Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 81CFD7 second address: 81CFDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 81CFDB second address: 81CFDF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 81CFDF second address: 81CFE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 81CFE5 second address: 81CFFB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0E05506CF2h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 81CFFB second address: 81C8E1 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b ja 00007F0E05507503h 0x00000011 push dword ptr [ebp+122D16A9h] 0x00000017 jng 00007F0E05507502h 0x0000001d call dword ptr [ebp+122D18E1h] 0x00000023 pushad 0x00000024 ja 00007F0E05507510h 0x0000002a xor eax, eax 0x0000002c jmp 00007F0E05507509h 0x00000031 mov edx, dword ptr [esp+28h] 0x00000035 cmc 0x00000036 mov dword ptr [ebp+122D36EAh], eax 0x0000003c clc 0x0000003d mov esi, 0000003Ch 0x00000042 jmp 00007F0E05507509h 0x00000047 add esi, dword ptr [esp+24h] 0x0000004b pushad 0x0000004c jmp 00007F0E05507504h 0x00000051 sub ah, 0000007Bh 0x00000054 popad 0x00000055 jmp 00007F0E055074FFh 0x0000005a lodsw 0x0000005c sub dword ptr [ebp+122D1831h], ebx 0x00000062 add eax, dword ptr [esp+24h] 0x00000066 mov dword ptr [ebp+122D1831h], ebx 0x0000006c mov ebx, dword ptr [esp+24h] 0x00000070 sub dword ptr [ebp+122D1831h], ecx 0x00000076 nop 0x00000077 jo 00007F0E055074FEh 0x0000007d jng 00007F0E055074F8h 0x00000083 pushad 0x00000084 popad 0x00000085 push eax 0x00000086 pushad 0x00000087 jmp 00007F0E05507504h 0x0000008c push eax 0x0000008d push edx 0x0000008e pushad 0x0000008f popad 0x00000090 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 997AB1 second address: 997AB5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 997AB5 second address: 997ACB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F0E055074FEh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 997ACB second address: 997AEB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0E05506CF6h 0x00000009 ja 00007F0E05506CE6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 997AEB second address: 997AF1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 996B1F second address: 996B29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 push edx 0x00000009 pop edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 996B29 second address: 996B33 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F0E055074F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 996B33 second address: 996B39 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 996B39 second address: 996B3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 996B3F second address: 996B43 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 996B43 second address: 996B50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 996DD0 second address: 996DD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 996DD6 second address: 996DDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 996DDA second address: 996DDE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 996DDE second address: 996DE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 996DE4 second address: 996DED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 996DED second address: 996DF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 996DF6 second address: 996DFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 996F95 second address: 996FA5 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F0E055074F6h 0x00000008 jc 00007F0E055074F6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9973AC second address: 9973B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 999B61 second address: 999B91 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E055074FCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a nop 0x0000000b add dword ptr [ebp+122D1B77h], ebx 0x00000011 push 00000000h 0x00000013 call 00007F0E055074FAh 0x00000018 mov ecx, esi 0x0000001a pop ecx 0x0000001b push C7C11652h 0x00000020 push ecx 0x00000021 push ecx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 999C92 second address: 999CC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop ebx 0x00000006 mov dword ptr [esp], eax 0x00000009 jmp 00007F0E05506CF0h 0x0000000e mov dx, di 0x00000011 push 00000000h 0x00000013 movsx esi, ax 0x00000016 call 00007F0E05506CE9h 0x0000001b push edx 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 999DB4 second address: 999DB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 999DB8 second address: 999DBE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 999DBE second address: 999DC4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 999DC4 second address: 999E40 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F0E05506CF7h 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 pushad 0x00000013 push edi 0x00000014 push edx 0x00000015 pop edx 0x00000016 pop edi 0x00000017 jmp 00007F0E05506CEEh 0x0000001c popad 0x0000001d mov eax, dword ptr [eax] 0x0000001f jmp 00007F0E05506CF7h 0x00000024 mov dword ptr [esp+04h], eax 0x00000028 push edi 0x00000029 pushad 0x0000002a jmp 00007F0E05506CEEh 0x0000002f push eax 0x00000030 pop eax 0x00000031 popad 0x00000032 pop edi 0x00000033 pop eax 0x00000034 mov dword ptr [ebp+122D19F2h], esi 0x0000003a lea ebx, dword ptr [ebp+12450A3Dh] 0x00000040 xchg eax, ebx 0x00000041 push ebx 0x00000042 push eax 0x00000043 push edx 0x00000044 pushad 0x00000045 popad 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 999ED0 second address: 999F0C instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 jmp 00007F0E05507509h 0x0000000c pop edi 0x0000000d popad 0x0000000e nop 0x0000000f mov edx, dword ptr [ebp+122D35DAh] 0x00000015 push 00000000h 0x00000017 or dword ptr [ebp+122D1B64h], ebx 0x0000001d push E8D5CF71h 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 pushad 0x00000027 popad 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 999F0C second address: 999F12 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 999F12 second address: 999F58 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F0E055074F8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a add dword ptr [esp], 172A310Fh 0x00000011 or dword ptr [ebp+122DB4F1h], ebx 0x00000017 push 00000003h 0x00000019 mov dword ptr [ebp+122DB4E1h], eax 0x0000001f push 00000000h 0x00000021 mov edi, 2B3B73E7h 0x00000026 push 00000003h 0x00000028 pushad 0x00000029 sbb eax, 2D67685Eh 0x0000002f jg 00007F0E055074F6h 0x00000035 popad 0x00000036 push FA8B753Ah 0x0000003b jbe 00007F0E05507504h 0x00000041 pushad 0x00000042 push eax 0x00000043 push edx 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 999F58 second address: 999F8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F0E05506CE6h 0x0000000a popad 0x0000000b xor dword ptr [esp], 3A8B753Ah 0x00000012 adc di, 4836h 0x00000017 mov edi, edx 0x00000019 lea ebx, dword ptr [ebp+12450A48h] 0x0000001f mov di, si 0x00000022 push eax 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007F0E05506CEEh 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 999F8B second address: 999F91 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 981BC4 second address: 981C15 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CF4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jnl 00007F0E05506CFEh 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F0E05506CF9h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9B940A second address: 9B940F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9B96A5 second address: 9B96CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0E05506CF6h 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e jno 00007F0E05506CE6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9B96CA second address: 9B96D8 instructions: 0x00000000 rdtsc 0x00000002 je 00007F0E055074F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9B9AF8 second address: 9B9B0A instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F0E05506CE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a je 00007F0E05506CECh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9B9FD9 second address: 9BA013 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F0E055074F6h 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0E05507506h 0x00000011 jmp 00007F0E05507508h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9BA152 second address: 9BA166 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F0E05506CE6h 0x0000000a popad 0x0000000b pushad 0x0000000c jl 00007F0E05506CE6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9BA166 second address: 9BA16C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9BA16C second address: 9BA176 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9BA176 second address: 9BA184 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9BA184 second address: 9BA19C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CF4h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9BA19C second address: 9BA1A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9BA1A2 second address: 9BA1C5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CEDh 0x00000007 pushad 0x00000008 jnl 00007F0E05506CE6h 0x0000000e jmp 00007F0E05506CEBh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9BA5BB second address: 9BA5BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9BA5BF second address: 9BA5CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9BAEA4 second address: 9BAEE4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E055074FCh 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jc 00007F0E0550751Eh 0x00000011 jmp 00007F0E05507504h 0x00000016 jmp 00007F0E05507504h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9BAEE4 second address: 9BAF11 instructions: 0x00000000 rdtsc 0x00000002 je 00007F0E05506D03h 0x00000008 jg 00007F0E05506CECh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9BB36E second address: 9BB372 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9BEDEE second address: 9BEDFA instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jo 00007F0E05506CE6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C2658 second address: 9C265E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C2CB6 second address: 9C2CBC instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C2CBC second address: 9C2CD6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0E05507505h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C3C6C second address: 9C3C70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C3C70 second address: 9C3C74 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C3C74 second address: 9C3CD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jl 00007F0E05506CF3h 0x0000000d jmp 00007F0E05506CEDh 0x00000012 mov eax, dword ptr [esp+04h] 0x00000016 pushad 0x00000017 jmp 00007F0E05506CEEh 0x0000001c jmp 00007F0E05506CF7h 0x00000021 popad 0x00000022 mov eax, dword ptr [eax] 0x00000024 push ecx 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007F0E05506CF5h 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C3CD3 second address: 9C3CF6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e jmp 00007F0E05507504h 0x00000013 pop ebx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C3ED7 second address: 9C3EE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F0E05506CEAh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C6C80 second address: 9C6CA3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007F0E05507508h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C6CA3 second address: 9C6CA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C6CA9 second address: 9C6CC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push edi 0x0000000a pushad 0x0000000b popad 0x0000000c pop edi 0x0000000d jne 00007F0E05507502h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C6CC8 second address: 9C6CCD instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C6FCF second address: 9C6FDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jng 00007F0E055074F6h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C6FDE second address: 9C6FF5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CF3h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C7445 second address: 9C744B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C744B second address: 9C748A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0E05506CF4h 0x00000009 jmp 00007F0E05506CF4h 0x0000000e popad 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 popad 0x00000015 pop edi 0x00000016 push ecx 0x00000017 push eax 0x00000018 push edx 0x00000019 jl 00007F0E05506CE6h 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C748A second address: 9C748E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C75F3 second address: 9C75F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C75F9 second address: 9C75FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C75FF second address: 9C7607 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CAA24 second address: 9CAA2A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CAA2A second address: 9CAA4D instructions: 0x00000000 rdtsc 0x00000002 je 00007F0E05506CE8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c add dword ptr [esp], 6354CEF1h 0x00000013 movzx edi, dx 0x00000016 call 00007F0E05506CE9h 0x0000001b push esi 0x0000001c push edi 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CAA4D second address: 9CAA5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push edi 0x0000000b pop edi 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CAA5C second address: 9CAA61 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CAE19 second address: 9CAE33 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F0E055074F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jp 00007F0E055074FCh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CB09D second address: 9CB0A7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CB0A7 second address: 9CB0AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CB4C2 second address: 9CB4C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CB586 second address: 9CB58C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CB7D5 second address: 9CB7D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CB7D9 second address: 9CB7E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CB7E3 second address: 9CB7E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CB7E7 second address: 9CB7F3 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edi 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CB7F3 second address: 9CB7F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CBA89 second address: 9CBAB1 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F0E055074FCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d mov edi, dword ptr [ebp+122D35A2h] 0x00000013 push eax 0x00000014 je 00007F0E05507508h 0x0000001a push eax 0x0000001b push edx 0x0000001c jbe 00007F0E055074F6h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CBAB1 second address: 9CBAB5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CBEFE second address: 9CBF03 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CBF03 second address: 9CBF09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CBF09 second address: 9CBF5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 mov edi, dword ptr [ebp+122D361Ah] 0x0000000e push 00000000h 0x00000010 or edi, 503F157Dh 0x00000016 push 00000000h 0x00000018 push 00000000h 0x0000001a push ebp 0x0000001b call 00007F0E055074F8h 0x00000020 pop ebp 0x00000021 mov dword ptr [esp+04h], ebp 0x00000025 add dword ptr [esp+04h], 00000014h 0x0000002d inc ebp 0x0000002e push ebp 0x0000002f ret 0x00000030 pop ebp 0x00000031 ret 0x00000032 xchg eax, ebx 0x00000033 jmp 00007F0E05507501h 0x00000038 push eax 0x00000039 push eax 0x0000003a push edx 0x0000003b jnp 00007F0E055074F8h 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CBF5A second address: 9CBF5F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CC96D second address: 9CC993 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05507502h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jmp 00007F0E055074FDh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CC7F5 second address: 9CC7FB instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CC7FB second address: 9CC801 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CEFFF second address: 9CF009 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F0E05506CE6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CF009 second address: 9CF00D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CF00D second address: 9CF055 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F0E05506CF5h 0x0000000e nop 0x0000000f mov edi, dword ptr [ebp+122D362Ah] 0x00000015 push 00000000h 0x00000017 stc 0x00000018 push 00000000h 0x0000001a xor di, D20Ah 0x0000001f xchg eax, ebx 0x00000020 pushad 0x00000021 jnc 00007F0E05506CF3h 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a popad 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CF055 second address: 9CF059 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CED8C second address: 9CED96 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F0E05506CE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CFAE0 second address: 9CFAE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CFAE5 second address: 9CFAEB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D0ED3 second address: 9D0ED8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D0ED8 second address: 9D0F3D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007F0E05506CE6h 0x00000009 push edx 0x0000000a pop edx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov dword ptr [esp], eax 0x00000011 push 00000000h 0x00000013 push eax 0x00000014 call 00007F0E05506CE8h 0x00000019 pop eax 0x0000001a mov dword ptr [esp+04h], eax 0x0000001e add dword ptr [esp+04h], 00000018h 0x00000026 inc eax 0x00000027 push eax 0x00000028 ret 0x00000029 pop eax 0x0000002a ret 0x0000002b push 00000000h 0x0000002d push 00000000h 0x0000002f push esi 0x00000030 call 00007F0E05506CE8h 0x00000035 pop esi 0x00000036 mov dword ptr [esp+04h], esi 0x0000003a add dword ptr [esp+04h], 00000017h 0x00000042 inc esi 0x00000043 push esi 0x00000044 ret 0x00000045 pop esi 0x00000046 ret 0x00000047 mov esi, dword ptr [ebp+122D1B25h] 0x0000004d push 00000000h 0x0000004f mov dword ptr [ebp+122D19F2h], edi 0x00000055 xchg eax, ebx 0x00000056 push ecx 0x00000057 push ebx 0x00000058 push eax 0x00000059 push edx 0x0000005a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D0F3D second address: 9D0F4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 js 00007F0E05507500h 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D24D5 second address: 9D24DF instructions: 0x00000000 rdtsc 0x00000002 jp 00007F0E05506CE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D2A45 second address: 9D2ABB instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F0E055074F8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push eax 0x0000000e call 00007F0E055074F8h 0x00000013 pop eax 0x00000014 mov dword ptr [esp+04h], eax 0x00000018 add dword ptr [esp+04h], 00000018h 0x00000020 inc eax 0x00000021 push eax 0x00000022 ret 0x00000023 pop eax 0x00000024 ret 0x00000025 mov ebx, eax 0x00000027 push 00000000h 0x00000029 push 00000000h 0x0000002b push esi 0x0000002c call 00007F0E055074F8h 0x00000031 pop esi 0x00000032 mov dword ptr [esp+04h], esi 0x00000036 add dword ptr [esp+04h], 0000001Dh 0x0000003e inc esi 0x0000003f push esi 0x00000040 ret 0x00000041 pop esi 0x00000042 ret 0x00000043 mov di, bx 0x00000046 push 00000000h 0x00000048 sbb bx, 6F35h 0x0000004d xchg eax, esi 0x0000004e push eax 0x0000004f push edx 0x00000050 jmp 00007F0E05507503h 0x00000055 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D2ABB second address: 9D2AE2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CEEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F0E05506CF1h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D2AE2 second address: 9D2AE6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D4C0A second address: 9D4C0E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D4C0E second address: 9D4C39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jl 00007F0E0550750Fh 0x0000000c jmp 00007F0E05507509h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D4C39 second address: 9D4C3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D5C31 second address: 9D5C51 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F0E055074FCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e jmp 00007F0E055074FBh 0x00000013 pop ebx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D025D second address: 9D0267 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F0E05506CE6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D7B3D second address: 9D7B59 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0E05507508h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D7B59 second address: 9D7B5D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D8C26 second address: 9D8C30 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F0E055074FCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9DAC3D second address: 9DAC41 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9DAC41 second address: 9DAC47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9DAC47 second address: 9DAC51 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F0E05506CE6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 98375B second address: 98375F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 98375F second address: 983765 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 983765 second address: 98376E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D0CA9 second address: 9D0CAD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D3CF5 second address: 9D3CFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9E018A second address: 9E01B0 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007F0E05506CF7h 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push edi 0x00000010 pop edi 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9E224F second address: 9E2254 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9E2254 second address: 9E2259 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D9F35 second address: 9D9F3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9D9F3E second address: 9D9F42 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9E3370 second address: 9E33E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov dword ptr [esp], eax 0x00000007 push 00000000h 0x00000009 push esi 0x0000000a call 00007F0E055074F8h 0x0000000f pop esi 0x00000010 mov dword ptr [esp+04h], esi 0x00000014 add dword ptr [esp+04h], 00000018h 0x0000001c inc esi 0x0000001d push esi 0x0000001e ret 0x0000001f pop esi 0x00000020 ret 0x00000021 cmc 0x00000022 xor bx, C346h 0x00000027 push 00000000h 0x00000029 movzx ebx, dx 0x0000002c push 00000000h 0x0000002e push 00000000h 0x00000030 push esi 0x00000031 call 00007F0E055074F8h 0x00000036 pop esi 0x00000037 mov dword ptr [esp+04h], esi 0x0000003b add dword ptr [esp+04h], 0000001Bh 0x00000043 inc esi 0x00000044 push esi 0x00000045 ret 0x00000046 pop esi 0x00000047 ret 0x00000048 sub dword ptr [ebp+122DB53Ah], ebx 0x0000004e push eax 0x0000004f push eax 0x00000050 push edx 0x00000051 jmp 00007F0E05507503h 0x00000056 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9E13DD second address: 9E145B instructions: 0x00000000 rdtsc 0x00000002 jg 00007F0E05506CECh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push ebx 0x00000010 call 00007F0E05506CE8h 0x00000015 pop ebx 0x00000016 mov dword ptr [esp+04h], ebx 0x0000001a add dword ptr [esp+04h], 00000015h 0x00000022 inc ebx 0x00000023 push ebx 0x00000024 ret 0x00000025 pop ebx 0x00000026 ret 0x00000027 push dword ptr fs:[00000000h] 0x0000002e jmp 00007F0E05506CF4h 0x00000033 mov dword ptr fs:[00000000h], esp 0x0000003a pushad 0x0000003b mov dword ptr [ebp+122D2E61h], ecx 0x00000041 popad 0x00000042 mov eax, dword ptr [ebp+122D0D35h] 0x00000048 stc 0x00000049 push FFFFFFFFh 0x0000004b mov bx, 873Ah 0x0000004f nop 0x00000050 js 00007F0E05506CFCh 0x00000056 push eax 0x00000057 push edx 0x00000058 jmp 00007F0E05506CEEh 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9E23E4 second address: 9E23E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9E3519 second address: 9E3522 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9E3522 second address: 9E3526 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9E3526 second address: 9E353C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jl 00007F0E05506CF2h 0x0000000e js 00007F0E05506CECh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9E24D8 second address: 9E24DE instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9DAE8F second address: 9DAE93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9DAE93 second address: 9DAE97 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 97E575 second address: 97E5A2 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jmp 00007F0E05506CEAh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebx 0x0000000c jmp 00007F0E05506CF9h 0x00000011 pushad 0x00000012 popad 0x00000013 pop ebx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 97E5A2 second address: 97E5DF instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F0E05507504h 0x00000008 push edi 0x00000009 ja 00007F0E055074F6h 0x0000000f pop edi 0x00000010 pop edx 0x00000011 pop eax 0x00000012 pushad 0x00000013 jmp 00007F0E05507509h 0x00000018 push ebx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 97E5DF second address: 97E5EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 je 00007F0E05506CEEh 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9EC779 second address: 9EC77D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9EC8D7 second address: 9EC8F9 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edx 0x00000008 pop edx 0x00000009 push esi 0x0000000a pop esi 0x0000000b jmp 00007F0E05506CEEh 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 popad 0x00000013 pop edi 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9EC8F9 second address: 9EC90E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 jno 00007F0E055074FCh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F0BB4 second address: 9F0BD2 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F0E05506CE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edi 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f jmp 00007F0E05506CEEh 0x00000014 pop edi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F0CE7 second address: 9F0CF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F0CF0 second address: 9F0CFF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b pushad 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F0CFF second address: 9F0D39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jmp 00007F0E05507503h 0x0000000a popad 0x0000000b mov eax, dword ptr [eax] 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 jmp 00007F0E05507509h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F0D39 second address: 9F0D43 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F0E05506CE6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F661B second address: 9F6621 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F6621 second address: 9F664F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0E05506CF6h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007F0E05506CEFh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F664F second address: 9F6666 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E055074FAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jl 00007F0E055074F6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F6666 second address: 9F668E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F0E05506CE6h 0x0000000a popad 0x0000000b jmp 00007F0E05506CF3h 0x00000010 popad 0x00000011 push ecx 0x00000012 push eax 0x00000013 push edx 0x00000014 jnc 00007F0E05506CE6h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F668E second address: 9F66AD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05507505h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F66AD second address: 9F66B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F6828 second address: 9F682C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F682C second address: 9F6846 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CF3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F6846 second address: 9F685B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F0E055074FAh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F685B second address: 9F685F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F6B50 second address: 9F6B56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F6B56 second address: 9F6B5C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F6B5C second address: 9F6B60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F6F9F second address: 9F6FB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jne 00007F0E05506CE6h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9F6FB0 second address: 9F6FB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A00BC2 second address: A00BE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F0E05506CF7h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A00BE4 second address: A00BEA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9FF8A2 second address: 9FF8A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9FFA21 second address: 9FFA27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9FFA27 second address: 9FFA56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 pop esi 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b jmp 00007F0E05506CEFh 0x00000010 jg 00007F0E05506CE6h 0x00000016 popad 0x00000017 jbe 00007F0E05506CEEh 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A00004 second address: A00020 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 jg 00007F0E055074F6h 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F0E055074FBh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A00020 second address: A0003D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0E05506CF9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0003D second address: A0004F instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F0E055074F6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f pop esi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0004F second address: A00053 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A00053 second address: A00057 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A005F6 second address: A005FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A008A7 second address: A008B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push esi 0x00000007 pop esi 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A008B2 second address: A008B9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A008B9 second address: A008D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F0E055074F6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d je 00007F0E055074F6h 0x00000013 jns 00007F0E055074F6h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A048B6 second address: A048CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007F0E05506CF0h 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A048CF second address: A048D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A048D3 second address: A048D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0A386 second address: A0A38F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0A38F second address: A0A395 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0A395 second address: A0A3B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F0E055074F6h 0x0000000a popad 0x0000000b js 00007F0E055074F8h 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 popad 0x00000014 pushad 0x00000015 js 00007F0E055074FEh 0x0000001b pushad 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0A3B4 second address: A0A3D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007F0E05506CF6h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0A3D2 second address: A0A3D6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A08DB1 second address: A08DB5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0965F second address: A09679 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05507506h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A097EB second address: A097EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A09928 second address: A0992D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A09A60 second address: A09A64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A09A64 second address: A09A68 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A09A68 second address: A09A8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F0E05506CF9h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A09A8B second address: A09A8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A09A8F second address: A09AA9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CF6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A09AA9 second address: A09AB0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A08A9B second address: A08AB8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0E05506CF0h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a jg 00007F0E05506CE6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0EE96 second address: A0EE9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0EE9A second address: A0EEA7 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F0E05506CE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0EEA7 second address: A0EEAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C9472 second address: 9C9478 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C9478 second address: 9AEC3D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F0E05507502h 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c and edx, 1B938F1Ah 0x00000012 lea eax, dword ptr [ebp+124801A3h] 0x00000018 mov edi, dword ptr [ebp+122D2DF3h] 0x0000001e nop 0x0000001f push ecx 0x00000020 push esi 0x00000021 pushad 0x00000022 popad 0x00000023 pop esi 0x00000024 pop ecx 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 jmp 00007F0E05507500h 0x0000002d push eax 0x0000002e pop eax 0x0000002f popad 0x00000030 pop edx 0x00000031 nop 0x00000032 jnl 00007F0E055074F7h 0x00000038 call dword ptr [ebp+122D1862h] 0x0000003e pushad 0x0000003f pushad 0x00000040 pushad 0x00000041 popad 0x00000042 pushad 0x00000043 popad 0x00000044 pushad 0x00000045 popad 0x00000046 popad 0x00000047 jno 00007F0E055074FCh 0x0000004d jmp 00007F0E055074FCh 0x00000052 pushad 0x00000053 pushad 0x00000054 popad 0x00000055 pushad 0x00000056 popad 0x00000057 jmp 00007F0E05507502h 0x0000005c push eax 0x0000005d push edx 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C9582 second address: 9C959E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CF4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C959E second address: 9C95A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C95A2 second address: 9C9670 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CF8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp], ebx 0x0000000d sbb di, 0E15h 0x00000012 push dword ptr fs:[00000000h] 0x00000019 mov cx, D4BFh 0x0000001d mov dword ptr fs:[00000000h], esp 0x00000024 push 00000000h 0x00000026 push esi 0x00000027 call 00007F0E05506CE8h 0x0000002c pop esi 0x0000002d mov dword ptr [esp+04h], esi 0x00000031 add dword ptr [esp+04h], 0000001Dh 0x00000039 inc esi 0x0000003a push esi 0x0000003b ret 0x0000003c pop esi 0x0000003d ret 0x0000003e mov dword ptr [ebp+124801FBh], esp 0x00000044 mov edx, dword ptr [ebp+122D35D2h] 0x0000004a cmp dword ptr [ebp+122D3526h], 00000000h 0x00000051 jne 00007F0E05506DEDh 0x00000057 push 00000000h 0x00000059 push ebp 0x0000005a call 00007F0E05506CE8h 0x0000005f pop ebp 0x00000060 mov dword ptr [esp+04h], ebp 0x00000064 add dword ptr [esp+04h], 00000016h 0x0000006c inc ebp 0x0000006d push ebp 0x0000006e ret 0x0000006f pop ebp 0x00000070 ret 0x00000071 jmp 00007F0E05506CEDh 0x00000076 mov ecx, dword ptr [ebp+122D362Eh] 0x0000007c mov byte ptr [ebp+122D1B46h], 00000047h 0x00000083 mov edx, dword ptr [ebp+122D37AEh] 0x00000089 mov dword ptr [ebp+122D26E9h], eax 0x0000008f mov eax, D49AA7D2h 0x00000094 sub dword ptr [ebp+122D1B73h], esi 0x0000009a nop 0x0000009b jns 00007F0E05506CEEh 0x000000a1 push edi 0x000000a2 push eax 0x000000a3 push edx 0x000000a4 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C9670 second address: 9C9683 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F0E055074FAh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C9683 second address: 9C9687 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C9687 second address: 9C9691 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C9A50 second address: 9C9AA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 jnc 00007F0E05506CECh 0x0000000d popad 0x0000000e xor dword ptr [esp], 36142F5Eh 0x00000015 push ecx 0x00000016 and ch, 00000027h 0x00000019 pop ecx 0x0000001a call 00007F0E05506CE9h 0x0000001f jmp 00007F0E05506CF6h 0x00000024 push eax 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007F0E05506CF2h 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C9AA4 second address: 9C9ACF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05507505h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d push eax 0x0000000e push edx 0x0000000f jne 00007F0E055074FCh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C9ACF second address: 9C9B08 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F0E05506CE8h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e push esi 0x0000000f jmp 00007F0E05506CF5h 0x00000014 pop esi 0x00000015 mov dword ptr [esp+04h], eax 0x00000019 pushad 0x0000001a jnc 00007F0E05506CECh 0x00000020 pushad 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C9B08 second address: 9C9B0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C9BC1 second address: 9C9BC7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C9BC7 second address: 9C9BCB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C9E61 second address: 9C9E66 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C9F9C second address: 9C9FDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push ecx 0x0000000c call 00007F0E055074F8h 0x00000011 pop ecx 0x00000012 mov dword ptr [esp+04h], ecx 0x00000016 add dword ptr [esp+04h], 0000001Bh 0x0000001e inc ecx 0x0000001f push ecx 0x00000020 ret 0x00000021 pop ecx 0x00000022 ret 0x00000023 mov di, 06CBh 0x00000027 push 00000004h 0x00000029 mov edx, dword ptr [ebp+122D3622h] 0x0000002f push eax 0x00000030 push eax 0x00000031 push edx 0x00000032 push ebx 0x00000033 push eax 0x00000034 push edx 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9C9FDA second address: 9C9FDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0DFD3 second address: A0DFF0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05507508h 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0E318 second address: A0E323 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0E323 second address: A0E329 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0E329 second address: A0E334 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F0E05506CE6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0E5D1 second address: A0E5E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F0E055074F6h 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0E5E0 second address: A0E5F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F0E05506CE6h 0x0000000a pop eax 0x0000000b push ecx 0x0000000c jl 00007F0E05506CE6h 0x00000012 pushad 0x00000013 popad 0x00000014 pop ecx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0E720 second address: A0E726 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0E726 second address: A0E72B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0E72B second address: A0E743 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E055074FDh 0x00000007 pushad 0x00000008 jno 00007F0E055074F6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0E895 second address: A0E8E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop ecx 0x00000007 pushad 0x00000008 jp 00007F0E05506CE6h 0x0000000e jmp 00007F0E05506CF5h 0x00000013 popad 0x00000014 push edi 0x00000015 jmp 00007F0E05506CF6h 0x0000001a pop edi 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e jnc 00007F0E05506CF2h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0E8E6 second address: A0E908 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0E05507508h 0x00000009 jnc 00007F0E055074F6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A0E908 second address: A0E936 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F0E05506CE6h 0x00000008 jmp 00007F0E05506CF5h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F0E05506CEDh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A11C5E second address: A11C62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A11C62 second address: A11C6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A11C6A second address: A11C81 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05507502h 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A13FA2 second address: A13FEA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CF7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F0E05506CF6h 0x0000000e pushad 0x0000000f jbe 00007F0E05506CECh 0x00000015 jng 00007F0E05506CE6h 0x0000001b je 00007F0E05506CEEh 0x00000021 push ebx 0x00000022 pop ebx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 980087 second address: 9800A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0E05507507h 0x00000009 jg 00007F0E055074F6h 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9800A9 second address: 9800AE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9800AE second address: 9800B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9800B4 second address: 9800BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A1980F second address: A19829 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push esi 0x00000006 jmp 00007F0E05507502h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A1DEAE second address: A1DEB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A1E2B8 second address: A1E2DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push edx 0x00000007 pop edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a jmp 00007F0E05507507h 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A1E2DA second address: A1E2F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CF8h 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A1E2F7 second address: A1E305 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CA1F2 second address: 9CA1F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CA1F6 second address: 9CA1FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CA1FC second address: 9CA231 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 js 00007F0E05506CE6h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e nop 0x0000000f movzx ecx, si 0x00000012 push 00000004h 0x00000014 or edx, 7183FC00h 0x0000001a nop 0x0000001b push eax 0x0000001c push edx 0x0000001d jc 00007F0E05506CF8h 0x00000023 jmp 00007F0E05506CF2h 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9CA231 second address: 9CA23B instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F0E055074FCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A23453 second address: A2346F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0E05506CF6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A2346F second address: A234A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F0E05507508h 0x0000000a push edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d pop edx 0x0000000e ja 00007F0E055074FCh 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 jc 00007F0E055074FCh 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A234A7 second address: A234BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0E05506CEFh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A234BA second address: A234BF instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A2376D second address: A23771 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A23B7E second address: A23B82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A2C300 second address: A2C305 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A2A4B0 second address: A2A4C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0E055074FCh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A2A4C0 second address: A2A4C8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A2A4C8 second address: A2A4CD instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A2A4CD second address: A2A4DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A2A60C second address: A2A610 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A2A79C second address: A2A7B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 jg 00007F0E05506CE8h 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f jc 00007F0E05506CEEh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A2AD3A second address: A2ADA5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F0E05507508h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c pushad 0x0000000d push esi 0x0000000e jmp 00007F0E05507504h 0x00000013 push esi 0x00000014 pop esi 0x00000015 pop esi 0x00000016 jng 00007F0E05507502h 0x0000001c push eax 0x0000001d push edx 0x0000001e jbe 00007F0E055074F6h 0x00000024 jmp 00007F0E05507509h 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A2B2E8 second address: A2B2F5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jp 00007F0E05506CE6h 0x00000009 push edi 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A30CA6 second address: A30CAF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A33E89 second address: A33E97 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CEAh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A3456D second address: A34579 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 jo 00007F0E055074F6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A3D515 second address: A3D51E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A3D51E second address: A3D522 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A3BE9A second address: A3BEAF instructions: 0x00000000 rdtsc 0x00000002 js 00007F0E05506CF7h 0x00000008 jmp 00007F0E05506CEBh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A3BEAF second address: A3BED6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F0E05507505h 0x0000000a jmp 00007F0E055074FFh 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pushad 0x00000012 jnl 00007F0E055074F8h 0x00000018 push eax 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A3C013 second address: A3C01F instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F0E05506CE6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A3C313 second address: A3C319 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A3C319 second address: A3C31F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A3C31F second address: A3C325 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A3CC82 second address: A3CC92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0E05506CECh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A3CC92 second address: A3CC9C instructions: 0x00000000 rdtsc 0x00000002 jo 00007F0E055074F6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A3B29A second address: A3B2A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A40871 second address: A408AE instructions: 0x00000000 rdtsc 0x00000002 je 00007F0E055074F6h 0x00000008 jnc 00007F0E055074F6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 jmp 00007F0E05507508h 0x00000016 jmp 00007F0E05507502h 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A45488 second address: A454A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0E05506CF4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A454A0 second address: A454B7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05507500h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A44E8B second address: A44E91 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A44E91 second address: A44E95 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A44E95 second address: A44EAA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jbe 00007F0E05506CE8h 0x0000000c pushad 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push esi 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A44EAA second address: A44EB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 pushad 0x00000007 popad 0x00000008 jne 00007F0E055074F6h 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A50CC3 second address: A50CC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A52B71 second address: A52B9B instructions: 0x00000000 rdtsc 0x00000002 jg 00007F0E055074F6h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jl 00007F0E0550750Eh 0x00000012 jmp 00007F0E05507508h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A5289D second address: A528BA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F0E05506CF6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A528BA second address: A528D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0E05507503h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A528D6 second address: A528DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A540BC second address: A540C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A56BDC second address: A56BE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A56711 second address: A56726 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E055074FBh 0x00000007 jp 00007F0E055074F6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A56726 second address: A5672B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A5672B second address: A56747 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0E05507502h 0x00000009 pop ecx 0x0000000a push esi 0x0000000b push esi 0x0000000c pop esi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A5E74E second address: A5E758 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A5E758 second address: A5E75C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9E24F5 second address: 9E24F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9E24F9 second address: 9E24FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A66C45 second address: A66C49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A66AAC second address: A66AB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A66AB0 second address: A66AB8 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A6A1FC second address: A6A200 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A6A200 second address: A6A20C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F0E05506CE6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A6A20C second address: A6A21C instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F0E055074F8h 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A6A21C second address: A6A220 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A72493 second address: A7249E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A7249E second address: A724F7 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F0E05506CE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push edi 0x0000000c pop edi 0x0000000d jmp 00007F0E05506CF7h 0x00000012 jng 00007F0E05506CE6h 0x00000018 popad 0x00000019 pushad 0x0000001a pushad 0x0000001b popad 0x0000001c jns 00007F0E05506CE6h 0x00000022 pushad 0x00000023 popad 0x00000024 pushad 0x00000025 popad 0x00000026 popad 0x00000027 popad 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007F0E05506CF3h 0x0000002f jmp 00007F0E05506CEAh 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A72F0F second address: A72F2C instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jnl 00007F0E055074F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jo 00007F0E055074FEh 0x00000012 jnl 00007F0E055074F6h 0x00000018 pushad 0x00000019 popad 0x0000001a push esi 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A72F2C second address: A72F3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop esi 0x00000007 pushad 0x00000008 jp 00007F0E05506CE6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A76D74 second address: A76D8C instructions: 0x00000000 rdtsc 0x00000002 jno 00007F0E05507502h 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A76D8C second address: A76D90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A76D90 second address: A76D94 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A76817 second address: A7685E instructions: 0x00000000 rdtsc 0x00000002 je 00007F0E05506D01h 0x00000008 jmp 00007F0E05506CF9h 0x0000000d push edx 0x0000000e pop edx 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pushad 0x00000012 jo 00007F0E05506CF9h 0x00000018 jmp 00007F0E05506CF3h 0x0000001d push eax 0x0000001e push edx 0x0000001f js 00007F0E05506CE6h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A88353 second address: A88364 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 jl 00007F0E055074F6h 0x0000000b push edi 0x0000000c pop edi 0x0000000d pop edi 0x0000000e push ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9926FB second address: 9926FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 9926FF second address: 992726 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F0E055074FFh 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007F0E055074FCh 0x00000013 push edx 0x00000014 pop edx 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 992726 second address: 99274C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 jbe 00007F0E05506CE6h 0x0000000b popad 0x0000000c push ecx 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007F0E05506CEFh 0x00000014 pop ecx 0x00000015 pop edx 0x00000016 pop eax 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a push esi 0x0000001b pop esi 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 99274C second address: 992766 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jnp 00007F0E055074F6h 0x0000000d push eax 0x0000000e pop eax 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 ja 00007F0E055074F6h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A9492C second address: A94954 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0E05506CF2h 0x00000009 jmp 00007F0E05506CF2h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A9BEF4 second address: A9BF02 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jns 00007F0E055074F6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A9BF02 second address: A9BF06 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A9C342 second address: A9C34B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A9C7A3 second address: A9C7AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A9C7AA second address: A9C7B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F0E055074F6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A9C7B4 second address: A9C80F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CF4h 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007F0E05506CEEh 0x00000011 jmp 00007F0E05506CF2h 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F0E05506CEFh 0x00000020 jng 00007F0E05506CECh 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A9FCA9 second address: A9FCE0 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F0E055074F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnl 00007F0E055074FCh 0x00000010 popad 0x00000011 push eax 0x00000012 push esi 0x00000013 je 00007F0E055074F8h 0x00000019 push ebx 0x0000001a pop ebx 0x0000001b pop esi 0x0000001c mov eax, dword ptr [esp+04h] 0x00000020 pushad 0x00000021 jno 00007F0E055074F8h 0x00000027 push eax 0x00000028 push edx 0x00000029 ja 00007F0E055074F6h 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A9FCE0 second address: A9FCE4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A9FCE4 second address: A9FCF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [eax] 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: A9FCF2 second address: A9FCF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: AA2CBE second address: AA2CC3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: AA4D2A second address: AA4D38 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 js 00007F0E05506CE6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: AA4D38 second address: AA4D60 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05507500h 0x00000007 jmp 00007F0E05507504h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: AA4D60 second address: AA4D7C instructions: 0x00000000 rdtsc 0x00000002 jc 00007F0E05506CF7h 0x00000008 jmp 00007F0E05506CF1h 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4DA030F second address: 4DA0320 instructions: 0x00000000 rdtsc 0x00000002 mov esi, 3DFC186Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a xchg eax, ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4DA0320 second address: 4DA0333 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CEFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4DA0333 second address: 4DA03A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, edx 0x00000005 pushfd 0x00000006 jmp 00007F0E055074FBh 0x0000000b add esi, 6377FEBEh 0x00000011 jmp 00007F0E05507509h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a call dword ptr [7598188Ch] 0x00000020 mov edi, edi 0x00000022 push ebp 0x00000023 mov ebp, esp 0x00000025 push ecx 0x00000026 mov ecx, dword ptr [7FFE0004h] 0x0000002c mov dword ptr [ebp-04h], ecx 0x0000002f cmp ecx, 01000000h 0x00000035 jc 00007F0E05538FD5h 0x0000003b mov eax, 7FFE0320h 0x00000040 mov eax, dword ptr [eax] 0x00000042 mul ecx 0x00000044 shrd eax, edx, 00000018h 0x00000048 mov esp, ebp 0x0000004a pop ebp 0x0000004b ret 0x0000004c pushad 0x0000004d mov bx, si 0x00000050 call 00007F0E05507508h 0x00000055 mov edx, eax 0x00000057 pop esi 0x00000058 popad 0x00000059 pop ecx 0x0000005a push eax 0x0000005b push edx 0x0000005c push eax 0x0000005d push edx 0x0000005e jmp 00007F0E055074FFh 0x00000063 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4DA03A1 second address: 4DA03BE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4DA03BE second address: 4DA03C3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4DA03C3 second address: 4DA0286 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov edi, 74D88A90h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c ret 0x0000000d nop 0x0000000e xor esi, eax 0x00000010 lea eax, dword ptr [ebp-10h] 0x00000013 push eax 0x00000014 call 00007F0E09EA3975h 0x00000019 mov edi, edi 0x0000001b pushad 0x0000001c pushfd 0x0000001d jmp 00007F0E05506CF3h 0x00000022 or cx, 491Eh 0x00000027 jmp 00007F0E05506CF9h 0x0000002c popfd 0x0000002d mov ecx, 28AC7AE7h 0x00000032 popad 0x00000033 xchg eax, ebp 0x00000034 jmp 00007F0E05506CEAh 0x00000039 push eax 0x0000003a jmp 00007F0E05506CEBh 0x0000003f xchg eax, ebp 0x00000040 push eax 0x00000041 push edx 0x00000042 push eax 0x00000043 push edx 0x00000044 jmp 00007F0E05506CF0h 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4DA0286 second address: 4DA028A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4DA028A second address: 4DA0290 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4DA0290 second address: 4DA02B1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, esi 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov ebp, esp 0x0000000c pushad 0x0000000d call 00007F0E05507502h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5001B second address: 4D50040 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov dh, B1h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50040 second address: 4D50045 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50045 second address: 4D5008D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov dx, 73CAh 0x0000000f pushfd 0x00000010 jmp 00007F0E05506CEBh 0x00000015 add ax, CE6Eh 0x0000001a jmp 00007F0E05506CF9h 0x0000001f popfd 0x00000020 popad 0x00000021 xchg eax, ebp 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5008D second address: 4D50091 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50091 second address: 4D50097 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50097 second address: 4D500E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ch, 28h 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov ebp, esp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007F0E05507502h 0x00000015 sub ch, 00000048h 0x00000018 jmp 00007F0E055074FBh 0x0000001d popfd 0x0000001e call 00007F0E05507508h 0x00000023 pop esi 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D500E2 second address: 4D50175 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop edi 0x00000005 mov dh, ah 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr fs:[00000030h] 0x00000010 jmp 00007F0E05506CF5h 0x00000015 sub esp, 18h 0x00000018 jmp 00007F0E05506CEEh 0x0000001d xchg eax, ebx 0x0000001e jmp 00007F0E05506CF0h 0x00000023 push eax 0x00000024 jmp 00007F0E05506CEBh 0x00000029 xchg eax, ebx 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d pushfd 0x0000002e jmp 00007F0E05506CEBh 0x00000033 sub ax, 6EAEh 0x00000038 jmp 00007F0E05506CF9h 0x0000003d popfd 0x0000003e jmp 00007F0E05506CF0h 0x00000043 popad 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50175 second address: 4D5019E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E055074FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebx, dword ptr [eax+10h] 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0E05507505h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5019E second address: 4D501A3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D501A3 second address: 4D5021A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0E055074FDh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, esi 0x0000000d jmp 00007F0E055074FEh 0x00000012 push eax 0x00000013 jmp 00007F0E055074FBh 0x00000018 xchg eax, esi 0x00000019 jmp 00007F0E05507506h 0x0000001e mov esi, dword ptr [759B06ECh] 0x00000024 jmp 00007F0E05507500h 0x00000029 test esi, esi 0x0000002b push eax 0x0000002c push edx 0x0000002d jmp 00007F0E05507507h 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5021A second address: 4D50220 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50220 second address: 4D5023D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E055074FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jne 00007F0E0550857Eh 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5023D second address: 4D50241 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50241 second address: 4D50245 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50245 second address: 4D5024B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5024B second address: 4D502BD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0E05507508h 0x00000009 and si, 6668h 0x0000000e jmp 00007F0E055074FBh 0x00000013 popfd 0x00000014 mov ax, 645Fh 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b xchg eax, edi 0x0000001c pushad 0x0000001d push ecx 0x0000001e mov dl, C9h 0x00000020 pop ecx 0x00000021 pushfd 0x00000022 jmp 00007F0E05507509h 0x00000027 or ax, 4736h 0x0000002c jmp 00007F0E05507501h 0x00000031 popfd 0x00000032 popad 0x00000033 push eax 0x00000034 push eax 0x00000035 push edx 0x00000036 pushad 0x00000037 push eax 0x00000038 push edx 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D502BD second address: 4D502C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D502C4 second address: 4D50326 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F0E055074FBh 0x00000008 pop esi 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e xchg eax, edi 0x0000000f pushad 0x00000010 mov ah, bl 0x00000012 call 00007F0E055074FCh 0x00000017 pushfd 0x00000018 jmp 00007F0E05507502h 0x0000001d and ah, FFFFFFE8h 0x00000020 jmp 00007F0E055074FBh 0x00000025 popfd 0x00000026 pop ecx 0x00000027 popad 0x00000028 call dword ptr [75980B60h] 0x0000002e mov eax, 75F3E5E0h 0x00000033 ret 0x00000034 push eax 0x00000035 push edx 0x00000036 jmp 00007F0E05507502h 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50326 second address: 4D5037B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop esi 0x00000005 pushfd 0x00000006 jmp 00007F0E05506CEDh 0x0000000b or ah, FFFFFFB6h 0x0000000e jmp 00007F0E05506CF1h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push 00000044h 0x00000019 jmp 00007F0E05506CEEh 0x0000001e pop edi 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007F0E05506CF7h 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5037B second address: 4D503A3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, si 0x00000006 mov bx, si 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, edi 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F0E05507509h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D503A3 second address: 4D503A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D503A9 second address: 4D503CE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05507503h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov esi, 523067D1h 0x00000014 push esi 0x00000015 pop edi 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D503CE second address: 4D5043A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CF3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, edi 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F0E05506CF4h 0x00000011 adc esi, 3B9F4088h 0x00000017 jmp 00007F0E05506CEBh 0x0000001c popfd 0x0000001d movzx eax, bx 0x00000020 popad 0x00000021 push dword ptr [eax] 0x00000023 push eax 0x00000024 push edx 0x00000025 pushad 0x00000026 pushfd 0x00000027 jmp 00007F0E05506CECh 0x0000002c add esi, 50E5A2E8h 0x00000032 jmp 00007F0E05506CEBh 0x00000037 popfd 0x00000038 mov bx, si 0x0000003b popad 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5043A second address: 4D50441 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bh, 16h 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50441 second address: 4D50454 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, dword ptr fs:[00000030h] 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50454 second address: 4D50458 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50458 second address: 4D5045E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5045E second address: 4D50464 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50464 second address: 4D50468 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50468 second address: 4D50479 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push dword ptr [eax+18h] 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e mov di, cx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50491 second address: 4D5050A instructions: 0x00000000 rdtsc 0x00000002 movsx edx, ax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 call 00007F0E05506CF4h 0x0000000c pushfd 0x0000000d jmp 00007F0E05506CF2h 0x00000012 xor ah, 00000038h 0x00000015 jmp 00007F0E05506CEBh 0x0000001a popfd 0x0000001b pop esi 0x0000001c popad 0x0000001d mov esi, eax 0x0000001f jmp 00007F0E05506CEFh 0x00000024 test esi, esi 0x00000026 jmp 00007F0E05506CF6h 0x0000002b je 00007F0E760E5E95h 0x00000031 push eax 0x00000032 push edx 0x00000033 pushad 0x00000034 mov edi, 07E1BEE0h 0x00000039 push ebx 0x0000003a pop ecx 0x0000003b popad 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5050A second address: 4D50531 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0E05507500h 0x00000009 xor si, 6128h 0x0000000e jmp 00007F0E055074FBh 0x00000013 popfd 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50531 second address: 4D5054F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 sub eax, eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c call 00007F0E05506CEEh 0x00000011 pop eax 0x00000012 mov al, dh 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5054F second address: 4D5058C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E055074FDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi], edi 0x0000000b jmp 00007F0E055074FEh 0x00000010 mov dword ptr [esi+04h], eax 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F0E05507507h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5058C second address: 4D505EE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0E05506CEFh 0x00000008 push ecx 0x00000009 pop edx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esi+08h], eax 0x00000010 pushad 0x00000011 push ecx 0x00000012 pushfd 0x00000013 jmp 00007F0E05506CF7h 0x00000018 adc cx, 1B3Eh 0x0000001d jmp 00007F0E05506CF9h 0x00000022 popfd 0x00000023 pop ecx 0x00000024 mov di, 21B4h 0x00000028 popad 0x00000029 mov dword ptr [esi+0Ch], eax 0x0000002c push eax 0x0000002d push edx 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 push edx 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D505EE second address: 4D505F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D505F2 second address: 4D505F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D505F6 second address: 4D505FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D505FC second address: 4D5060A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0E05506CEAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5060A second address: 4D5060E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5060E second address: 4D50660 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [ebx+4Ch] 0x0000000b pushad 0x0000000c movsx edx, ax 0x0000000f push eax 0x00000010 mov edi, 5295F298h 0x00000015 pop ebx 0x00000016 popad 0x00000017 mov dword ptr [esi+10h], eax 0x0000001a pushad 0x0000001b mov ch, E7h 0x0000001d pushad 0x0000001e mov edx, 1D71A274h 0x00000023 popad 0x00000024 popad 0x00000025 mov eax, dword ptr [ebx+50h] 0x00000028 push eax 0x00000029 push edx 0x0000002a pushad 0x0000002b mov bx, si 0x0000002e pushfd 0x0000002f jmp 00007F0E05506CF0h 0x00000034 adc ecx, 30CF3428h 0x0000003a jmp 00007F0E05506CEBh 0x0000003f popfd 0x00000040 popad 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50660 second address: 4D50678 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0E05507504h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50678 second address: 4D506A3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esi+14h], eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F0E05506CF5h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D506A3 second address: 4D5072D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0E05507507h 0x00000009 sbb ecx, 3083F02Eh 0x0000000f jmp 00007F0E05507509h 0x00000014 popfd 0x00000015 mov ch, 7Ah 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a mov eax, dword ptr [ebx+54h] 0x0000001d jmp 00007F0E05507503h 0x00000022 mov dword ptr [esi+18h], eax 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 pushfd 0x00000029 jmp 00007F0E055074FBh 0x0000002e xor ax, 7AEEh 0x00000033 jmp 00007F0E05507509h 0x00000038 popfd 0x00000039 mov ch, 36h 0x0000003b popad 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5072D second address: 4D50769 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CEAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [ebx+58h] 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007F0E05506CEDh 0x00000015 xor al, FFFFFFD6h 0x00000018 jmp 00007F0E05506CF1h 0x0000001d popfd 0x0000001e mov ax, E947h 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50769 second address: 4D507A7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E055074FDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+1Ch], eax 0x0000000c jmp 00007F0E055074FEh 0x00000011 mov eax, dword ptr [ebx+5Ch] 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F0E05507507h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D507A7 second address: 4D507AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D507AD second address: 4D507E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esi+20h], eax 0x0000000b pushad 0x0000000c mov cl, bl 0x0000000e mov bx, ax 0x00000011 popad 0x00000012 mov eax, dword ptr [ebx+60h] 0x00000015 jmp 00007F0E05507500h 0x0000001a mov dword ptr [esi+24h], eax 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007F0E055074FAh 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D507E3 second address: 4D507E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D507E7 second address: 4D507ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D507ED second address: 4D507FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0E05506CEDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D507FE second address: 4D50831 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [ebx+64h] 0x0000000b jmp 00007F0E055074FDh 0x00000010 mov dword ptr [esi+28h], eax 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 mov edx, 5DB7488Eh 0x0000001b jmp 00007F0E055074FFh 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50831 second address: 4D508B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F0E05506CEFh 0x00000008 pop esi 0x00000009 call 00007F0E05506CF9h 0x0000000e pop esi 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 mov eax, dword ptr [ebx+68h] 0x00000015 pushad 0x00000016 pushfd 0x00000017 jmp 00007F0E05506CEDh 0x0000001c and ax, 5E26h 0x00000021 jmp 00007F0E05506CF1h 0x00000026 popfd 0x00000027 pushfd 0x00000028 jmp 00007F0E05506CF0h 0x0000002d and si, D7C8h 0x00000032 jmp 00007F0E05506CEBh 0x00000037 popfd 0x00000038 popad 0x00000039 mov dword ptr [esi+2Ch], eax 0x0000003c push eax 0x0000003d push edx 0x0000003e push eax 0x0000003f push edx 0x00000040 pushad 0x00000041 popad 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D508B6 second address: 4D508BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D508BA second address: 4D508C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D508C0 second address: 4D508D8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E055074FAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ax, word ptr [ebx+6Ch] 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D508D8 second address: 4D508DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D508DC second address: 4D508E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D508E2 second address: 4D508E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D508E8 second address: 4D508EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D508EC second address: 4D50969 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov word ptr [esi+30h], ax 0x0000000c jmp 00007F0E05506CEAh 0x00000011 mov ax, word ptr [ebx+00000088h] 0x00000018 jmp 00007F0E05506CF0h 0x0000001d mov word ptr [esi+32h], ax 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 pushfd 0x00000025 jmp 00007F0E05506CEDh 0x0000002a xor ecx, 16C1A3A6h 0x00000030 jmp 00007F0E05506CF1h 0x00000035 popfd 0x00000036 pushfd 0x00000037 jmp 00007F0E05506CF0h 0x0000003c or si, 0148h 0x00000041 jmp 00007F0E05506CEBh 0x00000046 popfd 0x00000047 popad 0x00000048 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50969 second address: 4D509FA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0E055074FFh 0x00000009 adc ax, 738Eh 0x0000000e jmp 00007F0E05507509h 0x00000013 popfd 0x00000014 mov ch, 7Eh 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 mov eax, dword ptr [ebx+0000008Ch] 0x0000001f pushad 0x00000020 jmp 00007F0E05507509h 0x00000025 pushad 0x00000026 push ecx 0x00000027 pop ebx 0x00000028 mov ebx, esi 0x0000002a popad 0x0000002b popad 0x0000002c mov dword ptr [esi+34h], eax 0x0000002f jmp 00007F0E05507504h 0x00000034 mov eax, dword ptr [ebx+18h] 0x00000037 jmp 00007F0E05507500h 0x0000003c mov dword ptr [esi+38h], eax 0x0000003f push eax 0x00000040 push edx 0x00000041 push eax 0x00000042 push edx 0x00000043 push eax 0x00000044 push edx 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D509FA second address: 4D509FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D509FE second address: 4D50A1B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05507509h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50A1B second address: 4D50AA2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0E05506CF7h 0x00000009 xor ah, 0000006Eh 0x0000000c jmp 00007F0E05506CF9h 0x00000011 popfd 0x00000012 pushfd 0x00000013 jmp 00007F0E05506CF0h 0x00000018 or cx, C1E8h 0x0000001d jmp 00007F0E05506CEBh 0x00000022 popfd 0x00000023 popad 0x00000024 pop edx 0x00000025 pop eax 0x00000026 mov eax, dword ptr [ebx+1Ch] 0x00000029 jmp 00007F0E05506CF6h 0x0000002e mov dword ptr [esi+3Ch], eax 0x00000031 push eax 0x00000032 push edx 0x00000033 push eax 0x00000034 push edx 0x00000035 jmp 00007F0E05506CEAh 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50AA2 second address: 4D50AA6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50AA6 second address: 4D50AAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50AAC second address: 4D50AFD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, esi 0x00000005 jmp 00007F0E05507508h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov eax, dword ptr [ebx+20h] 0x00000010 pushad 0x00000011 mov al, DFh 0x00000013 movsx edi, si 0x00000016 popad 0x00000017 mov dword ptr [esi+40h], eax 0x0000001a pushad 0x0000001b push eax 0x0000001c pushad 0x0000001d popad 0x0000001e pop ebx 0x0000001f pushad 0x00000020 mov di, ax 0x00000023 mov cx, F89Bh 0x00000027 popad 0x00000028 popad 0x00000029 lea eax, dword ptr [ebx+00000080h] 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007F0E055074FDh 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50AFD second address: 4D50B03 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50B03 second address: 4D50B07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50B07 second address: 4D50B47 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CF3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push 00000001h 0x0000000d jmp 00007F0E05506CF6h 0x00000012 nop 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F0E05506CEAh 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50B47 second address: 4D50B4D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50B4D second address: 4D50C0A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0E05506CECh 0x00000008 movzx eax, dx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f jmp 00007F0E05506CECh 0x00000014 nop 0x00000015 pushad 0x00000016 mov dx, cx 0x00000019 mov ecx, 54A83659h 0x0000001e popad 0x0000001f lea eax, dword ptr [ebp-10h] 0x00000022 pushad 0x00000023 pushfd 0x00000024 jmp 00007F0E05506CF2h 0x00000029 and eax, 638094E8h 0x0000002f jmp 00007F0E05506CEBh 0x00000034 popfd 0x00000035 call 00007F0E05506CF8h 0x0000003a pushfd 0x0000003b jmp 00007F0E05506CF2h 0x00000040 jmp 00007F0E05506CF5h 0x00000045 popfd 0x00000046 pop ecx 0x00000047 popad 0x00000048 push edx 0x00000049 push eax 0x0000004a push edx 0x0000004b pushad 0x0000004c call 00007F0E05506CF9h 0x00000051 pop ecx 0x00000052 mov edx, 5685B0B4h 0x00000057 popad 0x00000058 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50C0A second address: 4D50C47 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ah, 32h 0x00000005 push ebx 0x00000006 pop ecx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 pushfd 0x00000011 jmp 00007F0E05507508h 0x00000016 or eax, 11F8D198h 0x0000001c jmp 00007F0E055074FBh 0x00000021 popfd 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50C47 second address: 4D50C4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50C4C second address: 4D50C62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0E05507502h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50CAA second address: 4D50CC2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0E05506CF4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50CC2 second address: 4D50D10 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E055074FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b test edi, edi 0x0000000d pushad 0x0000000e mov esi, 54A4DEFBh 0x00000013 pushad 0x00000014 call 00007F0E055074FEh 0x00000019 pop esi 0x0000001a mov ax, bx 0x0000001d popad 0x0000001e popad 0x0000001f js 00007F0E760E5EC9h 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007F0E05507508h 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50D10 second address: 4D50D16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50D16 second address: 4D50D1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50D1A second address: 4D50D1E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50D1E second address: 4D50D2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [ebp-0Ch] 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50D2F second address: 4D50D33 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50D33 second address: 4D50D39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50D39 second address: 4D50D3F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50D3F second address: 4D50D79 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E055074FFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esi+04h], eax 0x0000000e jmp 00007F0E05507506h 0x00000013 lea eax, dword ptr [ebx+78h] 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 movsx ebx, si 0x0000001c mov al, C6h 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50D79 second address: 4D50D7E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50D7E second address: 4D50E2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov edi, eax 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push 00000001h 0x0000000b jmp 00007F0E05507506h 0x00000010 nop 0x00000011 pushad 0x00000012 call 00007F0E055074FEh 0x00000017 pushfd 0x00000018 jmp 00007F0E05507502h 0x0000001d and si, 6958h 0x00000022 jmp 00007F0E055074FBh 0x00000027 popfd 0x00000028 pop ecx 0x00000029 mov cl, dl 0x0000002b popad 0x0000002c push eax 0x0000002d pushad 0x0000002e pushfd 0x0000002f jmp 00007F0E05507501h 0x00000034 add ch, FFFFFFF6h 0x00000037 jmp 00007F0E05507501h 0x0000003c popfd 0x0000003d mov edi, esi 0x0000003f popad 0x00000040 nop 0x00000041 pushad 0x00000042 jmp 00007F0E05507508h 0x00000047 movzx eax, di 0x0000004a popad 0x0000004b lea eax, dword ptr [ebp-08h] 0x0000004e push eax 0x0000004f push edx 0x00000050 pushad 0x00000051 movsx edi, cx 0x00000054 popad 0x00000055 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50E2B second address: 4D50E31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50EDF second address: 4D50EE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50EE4 second address: 4D50EEA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50EEA second address: 4D50EEE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50EEE second address: 4D50F0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov edi, eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0E05506CF0h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50F0A second address: 4D50F10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50F10 second address: 4D50F14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50F14 second address: 4D50FDC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E055074FDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b test edi, edi 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F0E055074FCh 0x00000014 xor eax, 23200DE8h 0x0000001a jmp 00007F0E055074FBh 0x0000001f popfd 0x00000020 pushfd 0x00000021 jmp 00007F0E05507508h 0x00000026 add si, A048h 0x0000002b jmp 00007F0E055074FBh 0x00000030 popfd 0x00000031 popad 0x00000032 js 00007F0E760E5C3Bh 0x00000038 jmp 00007F0E05507506h 0x0000003d mov eax, dword ptr [ebp-04h] 0x00000040 jmp 00007F0E05507500h 0x00000045 mov dword ptr [esi+08h], eax 0x00000048 pushad 0x00000049 mov bh, cl 0x0000004b mov ah, dh 0x0000004d popad 0x0000004e lea eax, dword ptr [ebx+70h] 0x00000051 jmp 00007F0E05507502h 0x00000056 push 00000001h 0x00000058 push eax 0x00000059 push edx 0x0000005a jmp 00007F0E05507507h 0x0000005f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50FDC second address: 4D50FE2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50FE2 second address: 4D50FE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D50FE6 second address: 4D51064 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c jmp 00007F0E05506CF6h 0x00000011 push eax 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007F0E05506CF1h 0x00000019 and si, E2E6h 0x0000001e jmp 00007F0E05506CF1h 0x00000023 popfd 0x00000024 push ecx 0x00000025 push ebx 0x00000026 pop eax 0x00000027 pop edi 0x00000028 popad 0x00000029 nop 0x0000002a pushad 0x0000002b mov edx, eax 0x0000002d mov dx, ax 0x00000030 popad 0x00000031 lea eax, dword ptr [ebp-18h] 0x00000034 push eax 0x00000035 push edx 0x00000036 jmp 00007F0E05506CF9h 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D51064 second address: 4D51074 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0E055074FCh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D51074 second address: 4D51078 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D51078 second address: 4D51087 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D51087 second address: 4D5108B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5108B second address: 4D5108F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5108F second address: 4D51095 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D51095 second address: 4D510FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0E055074FEh 0x00000008 pushfd 0x00000009 jmp 00007F0E05507502h 0x0000000e xor ah, FFFFFFA8h 0x00000011 jmp 00007F0E055074FBh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a mov dword ptr [esp], eax 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 pushfd 0x00000021 jmp 00007F0E055074FBh 0x00000026 sub si, D2EEh 0x0000002b jmp 00007F0E05507509h 0x00000030 popfd 0x00000031 popad 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D510FD second address: 4D51114 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0E05506CF3h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D51150 second address: 4D51164 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0E05507500h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D51164 second address: 4D51168 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D51168 second address: 4D5122D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test edi, edi 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F0E055074FDh 0x00000011 or ah, 00000046h 0x00000014 jmp 00007F0E05507501h 0x00000019 popfd 0x0000001a pushfd 0x0000001b jmp 00007F0E05507500h 0x00000020 and cl, FFFFFFE8h 0x00000023 jmp 00007F0E055074FBh 0x00000028 popfd 0x00000029 popad 0x0000002a js 00007F0E760E59EEh 0x00000030 jmp 00007F0E05507506h 0x00000035 mov eax, dword ptr [ebp-14h] 0x00000038 jmp 00007F0E05507500h 0x0000003d mov ecx, esi 0x0000003f pushad 0x00000040 mov dx, ax 0x00000043 mov si, 5889h 0x00000047 popad 0x00000048 mov dword ptr [esi+0Ch], eax 0x0000004b jmp 00007F0E05507504h 0x00000050 mov edx, 759B06ECh 0x00000055 jmp 00007F0E05507500h 0x0000005a sub eax, eax 0x0000005c push eax 0x0000005d push edx 0x0000005e jmp 00007F0E055074FCh 0x00000063 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5122D second address: 4D5126F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F0E05506CF1h 0x00000008 pop esi 0x00000009 jmp 00007F0E05506CF1h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 lock cmpxchg dword ptr [edx], ecx 0x00000015 jmp 00007F0E05506CEEh 0x0000001a pop edi 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5126F second address: 4D5128C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05507509h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5128C second address: 4D512D4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CF1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test eax, eax 0x0000000b jmp 00007F0E05506CEEh 0x00000010 jne 00007F0E760E5111h 0x00000016 pushad 0x00000017 mov cx, 8B5Dh 0x0000001b mov bh, ch 0x0000001d popad 0x0000001e mov edx, dword ptr [ebp+08h] 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007F0E05506CF0h 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D512D4 second address: 4D51385 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, 2994h 0x00000007 call 00007F0E055074FDh 0x0000000c pop eax 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov eax, dword ptr [esi] 0x00000012 jmp 00007F0E05507507h 0x00000017 mov dword ptr [edx], eax 0x00000019 jmp 00007F0E05507506h 0x0000001e mov eax, dword ptr [esi+04h] 0x00000021 jmp 00007F0E05507500h 0x00000026 mov dword ptr [edx+04h], eax 0x00000029 pushad 0x0000002a mov ebx, esi 0x0000002c push eax 0x0000002d mov di, 0C1Ch 0x00000031 pop ebx 0x00000032 popad 0x00000033 mov eax, dword ptr [esi+08h] 0x00000036 pushad 0x00000037 pushad 0x00000038 movzx eax, bx 0x0000003b push ebx 0x0000003c pop eax 0x0000003d popad 0x0000003e call 00007F0E05507505h 0x00000043 mov ah, 81h 0x00000045 pop edi 0x00000046 popad 0x00000047 mov dword ptr [edx+08h], eax 0x0000004a jmp 00007F0E05507508h 0x0000004f mov eax, dword ptr [esi+0Ch] 0x00000052 push eax 0x00000053 push edx 0x00000054 push eax 0x00000055 push edx 0x00000056 push eax 0x00000057 push edx 0x00000058 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D51385 second address: 4D51389 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D51389 second address: 4D5138F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5138F second address: 4D5139E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0E05506CEBh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5139E second address: 4D513BB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [edx+0Ch], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F0E05507500h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D513BB second address: 4D513C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D513C1 second address: 4D513C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D513C5 second address: 4D513E6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esi+10h] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F0E05506CF4h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D513E6 second address: 4D5141C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F0E05507501h 0x00000008 pop esi 0x00000009 mov si, bx 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov dword ptr [edx+10h], eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F0E05507506h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5141C second address: 4D514B2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esi+14h] 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F0E05506CEBh 0x00000013 jmp 00007F0E05506CF3h 0x00000018 popfd 0x00000019 popad 0x0000001a mov dword ptr [edx+14h], eax 0x0000001d jmp 00007F0E05506CF6h 0x00000022 mov eax, dword ptr [esi+18h] 0x00000025 pushad 0x00000026 pushfd 0x00000027 jmp 00007F0E05506CEDh 0x0000002c and cx, 1976h 0x00000031 jmp 00007F0E05506CF1h 0x00000036 popfd 0x00000037 popad 0x00000038 mov dword ptr [edx+18h], eax 0x0000003b push eax 0x0000003c push edx 0x0000003d push eax 0x0000003e push edx 0x0000003f jmp 00007F0E05506CF8h 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D514B2 second address: 4D514B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D514B6 second address: 4D514BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D514BC second address: 4D514CD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0E055074FDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D514CD second address: 4D5153D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CF1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esi+1Ch] 0x0000000e pushad 0x0000000f jmp 00007F0E05506CECh 0x00000014 pushfd 0x00000015 jmp 00007F0E05506CF2h 0x0000001a sbb cl, FFFFFF88h 0x0000001d jmp 00007F0E05506CEBh 0x00000022 popfd 0x00000023 popad 0x00000024 mov dword ptr [edx+1Ch], eax 0x00000027 pushad 0x00000028 mov si, 301Bh 0x0000002c popad 0x0000002d mov eax, dword ptr [esi+20h] 0x00000030 push eax 0x00000031 push edx 0x00000032 jmp 00007F0E05506CF8h 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5153D second address: 4D51543 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D51543 second address: 4D51547 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D51547 second address: 4D515AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [edx+20h], eax 0x0000000b jmp 00007F0E05507509h 0x00000010 mov eax, dword ptr [esi+24h] 0x00000013 jmp 00007F0E055074FEh 0x00000018 mov dword ptr [edx+24h], eax 0x0000001b jmp 00007F0E05507500h 0x00000020 mov eax, dword ptr [esi+28h] 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007F0E05507507h 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D515AB second address: 4D515F5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [edx+28h], eax 0x0000000c pushad 0x0000000d mov eax, 603B0B03h 0x00000012 mov ebx, ecx 0x00000014 popad 0x00000015 mov ecx, dword ptr [esi+2Ch] 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b pushfd 0x0000001c jmp 00007F0E05506CEAh 0x00000021 add al, FFFFFFC8h 0x00000024 jmp 00007F0E05506CEBh 0x00000029 popfd 0x0000002a popad 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D515F5 second address: 4D516C8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05507509h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [edx+2Ch], ecx 0x0000000c jmp 00007F0E055074FEh 0x00000011 mov ax, word ptr [esi+30h] 0x00000015 jmp 00007F0E05507500h 0x0000001a mov word ptr [edx+30h], ax 0x0000001e pushad 0x0000001f mov bx, si 0x00000022 mov dx, si 0x00000025 popad 0x00000026 mov ax, word ptr [esi+32h] 0x0000002a pushad 0x0000002b jmp 00007F0E05507502h 0x00000030 mov cx, D601h 0x00000034 popad 0x00000035 mov word ptr [edx+32h], ax 0x00000039 jmp 00007F0E055074FCh 0x0000003e mov eax, dword ptr [esi+34h] 0x00000041 pushad 0x00000042 mov dh, ah 0x00000044 popad 0x00000045 mov dword ptr [edx+34h], eax 0x00000048 pushad 0x00000049 pushfd 0x0000004a jmp 00007F0E05507502h 0x0000004f xor ax, 1D78h 0x00000054 jmp 00007F0E055074FBh 0x00000059 popfd 0x0000005a mov ebx, ecx 0x0000005c popad 0x0000005d test ecx, 00000700h 0x00000063 pushad 0x00000064 mov ebx, esi 0x00000066 push eax 0x00000067 push ebx 0x00000068 pop ecx 0x00000069 pop edi 0x0000006a popad 0x0000006b jne 00007F0E760E555Eh 0x00000071 push eax 0x00000072 push edx 0x00000073 jmp 00007F0E05507501h 0x00000078 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D516C8 second address: 4D51700 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, ebx 0x00000005 pushfd 0x00000006 jmp 00007F0E05506CF3h 0x0000000b jmp 00007F0E05506CF3h 0x00000010 popfd 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 or dword ptr [edx+38h], FFFFFFFFh 0x00000018 pushad 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D51700 second address: 4D5175A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov bx, ax 0x00000007 popad 0x00000008 mov bl, ch 0x0000000a popad 0x0000000b or dword ptr [edx+3Ch], FFFFFFFFh 0x0000000f pushad 0x00000010 movsx ebx, si 0x00000013 call 00007F0E055074FEh 0x00000018 mov bx, cx 0x0000001b pop ecx 0x0000001c popad 0x0000001d or dword ptr [edx+40h], FFFFFFFFh 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 pushfd 0x00000025 jmp 00007F0E05507506h 0x0000002a adc esi, 22820158h 0x00000030 jmp 00007F0E055074FBh 0x00000035 popfd 0x00000036 movzx ecx, bx 0x00000039 popad 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5175A second address: 4D5178A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0E05506CF0h 0x00000009 sbb cl, FFFFFFB8h 0x0000000c jmp 00007F0E05506CEBh 0x00000011 popfd 0x00000012 movzx esi, di 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 pop esi 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5178A second address: 4D51790 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D51790 second address: 4D51796 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D51796 second address: 4D5179A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5179A second address: 4D5179E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5179E second address: 4D517C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov ax, 6265h 0x00000010 jmp 00007F0E05507502h 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D400C5 second address: 4D400EB instructions: 0x00000000 rdtsc 0x00000002 movsx ebx, si 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 xchg eax, ebp 0x00000009 jmp 00007F0E05506CECh 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F0E05506CEEh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5182A second address: 4D5184B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, di 0x00000006 mov ecx, edx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F0E055074FFh 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5184B second address: 4D5184F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5184F second address: 4D51855 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D51919 second address: 4D5191D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D5191D second address: 4D5182A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov edi, esi 0x00000008 popad 0x00000009 retn 0008h 0x0000000c push 0042F258h 0x00000011 push edi 0x00000012 mov dword ptr [00434D64h], eax 0x00000017 call esi 0x00000019 mov edi, edi 0x0000001b pushad 0x0000001c pushfd 0x0000001d jmp 00007F0E055074FEh 0x00000022 sbb al, 00000008h 0x00000025 jmp 00007F0E055074FBh 0x0000002a popfd 0x0000002b mov ch, C8h 0x0000002d popad 0x0000002e push eax 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007F0E05507507h 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D90218 second address: 4D902CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 pushad 0x00000007 pushad 0x00000008 push ecx 0x00000009 pop edi 0x0000000a pushfd 0x0000000b jmp 00007F0E05506CF2h 0x00000010 sub al, 00000068h 0x00000013 jmp 00007F0E05506CEBh 0x00000018 popfd 0x00000019 popad 0x0000001a mov bx, cx 0x0000001d popad 0x0000001e mov dword ptr [esp], ebp 0x00000021 pushad 0x00000022 mov ax, 5157h 0x00000026 pushad 0x00000027 mov ah, CBh 0x00000029 pushfd 0x0000002a jmp 00007F0E05506CEFh 0x0000002f sub eax, 0D989F5Eh 0x00000035 jmp 00007F0E05506CF9h 0x0000003a popfd 0x0000003b popad 0x0000003c popad 0x0000003d mov ebp, esp 0x0000003f pushad 0x00000040 call 00007F0E05506CECh 0x00000045 mov cx, B4B1h 0x00000049 pop esi 0x0000004a jmp 00007F0E05506CF7h 0x0000004f popad 0x00000050 pop ebp 0x00000051 push eax 0x00000052 push edx 0x00000053 jmp 00007F0E05506CF5h 0x00000058 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D90151 second address: 4D90180 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E055074FAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F0E055074FBh 0x0000000f xchg eax, ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F0E05507500h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D90180 second address: 4D90184 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D90184 second address: 4D9018A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D9018A second address: 4D901AC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0E05506CEEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F0E05506CEAh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D901AC second address: 4D901B2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D901B2 second address: 4D400C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, esi 0x00000005 mov ecx, 5CC32CCFh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pop ebp 0x0000000e pushad 0x0000000f mov edx, eax 0x00000011 pushfd 0x00000012 jmp 00007F0E05506CECh 0x00000017 jmp 00007F0E05506CF5h 0x0000001c popfd 0x0000001d popad 0x0000001e jmp dword ptr [7598155Ch] 0x00000024 mov edi, edi 0x00000026 push ebp 0x00000027 mov ebp, esp 0x00000029 mov ecx, dword ptr fs:[00000018h] 0x00000030 mov eax, dword ptr [ebp+08h] 0x00000033 mov dword ptr [ecx+34h], 00000000h 0x0000003a cmp eax, 40h 0x0000003d jnc 00007F0E05506CEDh 0x0000003f mov eax, dword ptr [ecx+eax*4+00000E10h] 0x00000046 pop ebp 0x00000047 retn 0004h 0x0000004a test eax, eax 0x0000004c je 00007F0E05506D03h 0x0000004e mov eax, dword ptr [00432010h] 0x00000053 cmp eax, FFFFFFFFh 0x00000056 je 00007F0E05506CF9h 0x00000058 mov esi, 0042F218h 0x0000005d push esi 0x0000005e call 00007F0E09E45457h 0x00000063 mov edi, edi 0x00000065 pushad 0x00000066 push eax 0x00000067 push edx 0x00000068 mov bx, A0BCh 0x0000006c rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D30CB8 second address: 4D30CD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 mov ax, bx 0x0000000a popad 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0E05507501h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D30CD7 second address: 4D30D13 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0E05506CEAh 0x00000009 sub si, A5F8h 0x0000000e jmp 00007F0E05506CEBh 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 mov dword ptr [esp], ebp 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F0E05506CF5h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D30D13 second address: 4D30D19 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4kahanaK78.exe | RDTSC instruction interceptor: First address: 4D30D19 second address: 4D30D1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |