE6h 0x00000009 jmp 00007FF2E5514DF0h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 nop 0x00000012 call 00007FF2E5514DECh 0x00000017 mov ebx, 48FACC06h 0x0000001c pop ebx 0x0000001d push dword ptr fs:[00000000h] 0x00000024 push edi 0x00000025 pop ebx 0x00000026 mov dword ptr fs:[00000000h], esp 0x0000002d push 00000000h 0x0000002f push eax 0x00000030 call 00007FF2E5514DE8h 0x00000035 pop eax 0x00000036 mov dword ptr [esp+04h], eax 0x0000003a add dword ptr [esp+04h], 0000001Dh 0x00000042 inc eax 0x00000043 push eax 0x00000044 ret 0x00000045 pop eax 0x00000046 ret 0x00000047 mov eax, dword ptr [ebp+122D00B9h] 0x0000004d mov ebx, dword ptr [ebp+122D2A05h] 0x00000053 push FFFFFFFFh 0x00000055 pushad 0x00000056 xor bx, 9051h 0x0000005b mov dl, ADh 0x0000005d popad 0x0000005e push eax 0x0000005f push eax 0x00000060 push edx 0x00000061 push eax 0x00000062 push edx 0x00000063 jmp 00007FF2E5514DF0h 0x00000068 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1187A68 second address: 1187AE7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ebx 0x0000000b jmp 00007FF2E55A2C2Eh 0x00000010 pop ebx 0x00000011 nop 0x00000012 push 00000000h 0x00000014 push edx 0x00000015 call 00007FF2E55A2C28h 0x0000001a pop edx 0x0000001b mov dword ptr [esp+04h], edx 0x0000001f add dword ptr [esp+04h], 00000017h 0x00000027 inc edx 0x00000028 push edx 0x00000029 ret 0x0000002a pop edx 0x0000002b ret 0x0000002c jmp 00007FF2E55A2C35h 0x00000031 push 00000000h 0x00000033 or dword ptr [ebp+122D2387h], eax 0x00000039 push 00000000h 0x0000003b mov ebx, eax 0x0000003d xchg eax, esi 0x0000003e jng 00007FF2E55A2C2Ch 0x00000044 pushad 0x00000045 push ecx 0x00000046 pop ecx 0x00000047 push edi 0x00000048 pop edi 0x00000049 popad 0x0000004a push eax 0x0000004b pushad 0x0000004c pushad 0x0000004d push ecx 0x0000004e pop ecx 0x0000004f pushad 0x00000050 popad 0x00000051 popad 0x00000052 pushad 0x00000053 pushad 0x00000054 popad 0x00000055 push eax 0x00000056 push edx 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1185E43 second address: 1185E49 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1185E49 second address: 1185E4F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1185E4F second address: 1185E53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1188A09 second address: 1188A2D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF2E55A2C32h 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jng 00007FF2E55A2C28h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1188A2D second address: 1188A33 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1188A33 second address: 1188A98 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C38h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push ebx 0x0000000f call 00007FF2E55A2C28h 0x00000014 pop ebx 0x00000015 mov dword ptr [esp+04h], ebx 0x00000019 add dword ptr [esp+04h], 00000018h 0x00000021 inc ebx 0x00000022 push ebx 0x00000023 ret 0x00000024 pop ebx 0x00000025 ret 0x00000026 push 00000000h 0x00000028 pushad 0x00000029 mov bx, si 0x0000002c sub dword ptr [ebp+122D2173h], edx 0x00000032 popad 0x00000033 push 00000000h 0x00000035 mov edi, dword ptr [ebp+122D2931h] 0x0000003b push eax 0x0000003c push eax 0x0000003d push edx 0x0000003e jmp 00007FF2E55A2C2Eh 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1187BF6 second address: 1187BFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1187BFB second address: 1187C91 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 jng 00007FF2E55A2C26h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e nop 0x0000000f push 00000000h 0x00000011 push eax 0x00000012 call 00007FF2E55A2C28h 0x00000017 pop eax 0x00000018 mov dword ptr [esp+04h], eax 0x0000001c add dword ptr [esp+04h], 00000015h 0x00000024 inc eax 0x00000025 push eax 0x00000026 ret 0x00000027 pop eax 0x00000028 ret 0x00000029 mov edi, dword ptr [ebp+122D2A31h] 0x0000002f or ebx, 2D33E831h 0x00000035 push dword ptr fs:[00000000h] 0x0000003c mov di, FF36h 0x00000040 mov dword ptr fs:[00000000h], esp 0x00000047 mov bl, FBh 0x00000049 jmp 00007FF2E55A2C33h 0x0000004e mov eax, dword ptr [ebp+122D09EDh] 0x00000054 movzx ebx, di 0x00000057 push FFFFFFFFh 0x00000059 mov ebx, dword ptr [ebp+122D29E9h] 0x0000005f jmp 00007FF2E55A2C2Dh 0x00000064 push eax 0x00000065 push eax 0x00000066 push edx 0x00000067 jmp 00007FF2E55A2C36h 0x0000006c rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1189B93 second address: 1189B97 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1189B97 second address: 1189C14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 mov di, CDE4h 0x0000000c push 00000000h 0x0000000e push 00000000h 0x00000010 push edx 0x00000011 call 00007FF2E55A2C28h 0x00000016 pop edx 0x00000017 mov dword ptr [esp+04h], edx 0x0000001b add dword ptr [esp+04h], 00000016h 0x00000023 inc edx 0x00000024 push edx 0x00000025 ret 0x00000026 pop edx 0x00000027 ret 0x00000028 mov ebx, dword ptr [ebp+122D270Eh] 0x0000002e mov ebx, dword ptr [ebp+122D2975h] 0x00000034 or edi, dword ptr [ebp+122D20DDh] 0x0000003a push 00000000h 0x0000003c push 00000000h 0x0000003e push eax 0x0000003f call 00007FF2E55A2C28h 0x00000044 pop eax 0x00000045 mov dword ptr [esp+04h], eax 0x00000049 add dword ptr [esp+04h], 00000015h 0x00000051 inc eax 0x00000052 push eax 0x00000053 ret 0x00000054 pop eax 0x00000055 ret 0x00000056 jno 00007FF2E55A2C2Ch 0x0000005c push eax 0x0000005d push ecx 0x0000005e push eax 0x0000005f push edx 0x00000060 jmp 00007FF2E55A2C30h 0x00000065 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 118AC0C second address: 118AC78 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 clc 0x00000009 push 00000000h 0x0000000b push 00000000h 0x0000000d push ecx 0x0000000e call 00007FF2E5514DE8h 0x00000013 pop ecx 0x00000014 mov dword ptr [esp+04h], ecx 0x00000018 add dword ptr [esp+04h], 00000017h 0x00000020 inc ecx 0x00000021 push ecx 0x00000022 ret 0x00000023 pop ecx 0x00000024 ret 0x00000025 stc 0x00000026 push 00000000h 0x00000028 push 00000000h 0x0000002a push edi 0x0000002b call 00007FF2E5514DE8h 0x00000030 pop edi 0x00000031 mov dword ptr [esp+04h], edi 0x00000035 add dword ptr [esp+04h], 0000001Ch 0x0000003d inc edi 0x0000003e push edi 0x0000003f ret 0x00000040 pop edi 0x00000041 ret 0x00000042 jg 00007FF2E5514DECh 0x00000048 xchg eax, esi 0x00000049 pushad 0x0000004a push edx 0x0000004b push ecx 0x0000004c pop ecx 0x0000004d pop edx 0x0000004e pushad 0x0000004f je 00007FF2E5514DE6h 0x00000055 push eax 0x00000056 push edx 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 118CCB1 second address: 118CD17 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jc 00007FF2E55A2C26h 0x00000009 jp 00007FF2E55A2C26h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 je 00007FF2E55A2C3Dh 0x00000019 js 00007FF2E55A2C37h 0x0000001f jmp 00007FF2E55A2C31h 0x00000024 nop 0x00000025 mov edi, ecx 0x00000027 push 00000000h 0x00000029 push 00000000h 0x0000002b push edi 0x0000002c call 00007FF2E55A2C28h 0x00000031 pop edi 0x00000032 mov dword ptr [esp+04h], edi 0x00000036 add dword ptr [esp+04h], 00000015h 0x0000003e inc edi 0x0000003f push edi 0x00000040 ret 0x00000041 pop edi 0x00000042 ret 0x00000043 mov di, C1C1h 0x00000047 sbb bl, FFFFFFFCh 0x0000004a push 00000000h 0x0000004c mov ebx, 5DFAFA11h 0x00000051 push eax 0x00000052 push eax 0x00000053 push edx 0x00000054 pushad 0x00000055 push eax 0x00000056 push edx 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 118CD17 second address: 118CD2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF2E5514DF0h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 118CD2C second address: 118CD31 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 118DBBC second address: 118DC12 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 nop 0x00000008 mov ebx, 7CCC69DDh 0x0000000d push 00000000h 0x0000000f mov edi, dword ptr [ebp+122D2A85h] 0x00000015 push 00000000h 0x00000017 push 00000000h 0x00000019 push ebx 0x0000001a call 00007FF2E5514DE8h 0x0000001f pop ebx 0x00000020 mov dword ptr [esp+04h], ebx 0x00000024 add dword ptr [esp+04h], 0000001Bh 0x0000002c inc ebx 0x0000002d push ebx 0x0000002e ret 0x0000002f pop ebx 0x00000030 ret 0x00000031 jmp 00007FF2E5514DF7h 0x00000036 xchg eax, esi 0x00000037 pushad 0x00000038 pushad 0x00000039 push eax 0x0000003a push edx 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 118DC12 second address: 118DC38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 pushad 0x00000008 push edi 0x00000009 pop edi 0x0000000a jmp 00007FF2E55A2C34h 0x0000000f popad 0x00000010 popad 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 118DC38 second address: 118DC3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 118AE22 second address: 118AE2D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1190C9B second address: 1190C9F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 118FEF1 second address: 118FEF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 118FEF5 second address: 118FEF9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1198BE4 second address: 1198BEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1198BEA second address: 1198C1A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jnl 00007FF2E5514DE6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007FF2E5514DF6h 0x00000012 pushad 0x00000013 js 00007FF2E5514DE6h 0x00000019 pushad 0x0000001a popad 0x0000001b popad 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1198C1A second address: 1198C20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1198D89 second address: 1198D8D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1137B09 second address: 1137B23 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C36h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 119E65D second address: 119E663 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 119E663 second address: 119E667 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A46F7 second address: 11A46FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A499C second address: 11A49A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FF2E55A2C26h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A49A6 second address: 11A49AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A49AA second address: 11A49B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A4B25 second address: 11A4B3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jmp 00007FF2E5514DF2h 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A4B3E second address: 11A4B43 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A4CBF second address: 11A4CDB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E5514DF8h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A4CDB second address: 11A4CDF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A4CDF second address: 11A4CE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1130EED second address: 1130EF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1130EF3 second address: 1130EF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A4E5C second address: 11A4E77 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jnl 00007FF2E55A2C26h 0x0000000d pop edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FF2E55A2C2Bh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A4E77 second address: 11A4E97 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push esi 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A4E97 second address: 11A4EA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jns 00007FF2E55A2C26h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A4EA6 second address: 11A4EAA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A4EAA second address: 11A4EB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A4EB0 second address: 11A4EB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A4EB6 second address: 11A4EBB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A4FFE second address: 11A5003 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A518E second address: 11A51AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edi 0x00000007 push edx 0x00000008 jmp 00007FF2E55A2C36h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A51AE second address: 11A51B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 113CA95 second address: 113CAA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 113CAA0 second address: 113CAA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A985E second address: 11A986A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 popad 0x00000009 push esi 0x0000000a pop esi 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A9E2C second address: 11A9E47 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E5514DF7h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A9E47 second address: 11A9E5F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 pushad 0x0000000a jno 00007FF2E55A2C26h 0x00000010 jng 00007FF2E55A2C26h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A954D second address: 11A956B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF2E5514DF8h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11A956B second address: 11A9586 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FF2E55A2C36h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11AA3D4 second address: 11AA3DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11AA3DA second address: 11AA3E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11AA3E0 second address: 11AA3EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B41DA second address: 11B41E1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B2B83 second address: 11B2BA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FF2E5514DE6h 0x0000000a jmp 00007FF2E5514DECh 0x0000000f jns 00007FF2E5514DE6h 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B2CF6 second address: 11B2D02 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FF2E55A2C26h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B2D02 second address: 11B2D12 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF2E5514DE8h 0x00000008 push esi 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B2D12 second address: 11B2D16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B2E65 second address: 11B2E6B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B2E6B second address: 11B2E78 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FF2E55A2C28h 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B2FE7 second address: 11B2FF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B38DF second address: 11B3918 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FF2E55A2C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a ja 00007FF2E55A2C2Ch 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 push edx 0x00000014 jmp 00007FF2E55A2C38h 0x00000019 jnl 00007FF2E55A2C26h 0x0000001f pop edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B3918 second address: 11B3928 instructions: 0x00000000 rdtsc 0x00000002 js 00007FF2E5514DF2h 0x00000008 jbe 00007FF2E5514DE6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 115C543 second address: 115C55C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jp 00007FF2E55A2C26h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edi 0x0000000d pushad 0x0000000e pushad 0x0000000f jg 00007FF2E55A2C26h 0x00000015 pushad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 115C55C second address: 115C579 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FF2E5514DE6h 0x0000000a popad 0x0000000b push esi 0x0000000c jbe 00007FF2E5514DE6h 0x00000012 pushad 0x00000013 popad 0x00000014 pop esi 0x00000015 push eax 0x00000016 push edx 0x00000017 ja 00007FF2E5514DE6h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B404A second address: 11B4059 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push edx 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 jnp 00007FF2E55A2C26h 0x0000000e pop edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B4059 second address: 11B405E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B405E second address: 11B4066 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B2832 second address: 11B2836 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B2836 second address: 11B2843 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B2843 second address: 11B284D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FF2E5514DE6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1176C44 second address: 1176C48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1176C48 second address: 1176C4C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1176C4C second address: 1176C52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1176C52 second address: 1176C57 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1176C57 second address: 1176CA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FF2E55A2C26h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp], eax 0x00000010 push 00000000h 0x00000012 push edi 0x00000013 call 00007FF2E55A2C28h 0x00000018 pop edi 0x00000019 mov dword ptr [esp+04h], edi 0x0000001d add dword ptr [esp+04h], 0000001Ch 0x00000025 inc edi 0x00000026 push edi 0x00000027 ret 0x00000028 pop edi 0x00000029 ret 0x0000002a adc edi, 41F36D34h 0x00000030 lea eax, dword ptr [ebp+1247C9A6h] 0x00000036 mov ecx, dword ptr [ebp+122D2A4Dh] 0x0000003c nop 0x0000003d pushad 0x0000003e push eax 0x0000003f push edx 0x00000040 push eax 0x00000041 push edx 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1176CA3 second address: 1176CA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1176CA7 second address: 1176CAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1176CAB second address: 115BA63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF2E5514DEDh 0x0000000b popad 0x0000000c push eax 0x0000000d push edi 0x0000000e pushad 0x0000000f jmp 00007FF2E5514DF9h 0x00000014 jmp 00007FF2E5514DEEh 0x00000019 popad 0x0000001a pop edi 0x0000001b nop 0x0000001c call dword ptr [ebp+122D2037h] 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007FF2E5514DF0h 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1177397 second address: 11773A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 js 00007FF2E55A2C26h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11773A4 second address: 11773A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11778A3 second address: 11778D2 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FF2E55A2C39h 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c mov ecx, 53426DAFh 0x00000011 push 00000004h 0x00000013 movzx edx, ax 0x00000016 nop 0x00000017 push esi 0x00000018 push edi 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1177DF5 second address: 1177DFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1178067 second address: 115C543 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov dword ptr [esp], eax 0x0000000a jmp 00007FF2E55A2C39h 0x0000000f call dword ptr [ebp+1244E4F4h] 0x00000015 push edi 0x00000016 push eax 0x00000017 push edx 0x00000018 jng 00007FF2E55A2C26h 0x0000001e pushad 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B7D58 second address: 11B7D5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B7EF6 second address: 11B7EFB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B7EFB second address: 11B7F08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jnc 00007FF2E5514DE6h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B7F08 second address: 11B7F19 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B7F19 second address: 11B7F1D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B7F1D second address: 11B7F2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 ja 00007FF2E55A2C26h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B7F2B second address: 11B7F2F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B8076 second address: 11B8080 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FF2E55A2C26h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B8080 second address: 11B8086 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B8086 second address: 11B80C4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jno 00007FF2E55A2C26h 0x0000000b push eax 0x0000000c pop eax 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 je 00007FF2E55A2C28h 0x00000017 push eax 0x00000018 pop eax 0x00000019 jns 00007FF2E55A2C33h 0x0000001f push esi 0x00000020 pop esi 0x00000021 jmp 00007FF2E55A2C2Bh 0x00000026 jmp 00007FF2E55A2C2Fh 0x0000002b pushad 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B80C4 second address: 11B80CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B824B second address: 11B8257 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 ja 00007FF2E55A2C26h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B8257 second address: 11B825D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B83F2 second address: 11B83F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B83F6 second address: 11B842D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007FF2E5514E05h 0x0000000c jg 00007FF2E5514DE6h 0x00000012 jmp 00007FF2E5514DF9h 0x00000017 ja 00007FF2E5514DE8h 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B842D second address: 11B8467 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C38h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF2E55A2C39h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B8467 second address: 11B846D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B85D9 second address: 11B85E9 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push edi 0x00000004 pop edi 0x00000005 pushad 0x00000006 popad 0x00000007 pop edx 0x00000008 push eax 0x00000009 push edx 0x0000000a jns 00007FF2E55A2C26h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B85E9 second address: 11B85F8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DEBh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B873A second address: 11B8751 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FF2E55A2C2Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B8751 second address: 11B8757 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B8757 second address: 11B8781 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FF2E55A2C26h 0x0000000a popad 0x0000000b jbe 00007FF2E55A2C43h 0x00000011 jmp 00007FF2E55A2C37h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B8781 second address: 11B87AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 jmp 00007FF2E5514DEBh 0x0000000a pop ecx 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF2E5514DF9h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11B88ED second address: 11B88F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11BE5F9 second address: 11BE64D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007FF2E5514DF2h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edi 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 pop edx 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushad 0x00000014 pushad 0x00000015 push ebx 0x00000016 pop ebx 0x00000017 jnl 00007FF2E5514DE6h 0x0000001d jmp 00007FF2E5514DF4h 0x00000022 pushad 0x00000023 popad 0x00000024 popad 0x00000025 push edx 0x00000026 jmp 00007FF2E5514DECh 0x0000002b pushad 0x0000002c popad 0x0000002d pop edx 0x0000002e push edi 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C13A2 second address: 11C13BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jmp 00007FF2E55A2C2Fh 0x0000000a push eax 0x0000000b push edx 0x0000000c js 00007FF2E55A2C26h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C13BE second address: 11C13C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C13C2 second address: 11C13D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b je 00007FF2E55A2C26h 0x00000011 jno 00007FF2E55A2C26h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C13D9 second address: 11C13E3 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FF2E5514DE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C16E3 second address: 11C16E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C1877 second address: 11C187F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C52E5 second address: 11C5307 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 js 00007FF2E55A2C26h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FF2E55A2C33h 0x00000011 push ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C999D second address: 11C99E5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007FF2E5514E0Bh 0x0000000c jmp 00007FF2E5514DF7h 0x00000011 jmp 00007FF2E5514DEEh 0x00000016 jmp 00007FF2E5514DEFh 0x0000001b popad 0x0000001c push edi 0x0000001d push eax 0x0000001e push edx 0x0000001f push ecx 0x00000020 pop ecx 0x00000021 pushad 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C99E5 second address: 11C99EF instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FF2E55A2C26h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C99EF second address: 11C99FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C8C08 second address: 11C8C0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C902E second address: 11C904F instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FF2E5514DE6h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FF2E5514DF5h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C904F second address: 11C9070 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007FF2E55A2C26h 0x00000009 jmp 00007FF2E55A2C36h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C9070 second address: 11C907D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jl 00007FF2E5514DECh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C9209 second address: 11C9217 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FF2E55A2C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C9217 second address: 11C921B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C921B second address: 11C9221 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C935C second address: 11C9360 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11C951F second address: 11C9540 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF2E55A2C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF2E55A2C35h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11CF3E4 second address: 11CF3E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11CF3E8 second address: 11CF40E instructions: 0x00000000 rdtsc 0x00000002 js 00007FF2E55A2C3Dh 0x00000008 jmp 00007FF2E55A2C37h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11CF40E second address: 11CF419 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FF2E5514DE6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11CDD2F second address: 11CDD41 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FF2E55A2C2Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11CDD41 second address: 11CDD47 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11CDEB1 second address: 11CDEB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11CDFE9 second address: 11CDFEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11CE2E3 second address: 11CE302 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E55A2C39h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11CE302 second address: 11CE306 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11CE44F second address: 11CE461 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FF2E55A2C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jns 00007FF2E55A2C26h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1177ABB second address: 1177ABF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1177BB1 second address: 1177BB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1177BB6 second address: 1177BD6 instructions: 0x00000000 rdtsc 0x00000002 js 00007FF2E5514DE8h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FF2E5514DF0h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11CF0CF second address: 11CF0DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push edi 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11CF0DB second address: 11CF0E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11360A2 second address: 11360BE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C38h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11D6420 second address: 11D6424 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11D6424 second address: 11D6445 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C37h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11D6445 second address: 11D6449 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11D6449 second address: 11D644F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11D6719 second address: 11D671F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11D671F second address: 11D672F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11D672F second address: 11D6737 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11D6737 second address: 11D673C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11D7046 second address: 11D7056 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FF2E5514DE6h 0x0000000a pop edi 0x0000000b popad 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11D7384 second address: 11D7390 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FF2E55A2C2Ch 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E0BE9 second address: 11E0BF3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007FF2E5514DE6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E0059 second address: 11E009B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jng 00007FF2E55A2C28h 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e jmp 00007FF2E55A2C38h 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 jmp 00007FF2E55A2C33h 0x0000001b popad 0x0000001c push eax 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E009B second address: 11E009F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E01C3 second address: 11E01C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E01C9 second address: 11E01D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b pop ecx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E0336 second address: 11E033E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E079D second address: 11E07A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E07A3 second address: 11E07B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push edx 0x00000006 push esi 0x00000007 pop esi 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b je 00007FF2E55A2C32h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E07B6 second address: 11E07C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FF2E5514DE6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E07C0 second address: 11E07E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FF2E55A2C37h 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d jl 00007FF2E55A2C26h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E863F second address: 11E8653 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FF2E5514DEAh 0x00000008 jl 00007FF2E5514DECh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E6D66 second address: 11E6D79 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E55A2C2Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E6D79 second address: 11E6D7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E6D7D second address: 11E6DA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF2E55A2C39h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push ebx 0x00000010 pushad 0x00000011 popad 0x00000012 pop ebx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E74A3 second address: 11E74A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E74A8 second address: 11E74B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E74B2 second address: 11E74DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 js 00007FF2E5514DFFh 0x0000000f jmp 00007FF2E5514DF9h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E74DA second address: 11E74F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E55A2C36h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11E74F6 second address: 11E74FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 11F0D9F second address: 11F0DA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1201D64 second address: 1201D68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1201D68 second address: 1201D6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 120177F second address: 12017A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jp 00007FF2E5514DE8h 0x0000000b pushad 0x0000000c popad 0x0000000d jo 00007FF2E5514DE8h 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 je 00007FF2E5514DE6h 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 12017A0 second address: 12017B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FF2E55A2C26h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jne 00007FF2E55A2C26h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 12017B3 second address: 12017C3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 12017C3 second address: 12017C8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 12017C8 second address: 12017CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 12017CE second address: 12017E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jng 00007FF2E55A2C32h 0x0000000b jbe 00007FF2E55A2C26h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 120191E second address: 1201937 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007FF2E5514DEFh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1201937 second address: 1201951 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF2E55A2C36h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1201951 second address: 120196C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF7h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 121469F second address: 12146A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 12146A3 second address: 12146AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 12146AD second address: 12146F4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jng 00007FF2E55A2C26h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push ecx 0x0000000e jo 00007FF2E55A2C26h 0x00000014 pop ecx 0x00000015 jmp 00007FF2E55A2C37h 0x0000001a pushad 0x0000001b jmp 00007FF2E55A2C38h 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1218C6A second address: 1218C86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF2E5514DF8h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1218E2B second address: 1218E2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1218E2F second address: 1218E35 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1218E35 second address: 1218E43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007FF2E55A2C2Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1218E43 second address: 1218E57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jo 00007FF2E5514DE6h 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 push ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1218E57 second address: 1218E5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop ebx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1219121 second address: 1219125 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1219125 second address: 121912B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 121912B second address: 121912F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 121928A second address: 12192A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C35h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e pop edi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 12192A9 second address: 12192D1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DEFh 0x00000007 jmp 00007FF2E5514DEFh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push esi 0x00000011 pop esi 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 12192D1 second address: 12192D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 12192D5 second address: 12192D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1219418 second address: 1219441 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FF2E55A2C31h 0x0000000c jmp 00007FF2E55A2C31h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1219441 second address: 121944B instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF2E5514DE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 121944B second address: 1219450 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1219450 second address: 121945A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 121945A second address: 1219460 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1130EB6 second address: 1130EC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FF2E5514DE6h 0x0000000a pop edx 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1219E98 second address: 1219EB8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Ah 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FF2E55A2C30h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 121DD49 second address: 121DD5D instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF2E5514DE6h 0x00000008 jnc 00007FF2E5514DE6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 121DD5D second address: 121DD63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 121DD63 second address: 121DD6D instructions: 0x00000000 rdtsc 0x00000002 jg 00007FF2E5514DE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 121DD6D second address: 121DD89 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C34h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1233580 second address: 123359D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jnc 00007FF2E5514DF5h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 123359D second address: 12335CD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007FF2E55A2C26h 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b jmp 00007FF2E55A2C30h 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 push esi 0x00000018 pushad 0x00000019 popad 0x0000001a pop esi 0x0000001b push eax 0x0000001c push edx 0x0000001d jg 00007FF2E55A2C26h 0x00000023 push eax 0x00000024 pop eax 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 12335CD second address: 12335D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 12335D3 second address: 12335E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C30h 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 12335E8 second address: 12335F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 122FDD6 second address: 122FDDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1245C29 second address: 1245C2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 1245C2D second address: 1245C31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126D986 second address: 126D98A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126D98A second address: 126D99E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FF2E55A2C2Bh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126C7D4 second address: 126C7E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FF2E5514DE6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126CACF second address: 126CB06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007FF2E55A2C2Bh 0x0000000d pop edi 0x0000000e jmp 00007FF2E55A2C2Eh 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 jmp 00007FF2E55A2C2Fh 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126CB06 second address: 126CB19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FF2E5514DE6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jng 00007FF2E5514DE6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126CB19 second address: 126CB32 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C35h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126CB32 second address: 126CB38 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126CCA3 second address: 126CCA9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126CCA9 second address: 126CCB3 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FF2E5514DECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126CDFD second address: 126CE1F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pop edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126CE1F second address: 126CE24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126D100 second address: 126D10B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007FF2E55A2C26h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126D10B second address: 126D111 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126D111 second address: 126D119 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126D587 second address: 126D58B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126D58B second address: 126D591 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126D591 second address: 126D59A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126D59A second address: 126D5A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 126D6CE second address: 126D6D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 12719E9 second address: 12719F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007FF2E55A2C26h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 12719F3 second address: 12719F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 592092B second address: 592092F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 592092F second address: 5920935 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 58F00FD second address: 58F010C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 58F010C second address: 58F0176 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FF2E5514DEEh 0x0000000f push eax 0x00000010 jmp 00007FF2E5514DEBh 0x00000015 xchg eax, ebp 0x00000016 jmp 00007FF2E5514DF6h 0x0000001b mov ebp, esp 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007FF2E5514DF7h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59608B2 second address: 59608B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 58E0BD2 second address: 58E0BD8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 58E0BD8 second address: 58E0C14 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF2E55A2C2Ch 0x00000009 and ax, 1228h 0x0000000e jmp 00007FF2E55A2C2Bh 0x00000013 popfd 0x00000014 mov si, EB1Fh 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b xchg eax, ebp 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FF2E55A2C31h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 58E0C14 second address: 58E0C98 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF2E5514DF7h 0x00000009 sbb si, 40CEh 0x0000000e jmp 00007FF2E5514DF9h 0x00000013 popfd 0x00000014 pushfd 0x00000015 jmp 00007FF2E5514DF0h 0x0000001a adc ax, 3948h 0x0000001f jmp 00007FF2E5514DEBh 0x00000024 popfd 0x00000025 popad 0x00000026 pop edx 0x00000027 pop eax 0x00000028 push eax 0x00000029 pushad 0x0000002a jmp 00007FF2E5514DEFh 0x0000002f mov ah, 3Fh 0x00000031 popad 0x00000032 xchg eax, ebp 0x00000033 push eax 0x00000034 push edx 0x00000035 jmp 00007FF2E5514DEEh 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 58E0C98 second address: 58E0C9E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 58E0C9E second address: 58E0CA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 58E0CA2 second address: 58E0CD0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a jmp 00007FF2E55A2C39h 0x0000000f push dword ptr [ebp+04h] 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 mov ax, di 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 58E0CD0 second address: 58E0CD5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 58E0CD5 second address: 58E0CDA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59309AA second address: 59309AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59309AE second address: 59309B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59309B2 second address: 59309B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59309B8 second address: 59309E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cl, 34h 0x00000005 movsx edi, si 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d mov ecx, 3DFD71AFh 0x00000012 pushad 0x00000013 call 00007FF2E55A2C32h 0x00000018 pop eax 0x00000019 mov eax, edi 0x0000001b popad 0x0000001c popad 0x0000001d push eax 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59309E9 second address: 59309ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59309ED second address: 59309F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59309F1 second address: 59309F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59309F7 second address: 59309FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59309FD second address: 5930A01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5930A01 second address: 5930A18 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5930A18 second address: 5930A35 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5980379 second address: 598037F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 598037F second address: 5980383 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5980383 second address: 59803B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C33h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF2E55A2C34h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59803B3 second address: 59803B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59803B9 second address: 59803BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5960E03 second address: 5960E09 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5960E09 second address: 5960E0E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 58F054D second address: 58F0553 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 58F0553 second address: 58F0557 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 58F0557 second address: 58F0583 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DEDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d jmp 00007FF2E5514DEEh 0x00000012 pop ebp 0x00000013 pushad 0x00000014 push esi 0x00000015 mov dl, 1Ch 0x00000017 pop esi 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 596063D second address: 5960662 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C31h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF2E55A2C2Dh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5960662 second address: 5960668 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5960668 second address: 596066C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 596066C second address: 59606ED instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FF2E5514DEFh 0x00000013 jmp 00007FF2E5514DF3h 0x00000018 popfd 0x00000019 pushad 0x0000001a pushfd 0x0000001b jmp 00007FF2E5514DF6h 0x00000020 xor esi, 3A0D51E8h 0x00000026 jmp 00007FF2E5514DEBh 0x0000002b popfd 0x0000002c mov ecx, 076D95DFh 0x00000031 popad 0x00000032 popad 0x00000033 xchg eax, ebp 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 jmp 00007FF2E5514DECh 0x0000003d rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59606ED second address: 59606F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59606F1 second address: 59606F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59606F7 second address: 596070C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx eax, dx 0x00000006 mov di, F68Ch 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov ebp, esp 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 596070C second address: 5960728 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5960728 second address: 596073A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E55A2C2Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5960C5C second address: 5960C79 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5960C79 second address: 5960C98 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C31h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov ax, 6CE9h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5960C98 second address: 5960C9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5960C9D second address: 5960CCF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C35h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FF2E55A2C2Eh 0x0000000f mov ebp, esp 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov esi, edx 0x00000016 push edx 0x00000017 pop ecx 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5960CCF second address: 5960CD4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5960CD4 second address: 5960D5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007FF2E55A2C2Eh 0x0000000a xor si, 8348h 0x0000000f jmp 00007FF2E55A2C2Bh 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 mov eax, dword ptr [ebp+08h] 0x0000001b pushad 0x0000001c movzx esi, bx 0x0000001f mov edi, 5CC8DA24h 0x00000024 popad 0x00000025 and dword ptr [eax], 00000000h 0x00000028 jmp 00007FF2E55A2C33h 0x0000002d and dword ptr [eax+04h], 00000000h 0x00000031 pushad 0x00000032 pushad 0x00000033 push eax 0x00000034 pop edi 0x00000035 pushad 0x00000036 popad 0x00000037 popad 0x00000038 pushfd 0x00000039 jmp 00007FF2E55A2C2Ch 0x0000003e xor al, 00000008h 0x00000041 jmp 00007FF2E55A2C2Bh 0x00000046 popfd 0x00000047 popad 0x00000048 pop ebp 0x00000049 push eax 0x0000004a push edx 0x0000004b jmp 00007FF2E55A2C35h 0x00000050 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5930929 second address: 593092D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 593092D second address: 5930933 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5960F85 second address: 5960F94 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59107F3 second address: 5910877 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, edx 0x00000005 pushfd 0x00000006 jmp 00007FF2E55A2C2Bh 0x0000000b sbb al, 0000004Eh 0x0000000e jmp 00007FF2E55A2C39h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 xchg eax, ebp 0x00000018 pushad 0x00000019 push eax 0x0000001a push ebx 0x0000001b pop eax 0x0000001c pop edi 0x0000001d popad 0x0000001e push eax 0x0000001f pushad 0x00000020 mov cx, dx 0x00000023 pushfd 0x00000024 jmp 00007FF2E55A2C33h 0x00000029 jmp 00007FF2E55A2C33h 0x0000002e popfd 0x0000002f popad 0x00000030 xchg eax, ebp 0x00000031 pushad 0x00000032 movzx ecx, dx 0x00000035 popad 0x00000036 mov ebp, esp 0x00000038 jmp 00007FF2E55A2C2Ah 0x0000003d pop ebp 0x0000003e push eax 0x0000003f push edx 0x00000040 pushad 0x00000041 mov cx, di 0x00000044 mov dx, F0CCh 0x00000048 popad 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5970E0A second address: 5970E2E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, E484h 0x00000007 push edi 0x00000008 pop esi 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, ebp 0x0000000d jmp 00007FF2E5514DEFh 0x00000012 mov ebp, esp 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5970E2E second address: 5970E32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5970E32 second address: 5970E38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5970E38 second address: 5970EBD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a pushad 0x0000000b movzx ecx, di 0x0000000e popad 0x0000000f push eax 0x00000010 jmp 00007FF2E55A2C34h 0x00000015 xchg eax, ecx 0x00000016 pushad 0x00000017 jmp 00007FF2E55A2C2Eh 0x0000001c movzx esi, dx 0x0000001f popad 0x00000020 mov eax, dword ptr [777265FCh] 0x00000025 jmp 00007FF2E55A2C2Dh 0x0000002a test eax, eax 0x0000002c pushad 0x0000002d pushad 0x0000002e mov dh, ch 0x00000030 mov bl, 77h 0x00000032 popad 0x00000033 push eax 0x00000034 push edx 0x00000035 pop ecx 0x00000036 pop edx 0x00000037 popad 0x00000038 je 00007FF3572D56F7h 0x0000003e pushad 0x0000003f pushad 0x00000040 movzx esi, bx 0x00000043 mov edi, 7D806BD2h 0x00000048 popad 0x00000049 push edi 0x0000004a movzx ecx, di 0x0000004d pop ebx 0x0000004e popad 0x0000004f mov ecx, eax 0x00000051 push eax 0x00000052 push edx 0x00000053 jmp 00007FF2E55A2C2Dh 0x00000058 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5970EBD second address: 5970F32 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, dx 0x00000006 pushfd 0x00000007 jmp 00007FF2E5514DF3h 0x0000000c and eax, 26EE5D2Eh 0x00000012 jmp 00007FF2E5514DF9h 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b xor eax, dword ptr [ebp+08h] 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 pushfd 0x00000022 jmp 00007FF2E5514DF8h 0x00000027 jmp 00007FF2E5514DF5h 0x0000002c popfd 0x0000002d mov bh, cl 0x0000002f popad 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5970F32 second address: 5970F6C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 and ecx, 1Fh 0x0000000c jmp 00007FF2E55A2C30h 0x00000011 ror eax, cl 0x00000013 jmp 00007FF2E55A2C30h 0x00000018 leave 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5970F6C second address: 5970F72 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59701E4 second address: 5970237 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C31h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [ebp+08h] 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007FF2E55A2C33h 0x00000015 sbb ecx, 2A981A3Eh 0x0000001b jmp 00007FF2E55A2C39h 0x00000020 popfd 0x00000021 movzx eax, dx 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5970237 second address: 5970275 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, cx 0x00000006 mov eax, 00CC3F9Bh 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e and dword ptr [eax], 00000000h 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 movsx edx, si 0x00000017 pushfd 0x00000018 jmp 00007FF2E5514DF4h 0x0000001d sbb cx, F998h 0x00000022 jmp 00007FF2E5514DEBh 0x00000027 popfd 0x00000028 popad 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5970275 second address: 5970299 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5970299 second address: 597029D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 597029D second address: 59702B0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 593001E second address: 5930024 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5930024 second address: 5930056 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, ecx 0x00000005 mov si, F9AFh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, ebp 0x0000000d jmp 00007FF2E55A2C32h 0x00000012 push eax 0x00000013 jmp 00007FF2E55A2C2Bh 0x00000018 xchg eax, ebp 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5930056 second address: 5930071 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5930071 second address: 5930089 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E55A2C34h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5930089 second address: 593008D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 593008D second address: 59300D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a pushad 0x0000000b pushad 0x0000000c mov ebx, 18AD75AEh 0x00000011 push ebx 0x00000012 pop ecx 0x00000013 popad 0x00000014 pushfd 0x00000015 jmp 00007FF2E55A2C2Bh 0x0000001a and esi, 23B8A65Eh 0x00000020 jmp 00007FF2E55A2C39h 0x00000025 popfd 0x00000026 popad 0x00000027 and esp, FFFFFFF8h 0x0000002a push eax 0x0000002b push edx 0x0000002c push eax 0x0000002d push edx 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59300D7 second address: 59300DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59300DB second address: 59300DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59300DF second address: 59300E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59300E5 second address: 5930129 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF2E55A2C37h 0x00000009 sbb si, E11Eh 0x0000000e jmp 00007FF2E55A2C39h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 xchg eax, ecx 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5930129 second address: 593012D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 593012D second address: 5930131 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5930131 second address: 5930137 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5930137 second address: 593013D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 593013D second address: 5930156 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5930156 second address: 593015A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 593015A second address: 5930160 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5930160 second address: 5930166 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5930166 second address: 593020B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ecx 0x00000009 jmp 00007FF2E5514DEDh 0x0000000e xchg eax, ebx 0x0000000f pushad 0x00000010 mov ecx, 5CA77E43h 0x00000015 mov dl, ch 0x00000017 popad 0x00000018 push eax 0x00000019 jmp 00007FF2E5514DF2h 0x0000001e xchg eax, ebx 0x0000001f jmp 00007FF2E5514DF0h 0x00000024 mov ebx, dword ptr [ebp+10h] 0x00000027 pushad 0x00000028 jmp 00007FF2E5514DEEh 0x0000002d mov ah, 1Dh 0x0000002f popad 0x00000030 push ebx 0x00000031 jmp 00007FF2E5514DEAh 0x00000036 mov dword ptr [esp], esi 0x00000039 jmp 00007FF2E5514DF0h 0x0000003e mov esi, dword ptr [ebp+08h] 0x00000041 jmp 00007FF2E5514DF0h 0x00000046 xchg eax, edi 0x00000047 jmp 00007FF2E5514DF0h 0x0000004c push eax 0x0000004d push eax 0x0000004e push edx 0x0000004f pushad 0x00000050 mov eax, 5FF38DC3h 0x00000055 popad 0x00000056 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 593020B second address: 593022D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C35h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, edi 0x0000000a pushad 0x0000000b mov bx, si 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 593022D second address: 5930289 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FF2E5514DF4h 0x00000008 sub ax, 1EE8h 0x0000000d jmp 00007FF2E5514DEBh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 test esi, esi 0x00000018 pushad 0x00000019 pushfd 0x0000001a jmp 00007FF2E5514DF4h 0x0000001f jmp 00007FF2E5514DF5h 0x00000024 popfd 0x00000025 push eax 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5930289 second address: 59302DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 je 00007FF357310FACh 0x0000000c pushad 0x0000000d mov dx, ax 0x00000010 pushfd 0x00000011 jmp 00007FF2E55A2C32h 0x00000016 and ch, FFFFFFD8h 0x00000019 jmp 00007FF2E55A2C2Bh 0x0000001e popfd 0x0000001f popad 0x00000020 cmp dword ptr [esi+08h], DDEEDDEEh 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007FF2E55A2C35h 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59302DA second address: 59302DF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59302DF second address: 5930368 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 je 00007FF357310F6Bh 0x0000000d jmp 00007FF2E55A2C36h 0x00000012 mov edx, dword ptr [esi+44h] 0x00000015 jmp 00007FF2E55A2C30h 0x0000001a or edx, dword ptr [ebp+0Ch] 0x0000001d jmp 00007FF2E55A2C30h 0x00000022 test edx, 61000000h 0x00000028 pushad 0x00000029 mov al, C3h 0x0000002b call 00007FF2E55A2C33h 0x00000030 movzx esi, dx 0x00000033 pop edi 0x00000034 popad 0x00000035 jne 00007FF357310F65h 0x0000003b push eax 0x0000003c push edx 0x0000003d jmp 00007FF2E55A2C37h 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5930368 second address: 593036F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 593036F second address: 5930381 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 test byte ptr [esi+48h], 00000001h 0x0000000b pushad 0x0000000c mov eax, edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5940044 second address: 5940093 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF2E5514DF5h 0x00000009 sbb ax, 4636h 0x0000000e jmp 00007FF2E5514DF1h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push eax 0x00000018 jmp 00007FF2E5514DECh 0x0000001d xchg eax, ebp 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007FF2E5514DEAh 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5940093 second address: 5940097 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5940097 second address: 594009D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 594009D second address: 59400AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E55A2C2Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59400AE second address: 59400D2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF2E5514DF8h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59400D2 second address: 5940112 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF2E55A2C31h 0x00000008 mov ebx, ecx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d and esp, FFFFFFF8h 0x00000010 jmp 00007FF2E55A2C2Ah 0x00000015 xchg eax, ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FF2E55A2C37h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5940112 second address: 5940118 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5940118 second address: 594011C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 594011C second address: 59401BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FF2E5514DEEh 0x0000000e xchg eax, ebx 0x0000000f pushad 0x00000010 mov di, cx 0x00000013 pushad 0x00000014 movzx ecx, bx 0x00000017 popad 0x00000018 popad 0x00000019 push edx 0x0000001a pushad 0x0000001b pushfd 0x0000001c jmp 00007FF2E5514DEAh 0x00000021 and ecx, 471E2068h 0x00000027 jmp 00007FF2E5514DEBh 0x0000002c popfd 0x0000002d mov edx, esi 0x0000002f popad 0x00000030 mov dword ptr [esp], esi 0x00000033 pushad 0x00000034 push ecx 0x00000035 jmp 00007FF2E5514DF7h 0x0000003a pop esi 0x0000003b mov bh, BDh 0x0000003d popad 0x0000003e mov esi, dword ptr [ebp+08h] 0x00000041 pushad 0x00000042 movzx esi, di 0x00000045 call 00007FF2E5514DF3h 0x0000004a push eax 0x0000004b pop edx 0x0000004c pop eax 0x0000004d popad 0x0000004e mov ebx, 00000000h 0x00000053 push eax 0x00000054 push edx 0x00000055 jmp 00007FF2E5514DF7h 0x0000005a rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59401BC second address: 59401C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59401C2 second address: 594025E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test esi, esi 0x0000000a pushad 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FF2E5514DF3h 0x00000012 add eax, 5990747Eh 0x00000018 jmp 00007FF2E5514DF9h 0x0000001d popfd 0x0000001e pushfd 0x0000001f jmp 00007FF2E5514DF0h 0x00000024 jmp 00007FF2E5514DF5h 0x00000029 popfd 0x0000002a popad 0x0000002b jmp 00007FF2E5514DF0h 0x00000030 popad 0x00000031 je 00007FF35726AF39h 0x00000037 jmp 00007FF2E5514DF0h 0x0000003c cmp dword ptr [esi+08h], DDEEDDEEh 0x00000043 push eax 0x00000044 push edx 0x00000045 push eax 0x00000046 push edx 0x00000047 push eax 0x00000048 push edx 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 594025E second address: 5940262 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5940262 second address: 5940266 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5940266 second address: 594026C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 594026C second address: 59402E0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FF2E5514DF0h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov ecx, esi 0x0000000f jmp 00007FF2E5514DF0h 0x00000014 je 00007FF35726AEF3h 0x0000001a jmp 00007FF2E5514DF0h 0x0000001f test byte ptr [77726968h], 00000002h 0x00000026 push eax 0x00000027 push edx 0x00000028 pushad 0x00000029 mov si, di 0x0000002c pushfd 0x0000002d jmp 00007FF2E5514DF9h 0x00000032 jmp 00007FF2E5514DEBh 0x00000037 popfd 0x00000038 popad 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59402E0 second address: 59402F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E55A2C34h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59402F8 second address: 59402FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59402FC second address: 5940340 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jne 00007FF3572F8CD8h 0x0000000e pushad 0x0000000f jmp 00007FF2E55A2C38h 0x00000014 popad 0x00000015 mov edx, dword ptr [ebp+0Ch] 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FF2E55A2C37h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5940340 second address: 59403FC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007FF2E5514DECh 0x00000011 or ax, 31A8h 0x00000016 jmp 00007FF2E5514DEBh 0x0000001b popfd 0x0000001c mov ah, 60h 0x0000001e popad 0x0000001f push eax 0x00000020 pushad 0x00000021 call 00007FF2E5514DF0h 0x00000026 pushad 0x00000027 popad 0x00000028 pop ecx 0x00000029 mov dx, F8B4h 0x0000002d popad 0x0000002e xchg eax, ebx 0x0000002f pushad 0x00000030 push edi 0x00000031 pop edx 0x00000032 mov dx, ax 0x00000035 popad 0x00000036 xchg eax, ebx 0x00000037 pushad 0x00000038 pushfd 0x00000039 jmp 00007FF2E5514DF8h 0x0000003e or al, FFFFFF98h 0x00000041 jmp 00007FF2E5514DEBh 0x00000046 popfd 0x00000047 pushfd 0x00000048 jmp 00007FF2E5514DF8h 0x0000004d adc al, FFFFFFF8h 0x00000050 jmp 00007FF2E5514DEBh 0x00000055 popfd 0x00000056 popad 0x00000057 push eax 0x00000058 push eax 0x00000059 push edx 0x0000005a push eax 0x0000005b push edx 0x0000005c push eax 0x0000005d push edx 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59403FC second address: 5940400 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5940400 second address: 5940412 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DEEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5940412 second address: 5940429 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 77954804h 0x00000008 push edi 0x00000009 pop esi 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov di, ax 0x00000014 mov bl, ch 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5940429 second address: 5940463 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+14h] 0x0000000c pushad 0x0000000d movzx ecx, dx 0x00000010 mov bh, 4Ah 0x00000012 popad 0x00000013 push dword ptr [ebp+10h] 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FF2E5514DF1h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5940463 second address: 5940473 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E55A2C2Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59A1952 second address: 59A1984 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF2E5514DF8h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59A1984 second address: 59A1993 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59A1993 second address: 59A199B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edi, si 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59A199B second address: 59A19AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FF2E55A2C2Ah 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59A19AF second address: 59A19E4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 10303324h 0x00000008 mov ecx, edi 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007FF2E5514DF0h 0x00000017 or cl, FFFFFFD8h 0x0000001a jmp 00007FF2E5514DEBh 0x0000001f popfd 0x00000020 mov bx, cx 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59A19E4 second address: 59A1A40 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C35h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c call 00007FF2E55A2C2Ch 0x00000011 push esi 0x00000012 pop edx 0x00000013 pop eax 0x00000014 jmp 00007FF2E55A2C37h 0x00000019 popad 0x0000001a push 0000007Fh 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FF2E55A2C35h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59A1AC4 second address: 59A1ACA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59A1ACA second address: 59A1952 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C2Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a jmp 00007FF2E55A2C30h 0x0000000f retn 0004h 0x00000012 lea eax, dword ptr [ebp-10h] 0x00000015 push eax 0x00000016 call ebx 0x00000018 mov edi, edi 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007FF2E55A2C35h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5940687 second address: 5940696 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5940696 second address: 594069C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 594069C second address: 59406BA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF2E5514DF3h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59406BA second address: 5940735 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF2E55A2C2Fh 0x00000009 xor ah, 0000002Eh 0x0000000c jmp 00007FF2E55A2C39h 0x00000011 popfd 0x00000012 pushfd 0x00000013 jmp 00007FF2E55A2C30h 0x00000018 and cl, FFFFFFA8h 0x0000001b jmp 00007FF2E55A2C2Bh 0x00000020 popfd 0x00000021 popad 0x00000022 pop edx 0x00000023 pop eax 0x00000024 mov dword ptr [esp], ebp 0x00000027 jmp 00007FF2E55A2C36h 0x0000002c mov ebp, esp 0x0000002e pushad 0x0000002f mov di, 0520h 0x00000033 popad 0x00000034 pop ebp 0x00000035 push eax 0x00000036 push edx 0x00000037 push eax 0x00000038 push edx 0x00000039 pushad 0x0000003a popad 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5940735 second address: 5940739 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5940739 second address: 594073F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59C002F second address: 59C0035 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59C0035 second address: 59C003B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59C003B second address: 59C003F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59C003F second address: 59C004E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59C004E second address: 59C0052 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59C0052 second address: 59C0056 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59C0056 second address: 59C005C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59C005C second address: 59C0075 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF2E55A2C35h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59C0075 second address: 59C009D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DF1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FF2E5514DEDh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59C009D second address: 59C00EA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C31h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+0Ch] 0x0000000c jmp 00007FF2E55A2C2Eh 0x00000011 push dword ptr [ebp+08h] 0x00000014 jmp 00007FF2E55A2C30h 0x00000019 call 00007FF2E55A2C29h 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 mov edi, 1F141A80h 0x00000026 mov esi, edi 0x00000028 popad 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59C00EA second address: 59C00EF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59C00EF second address: 59C0112 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FF2E55A2C39h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59C0112 second address: 59C01A9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop esi 0x00000005 movsx edi, ax 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f pushad 0x00000010 push edi 0x00000011 movzx ecx, dx 0x00000014 pop ebx 0x00000015 popad 0x00000016 mov eax, dword ptr [eax] 0x00000018 pushad 0x00000019 mov ebx, 3A921896h 0x0000001e popad 0x0000001f mov dword ptr [esp+04h], eax 0x00000023 pushad 0x00000024 mov al, 31h 0x00000026 pushfd 0x00000027 jmp 00007FF2E5514DEBh 0x0000002c or cx, 051Eh 0x00000031 jmp 00007FF2E5514DF9h 0x00000036 popfd 0x00000037 popad 0x00000038 pop eax 0x00000039 push eax 0x0000003a push edx 0x0000003b pushad 0x0000003c pushfd 0x0000003d jmp 00007FF2E5514DF3h 0x00000042 jmp 00007FF2E5514DF3h 0x00000047 popfd 0x00000048 jmp 00007FF2E5514DF8h 0x0000004d popad 0x0000004e rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 597081A second address: 5970820 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5970820 second address: 5970824 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5970824 second address: 5970853 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FF2E55A2C2Dh 0x0000000e xchg eax, ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 mov bx, A69Eh 0x00000016 call 00007FF2E55A2C2Fh 0x0000001b pop ecx 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5970853 second address: 597087B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, 1046808Bh 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c jmp 00007FF2E5514DEAh 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FF2E5514DEDh 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 597087B second address: 5970881 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5970881 second address: 5970898 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E5514DECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 5970898 second address: 59708B5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF2E55A2C39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59708B5 second address: 59708BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59708BB second address: 59708BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\hunta[1].exe | RDTSC instruction interceptor: First address: 59708BF second address: 59708C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |