Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: EB83AB second address: EB83B5 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F6644F246ECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: EB83B5 second address: EB7C23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 cld 0x0000000a push dword ptr [ebp+122D11F9h] 0x00000010 pushad 0x00000011 mov dword ptr [ebp+122D2DC3h], edi 0x00000017 js 00007F664452DADCh 0x0000001d add ebx, dword ptr [ebp+122D2ACEh] 0x00000023 popad 0x00000024 call dword ptr [ebp+122D1CADh] 0x0000002a pushad 0x0000002b cmc 0x0000002c xor eax, eax 0x0000002e pushad 0x0000002f mov di, 7EDBh 0x00000033 mov dword ptr [ebp+122D25D1h], ecx 0x00000039 popad 0x0000003a mov edx, dword ptr [esp+28h] 0x0000003e sub dword ptr [ebp+122D25D1h], edi 0x00000044 mov dword ptr [ebp+122D2CF2h], eax 0x0000004a jns 00007F664452DADCh 0x00000050 mov esi, 0000003Ch 0x00000055 jmp 00007F664452DADAh 0x0000005a add esi, dword ptr [esp+24h] 0x0000005e clc 0x0000005f sub dword ptr [ebp+122D1A0Ah], esi 0x00000065 lodsw 0x00000067 stc 0x00000068 pushad 0x00000069 or ebx, dword ptr [ebp+122D2A82h] 0x0000006f jmp 00007F664452DAE4h 0x00000074 popad 0x00000075 add eax, dword ptr [esp+24h] 0x00000079 jmp 00007F664452DADFh 0x0000007e mov ebx, dword ptr [esp+24h] 0x00000082 mov dword ptr [ebp+122D25D1h], eax 0x00000088 stc 0x00000089 push eax 0x0000008a push eax 0x0000008b push edx 0x0000008c je 00007F664452DAD8h 0x00000092 push ebx 0x00000093 pop ebx 0x00000094 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 103C7F7 second address: 103C80C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246ECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push edi 0x0000000b pop edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 103C80C second address: 103C814 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 103C814 second address: 103C819 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 103C819 second address: 103C81F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 103C81F second address: 103C823 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 103C959 second address: 103C972 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F664452DAE1h 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 103C972 second address: 103C97C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 pushad 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 103C97C second address: 103C98A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 jne 00007F664452DAD6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1040681 second address: 104071A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F6644F246F6h 0x0000000b jmp 00007F6644F246EAh 0x00000010 popad 0x00000011 popad 0x00000012 add dword ptr [esp], 6916AC14h 0x00000019 call 00007F6644F246EFh 0x0000001e mov dword ptr [ebp+122D25F4h], ecx 0x00000024 pop ecx 0x00000025 and si, 13FFh 0x0000002a push 00000003h 0x0000002c or edi, 21C40088h 0x00000032 mov edi, dword ptr [ebp+122D2B8Ah] 0x00000038 push 00000000h 0x0000003a push 00000000h 0x0000003c push edi 0x0000003d call 00007F6644F246E8h 0x00000042 pop edi 0x00000043 mov dword ptr [esp+04h], edi 0x00000047 add dword ptr [esp+04h], 00000014h 0x0000004f inc edi 0x00000050 push edi 0x00000051 ret 0x00000052 pop edi 0x00000053 ret 0x00000054 sub dword ptr [ebp+122DB572h], edi 0x0000005a push 00000003h 0x0000005c jne 00007F6644F246E6h 0x00000062 call 00007F6644F246E9h 0x00000067 push eax 0x00000068 push edx 0x00000069 jmp 00007F6644F246EAh 0x0000006e rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 104071A second address: 1040733 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F664452DAE5h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1040733 second address: 104079A instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F6644F246E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jp 00007F6644F2470Fh 0x00000013 mov eax, dword ptr [esp+04h] 0x00000017 jc 00007F6644F246F2h 0x0000001d jp 00007F6644F246ECh 0x00000023 mov eax, dword ptr [eax] 0x00000025 push eax 0x00000026 jp 00007F6644F246E8h 0x0000002c pop eax 0x0000002d mov dword ptr [esp+04h], eax 0x00000031 push ebx 0x00000032 push eax 0x00000033 push edx 0x00000034 push edx 0x00000035 pop edx 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 104079A second address: 10407CD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 pop eax 0x00000008 and cx, 76DBh 0x0000000d lea ebx, dword ptr [ebp+1245C50Dh] 0x00000013 mov edx, esi 0x00000015 xchg eax, ebx 0x00000016 push edi 0x00000017 je 00007F664452DAD8h 0x0000001d pushad 0x0000001e popad 0x0000001f pop edi 0x00000020 push eax 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007F664452DAE0h 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10407CD second address: 10407D7 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F6644F246ECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10408C7 second address: 10408E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov eax, dword ptr [esp+04h] 0x00000008 pushad 0x00000009 jmp 00007F664452DADDh 0x0000000e jbe 00007F664452DADCh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10408E5 second address: 1040926 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov eax, dword ptr [eax] 0x00000007 jmp 00007F6644F246F3h 0x0000000c mov dword ptr [esp+04h], eax 0x00000010 pushad 0x00000011 jns 00007F6644F246ECh 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007F6644F246F4h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1040926 second address: 1040966 instructions: 0x00000000 rdtsc 0x00000002 js 00007F664452DAD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b pop eax 0x0000000c or dword ptr [ebp+122D1A0Ah], edi 0x00000012 lea ebx, dword ptr [ebp+1245C516h] 0x00000018 push 00000000h 0x0000001a push ebx 0x0000001b call 00007F664452DAD8h 0x00000020 pop ebx 0x00000021 mov dword ptr [esp+04h], ebx 0x00000025 add dword ptr [esp+04h], 0000001Ah 0x0000002d inc ebx 0x0000002e push ebx 0x0000002f ret 0x00000030 pop ebx 0x00000031 ret 0x00000032 xchg eax, ebx 0x00000033 push eax 0x00000034 push edx 0x00000035 pushad 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1040966 second address: 104096C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 104096C second address: 1040971 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10409E8 second address: 10409EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10409EC second address: 10409F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10409F6 second address: 10409FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1040AD6 second address: 1040B02 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DAE9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b pushad 0x0000000c push ebx 0x0000000d jnl 00007F664452DAD6h 0x00000013 pop ebx 0x00000014 push eax 0x00000015 push edx 0x00000016 push esi 0x00000017 pop esi 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1040B02 second address: 1040B5A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b pushad 0x0000000c jmp 00007F6644F246F8h 0x00000011 jmp 00007F6644F246F0h 0x00000016 popad 0x00000017 pop eax 0x00000018 jmp 00007F6644F246F1h 0x0000001d lea ebx, dword ptr [ebp+1245C521h] 0x00000023 add dword ptr [ebp+122D2DCAh], ebx 0x00000029 xchg eax, ebx 0x0000002a pushad 0x0000002b pushad 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1040B5A second address: 1040B6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F664452DADBh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 105F164 second address: 105F16D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 105F44A second address: 105F44E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 105F44E second address: 105F454 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 105F705 second address: 105F70A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 105F70A second address: 105F710 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1056011 second address: 1056048 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jne 00007F664452DAEBh 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 jnc 00007F664452DAD6h 0x0000001b jc 00007F664452DAD6h 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10365FC second address: 1036600 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10600DC second address: 10600E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10606A1 second address: 10606A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1060978 second address: 106097D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 106097D second address: 1060995 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6644F246EFh 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1060995 second address: 106099F instructions: 0x00000000 rdtsc 0x00000002 jc 00007F664452DAD6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1062FFA second address: 106300C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007F6644F246ECh 0x0000000c js 00007F6644F246E6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 106300C second address: 1063028 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DAE2h 0x00000007 push eax 0x00000008 push edx 0x00000009 jnc 00007F664452DAD6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10644C5 second address: 10644CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10644CB second address: 10644D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 102FA06 second address: 102FA0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 102FA0C second address: 102FA11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 106979E second address: 10697C2 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F6644F246E8h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push ecx 0x00000010 jmp 00007F6644F246F3h 0x00000015 pop ecx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1069BC8 second address: 1069BCC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1069BCC second address: 1069BD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 106B24C second address: 106B252 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 106B252 second address: 106B256 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 106B256 second address: 106B28C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DADDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jns 00007F664452DADCh 0x0000000f pop edx 0x00000010 push eax 0x00000011 push edx 0x00000012 je 00007F664452DADCh 0x00000018 jg 00007F664452DAD6h 0x0000001e jmp 00007F664452DADAh 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 102C21B second address: 102C221 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 102C221 second address: 102C225 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 106ECE4 second address: 106ECEE instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F6644F246ECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 106EE2E second address: 106EE3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 jl 00007F664452DAD6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 106EE3C second address: 106EE50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6644F246ECh 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 106EE50 second address: 106EE5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F664452DAD6h 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 106F277 second address: 106F286 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 106F3A4 second address: 106F3B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F664452DADDh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 106F3B7 second address: 106F3C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F6644F246E6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 106F3C6 second address: 106F3CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1071B5A second address: 1071B70 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jo 00007F6644F246E6h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 jng 00007F6644F246E6h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1071E57 second address: 1071E65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 jg 00007F664452DAD6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1072071 second address: 1072075 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1072075 second address: 107208C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 pushad 0x00000009 pushad 0x0000000a jbe 00007F664452DAD6h 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 107208C second address: 1072090 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1072090 second address: 1072094 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1072778 second address: 1072794 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F6644F246F2h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1072DBD second address: 1072DC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1072DC1 second address: 1072E19 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246F2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F6644F246F6h 0x0000000e popad 0x0000000f mov dword ptr [esp], eax 0x00000012 push 00000000h 0x00000014 push eax 0x00000015 call 00007F6644F246E8h 0x0000001a pop eax 0x0000001b mov dword ptr [esp+04h], eax 0x0000001f add dword ptr [esp+04h], 0000001Bh 0x00000027 inc eax 0x00000028 push eax 0x00000029 ret 0x0000002a pop eax 0x0000002b ret 0x0000002c xchg eax, ebx 0x0000002d push ebx 0x0000002e pushad 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1073345 second address: 1073349 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1073BAC second address: 1073BC1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 pop eax 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jne 00007F6644F246E6h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1073BC1 second address: 1073BCB instructions: 0x00000000 rdtsc 0x00000002 ja 00007F664452DAD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1073BCB second address: 1073BD0 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1077743 second address: 1077749 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1078202 second address: 1078206 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1077FEF second address: 1077FF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1077FF3 second address: 1077FF7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1078C8C second address: 1078C92 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1077FF7 second address: 1077FFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 107B408 second address: 107B445 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DADFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007F664452DAE1h 0x00000011 pop edx 0x00000012 popad 0x00000013 pushad 0x00000014 jmp 00007F664452DAE0h 0x00000019 push ebx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 102DD61 second address: 102DD90 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 ja 00007F6644F246E6h 0x0000000b popad 0x0000000c jmp 00007F6644F246ECh 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F6644F246F1h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1079EFF second address: 1079F0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 je 00007F664452DAD6h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 102DD90 second address: 102DDAE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246F8h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 102DDAE second address: 102DDB4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 102DDB4 second address: 102DDB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 107E7BE second address: 107E836 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DAE3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F664452DADEh 0x00000010 pop edx 0x00000011 nop 0x00000012 push 00000000h 0x00000014 push eax 0x00000015 call 00007F664452DAD8h 0x0000001a pop eax 0x0000001b mov dword ptr [esp+04h], eax 0x0000001f add dword ptr [esp+04h], 0000001Bh 0x00000027 inc eax 0x00000028 push eax 0x00000029 ret 0x0000002a pop eax 0x0000002b ret 0x0000002c mov bh, cl 0x0000002e push 00000000h 0x00000030 jbe 00007F664452DADBh 0x00000036 sbb bx, BB63h 0x0000003b push 00000000h 0x0000003d jmp 00007F664452DAE5h 0x00000042 push eax 0x00000043 pushad 0x00000044 push eax 0x00000045 push edx 0x00000046 pushad 0x00000047 popad 0x00000048 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 107D86C second address: 107D872 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 107D872 second address: 107D878 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 107D878 second address: 107D87C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 107E9E6 second address: 107E9EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 107F989 second address: 107F98E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 107E9EA second address: 107EA8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push ecx 0x00000008 jc 00007F664452DAEDh 0x0000000e jmp 00007F664452DAE7h 0x00000013 pop ecx 0x00000014 nop 0x00000015 mov ebx, dword ptr [ebp+1245CAC6h] 0x0000001b push dword ptr fs:[00000000h] 0x00000022 movzx ebx, di 0x00000025 mov dword ptr fs:[00000000h], esp 0x0000002c ja 00007F664452DADBh 0x00000032 mov ebx, 16E1258Fh 0x00000037 adc bx, 8F38h 0x0000003c mov eax, dword ptr [ebp+122D0E49h] 0x00000042 push 00000000h 0x00000044 push ecx 0x00000045 call 00007F664452DAD8h 0x0000004a pop ecx 0x0000004b mov dword ptr [esp+04h], ecx 0x0000004f add dword ptr [esp+04h], 00000015h 0x00000057 inc ecx 0x00000058 push ecx 0x00000059 ret 0x0000005a pop ecx 0x0000005b ret 0x0000005c mov dword ptr [ebp+1245CAC1h], ebx 0x00000062 push FFFFFFFFh 0x00000064 call 00007F664452DAE6h 0x00000069 add ebx, 19B7235Eh 0x0000006f pop edi 0x00000070 nop 0x00000071 push esi 0x00000072 push eax 0x00000073 push edx 0x00000074 jp 00007F664452DAD6h 0x0000007a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1082B20 second address: 1082B24 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1082B24 second address: 1082B2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1082B2A second address: 1082B42 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6644F246F4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1082CD3 second address: 1082CD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1083A86 second address: 1083A8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1082CD7 second address: 1082CDB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 108495E second address: 1084962 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1083A8B second address: 1083A91 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1082CDB second address: 1082CE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1084962 second address: 1084988 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 mov dword ptr [esp], eax 0x0000000a mov edi, dword ptr [ebp+122D2ABAh] 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 cld 0x00000015 xchg eax, esi 0x00000016 jmp 00007F664452DADAh 0x0000001b push eax 0x0000001c push ebx 0x0000001d push eax 0x0000001e push edx 0x0000001f push ecx 0x00000020 pop ecx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1083A91 second address: 1083A9F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1084988 second address: 108498C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1083A9F second address: 1083AA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1083AA3 second address: 1083AA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1086982 second address: 1086986 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1087A8B second address: 1087A91 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1088B12 second address: 1088BA9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246EDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a jne 00007F6644F246E6h 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push ebp 0x00000015 call 00007F6644F246E8h 0x0000001a pop ebp 0x0000001b mov dword ptr [esp+04h], ebp 0x0000001f add dword ptr [esp+04h], 0000001Ch 0x00000027 inc ebp 0x00000028 push ebp 0x00000029 ret 0x0000002a pop ebp 0x0000002b ret 0x0000002c mov bh, dh 0x0000002e push 00000000h 0x00000030 push 00000000h 0x00000032 push edi 0x00000033 call 00007F6644F246E8h 0x00000038 pop edi 0x00000039 mov dword ptr [esp+04h], edi 0x0000003d add dword ptr [esp+04h], 00000017h 0x00000045 inc edi 0x00000046 push edi 0x00000047 ret 0x00000048 pop edi 0x00000049 ret 0x0000004a pushad 0x0000004b movzx eax, ax 0x0000004e mov dword ptr [ebp+122D217Ah], edx 0x00000054 popad 0x00000055 adc ebx, 118443FAh 0x0000005b xchg eax, esi 0x0000005c jmp 00007F6644F246F9h 0x00000061 push eax 0x00000062 pushad 0x00000063 pushad 0x00000064 pushad 0x00000065 popad 0x00000066 push eax 0x00000067 pop eax 0x00000068 popad 0x00000069 pushad 0x0000006a push eax 0x0000006b push edx 0x0000006c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1087CDC second address: 1087CF8 instructions: 0x00000000 rdtsc 0x00000002 js 00007F664452DAD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f jmp 00007F664452DADBh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1086B7C second address: 1086B82 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1087CF8 second address: 1087CFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1087CFD second address: 1087D03 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1087D03 second address: 1087D07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1086B82 second address: 1086C22 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jnl 00007F6644F246F8h 0x0000000f nop 0x00000010 push 00000000h 0x00000012 push ebx 0x00000013 call 00007F6644F246E8h 0x00000018 pop ebx 0x00000019 mov dword ptr [esp+04h], ebx 0x0000001d add dword ptr [esp+04h], 0000001Ah 0x00000025 inc ebx 0x00000026 push ebx 0x00000027 ret 0x00000028 pop ebx 0x00000029 ret 0x0000002a push dword ptr fs:[00000000h] 0x00000031 sub dword ptr [ebp+122D264Eh], edi 0x00000037 mov dword ptr fs:[00000000h], esp 0x0000003e push 00000000h 0x00000040 push eax 0x00000041 call 00007F6644F246E8h 0x00000046 pop eax 0x00000047 mov dword ptr [esp+04h], eax 0x0000004b add dword ptr [esp+04h], 0000001Ch 0x00000053 inc eax 0x00000054 push eax 0x00000055 ret 0x00000056 pop eax 0x00000057 ret 0x00000058 mov ebx, 3A1B75F5h 0x0000005d adc di, E1A0h 0x00000062 mov eax, dword ptr [ebp+122D0C75h] 0x00000068 add dword ptr [ebp+122D1A1Ch], eax 0x0000006e push FFFFFFFFh 0x00000070 mov edi, edx 0x00000072 nop 0x00000073 pushad 0x00000074 push eax 0x00000075 push edx 0x00000076 jbe 00007F6644F246E6h 0x0000007c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1087D07 second address: 1087D9E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DADFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c mov dword ptr [ebp+122D317Dh], ebx 0x00000012 js 00007F664452DADAh 0x00000018 mov bx, E1D9h 0x0000001c push dword ptr fs:[00000000h] 0x00000023 mov edi, dword ptr [ebp+122D1B66h] 0x00000029 mov dword ptr fs:[00000000h], esp 0x00000030 pushad 0x00000031 or eax, dword ptr [ebp+122D281Ch] 0x00000037 jp 00007F664452DADCh 0x0000003d popad 0x0000003e mov eax, dword ptr [ebp+122D0FB5h] 0x00000044 push 00000000h 0x00000046 push esi 0x00000047 call 00007F664452DAD8h 0x0000004c pop esi 0x0000004d mov dword ptr [esp+04h], esi 0x00000051 add dword ptr [esp+04h], 00000018h 0x00000059 inc esi 0x0000005a push esi 0x0000005b ret 0x0000005c pop esi 0x0000005d ret 0x0000005e movzx edi, di 0x00000061 push FFFFFFFFh 0x00000063 mov bx, 5742h 0x00000067 nop 0x00000068 je 00007F664452DAE2h 0x0000006e jne 00007F664452DADCh 0x00000074 push eax 0x00000075 push eax 0x00000076 push edx 0x00000077 push esi 0x00000078 push edx 0x00000079 pop edx 0x0000007a pop esi 0x0000007b rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1089B05 second address: 1089B6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 nop 0x00000006 push 00000000h 0x00000008 push ebx 0x00000009 call 00007F6644F246E8h 0x0000000e pop ebx 0x0000000f mov dword ptr [esp+04h], ebx 0x00000013 add dword ptr [esp+04h], 0000001Dh 0x0000001b inc ebx 0x0000001c push ebx 0x0000001d ret 0x0000001e pop ebx 0x0000001f ret 0x00000020 xor ebx, dword ptr [ebp+122D2542h] 0x00000026 push 00000000h 0x00000028 cmc 0x00000029 or bx, 375Fh 0x0000002e push 00000000h 0x00000030 jmp 00007F6644F246EBh 0x00000035 xchg eax, esi 0x00000036 jmp 00007F6644F246F4h 0x0000003b push eax 0x0000003c push eax 0x0000003d push edx 0x0000003e js 00007F6644F246E8h 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1088D0A second address: 1088D0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1088D0E second address: 1088D23 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1088D23 second address: 1088D43 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DAE3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 108AB45 second address: 108AB4F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F6644F246E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 108AB4F second address: 108AB64 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F664452DAD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push edx 0x00000011 pop edx 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 108CD2C second address: 108CD3D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246EDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 108CD3D second address: 108CD43 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 108CD43 second address: 108CDF2 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push ebp 0x0000000c call 00007F6644F246E8h 0x00000011 pop ebp 0x00000012 mov dword ptr [esp+04h], ebp 0x00000016 add dword ptr [esp+04h], 0000001Dh 0x0000001e inc ebp 0x0000001f push ebp 0x00000020 ret 0x00000021 pop ebp 0x00000022 ret 0x00000023 sbb bh, 00000071h 0x00000026 pushad 0x00000027 sub di, 9B64h 0x0000002c mov bl, ch 0x0000002e popad 0x0000002f push 00000000h 0x00000031 jmp 00007F6644F246F9h 0x00000036 push 00000000h 0x00000038 push 00000000h 0x0000003a push esi 0x0000003b call 00007F6644F246E8h 0x00000040 pop esi 0x00000041 mov dword ptr [esp+04h], esi 0x00000045 add dword ptr [esp+04h], 00000019h 0x0000004d inc esi 0x0000004e push esi 0x0000004f ret 0x00000050 pop esi 0x00000051 ret 0x00000052 add edi, 5AFAD7B1h 0x00000058 xchg eax, esi 0x00000059 push eax 0x0000005a jmp 00007F6644F246F1h 0x0000005f pop eax 0x00000060 push eax 0x00000061 pushad 0x00000062 push eax 0x00000063 push edx 0x00000064 jmp 00007F6644F246F9h 0x00000069 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 108CF03 second address: 108CF09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1093DF9 second address: 1093DFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1093DFF second address: 1093E04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1098D42 second address: 1098D46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1098D46 second address: 1098D66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edx 0x00000008 pop edx 0x00000009 jmp 00007F664452DADAh 0x0000000e jnp 00007F664452DAD6h 0x00000014 popad 0x00000015 popad 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1098D66 second address: 1098D70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F6644F246E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1098D70 second address: 1098D8C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DAE8h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1098D8C second address: 1098DA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F6644F246ECh 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1098848 second address: 1098888 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F664452DAE0h 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jmp 00007F664452DAE7h 0x00000013 jmp 00007F664452DADEh 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1098888 second address: 1098897 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F6644F246EAh 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 109CE54 second address: 109CE5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F664452DAD6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 109CE5E second address: 109CE62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 109D042 second address: 109D048 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 109D048 second address: 109D04C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10A2C38 second address: 10A2C3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10A2A28 second address: 10A2A2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10A2A2C second address: 10A2A4C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DAE9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10A2A4C second address: 10A2AA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F6644F246E6h 0x0000000a js 00007F6644F246E6h 0x00000010 ja 00007F6644F246E6h 0x00000016 popad 0x00000017 jmp 00007F6644F246EBh 0x0000001c jmp 00007F6644F246F2h 0x00000021 popad 0x00000022 push edx 0x00000023 push edi 0x00000024 push edx 0x00000025 pop edx 0x00000026 js 00007F6644F246E6h 0x0000002c pop edi 0x0000002d push eax 0x0000002e push edx 0x0000002f jmp 00007F6644F246F9h 0x00000034 push edi 0x00000035 pop edi 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10A2AA9 second address: 10A2AAD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10A7FEB second address: 10A8007 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246F8h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10A8007 second address: 10A8018 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 je 00007F664452DAD6h 0x0000000d pop edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10A8018 second address: 10A804A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F6644F246E6h 0x0000000a jnc 00007F6644F246E6h 0x00000010 popad 0x00000011 js 00007F6644F246EAh 0x00000017 push edx 0x00000018 pop edx 0x00000019 push esi 0x0000001a pop esi 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f jmp 00007F6644F246F0h 0x00000024 pushad 0x00000025 popad 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10A804A second address: 10A804F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10A6EB3 second address: 10A6EBD instructions: 0x00000000 rdtsc 0x00000002 jo 00007F6644F246E6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10703E7 second address: 1070402 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F664452DAE7h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1070402 second address: 1070406 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1070406 second address: 1056011 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push 00000000h 0x0000000d push esi 0x0000000e call 00007F664452DAD8h 0x00000013 pop esi 0x00000014 mov dword ptr [esp+04h], esi 0x00000018 add dword ptr [esp+04h], 0000001Ah 0x00000020 inc esi 0x00000021 push esi 0x00000022 ret 0x00000023 pop esi 0x00000024 ret 0x00000025 jmp 00007F664452DADDh 0x0000002a mov edi, 1236B2E6h 0x0000002f lea eax, dword ptr [ebp+1248C1D7h] 0x00000035 mov edi, edx 0x00000037 push eax 0x00000038 push edx 0x00000039 pushad 0x0000003a pushad 0x0000003b popad 0x0000003c push esi 0x0000003d pop esi 0x0000003e popad 0x0000003f pop edx 0x00000040 mov dword ptr [esp], eax 0x00000043 sub dword ptr [ebp+122D2654h], esi 0x00000049 call dword ptr [ebp+122D3B41h] 0x0000004f pushad 0x00000050 push eax 0x00000051 pushad 0x00000052 popad 0x00000053 pushad 0x00000054 popad 0x00000055 pop eax 0x00000056 jl 00007F664452DAD8h 0x0000005c pushad 0x0000005d push eax 0x0000005e push edx 0x0000005f rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1070BCF second address: 1070BDD instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1070BDD second address: 1070BE3 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1070BE3 second address: 1070BFC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6644F246F5h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1070BFC second address: 1070C00 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1070C44 second address: 1070C48 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1070F7B second address: 1070F8F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F664452DAE0h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1071354 second address: 1071358 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1071802 second address: 107186B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 jmp 00007F664452DADBh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp], eax 0x00000010 push 00000000h 0x00000012 push eax 0x00000013 call 00007F664452DAD8h 0x00000018 pop eax 0x00000019 mov dword ptr [esp+04h], eax 0x0000001d add dword ptr [esp+04h], 00000018h 0x00000025 inc eax 0x00000026 push eax 0x00000027 ret 0x00000028 pop eax 0x00000029 ret 0x0000002a mov cl, F1h 0x0000002c lea eax, dword ptr [ebp+1248C1D7h] 0x00000032 mov ecx, eax 0x00000034 nop 0x00000035 push edi 0x00000036 push eax 0x00000037 jns 00007F664452DAD6h 0x0000003d pop eax 0x0000003e pop edi 0x0000003f push eax 0x00000040 pushad 0x00000041 push edx 0x00000042 jmp 00007F664452DAE2h 0x00000047 pop edx 0x00000048 push eax 0x00000049 push edx 0x0000004a jne 00007F664452DAD6h 0x00000050 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 107186B second address: 107186F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10A78F0 second address: 10A7926 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F664452DAD6h 0x00000008 jmp 00007F664452DAE8h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 jp 00007F664452DAD6h 0x00000019 jnc 00007F664452DAD6h 0x0000001f push eax 0x00000020 pop eax 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10A7926 second address: 10A792B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10AC528 second address: 10AC53E instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F664452DAD6h 0x00000008 jmp 00007F664452DADCh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10ACC0C second address: 10ACC10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10ACC10 second address: 10ACC26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F664452DAE0h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10AC237 second address: 10AC23B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10ACF2F second address: 10ACF34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10AD200 second address: 10AD206 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10AD206 second address: 10AD20C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10AD20C second address: 10AD221 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F6644F246EDh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10B3D04 second address: 10B3D09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10B2CA4 second address: 10B2CD0 instructions: 0x00000000 rdtsc 0x00000002 je 00007F6644F246FAh 0x00000008 push esi 0x00000009 jmp 00007F6644F246EDh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10B2DE7 second address: 10B2DED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10B2F3D second address: 10B2F92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jl 00007F6644F24705h 0x0000000c jmp 00007F6644F246F0h 0x00000011 jmp 00007F6644F246EFh 0x00000016 pushad 0x00000017 pushad 0x00000018 popad 0x00000019 js 00007F6644F246E6h 0x0000001f jmp 00007F6644F246F7h 0x00000024 popad 0x00000025 popad 0x00000026 push edi 0x00000027 pushad 0x00000028 push edi 0x00000029 pop edi 0x0000002a pushad 0x0000002b popad 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10B30BC second address: 10B30DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jmp 00007F664452DADDh 0x0000000a popad 0x0000000b pushad 0x0000000c jg 00007F664452DAD8h 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10B30DC second address: 10B30E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10B30E0 second address: 10B30E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10B34B8 second address: 10B34C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6644F246EDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10B34C9 second address: 10B34EE instructions: 0x00000000 rdtsc 0x00000002 jl 00007F664452DAD6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d push edi 0x0000000e pop edi 0x0000000f pop ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F664452DAE3h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10B34EE second address: 10B3501 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246EFh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10BA0F9 second address: 10BA0FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10BA0FF second address: 10BA107 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10BA107 second address: 10BA136 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DADAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a jmp 00007F664452DAE2h 0x0000000f push eax 0x00000010 push edx 0x00000011 js 00007F664452DAD6h 0x00000017 jng 00007F664452DAD6h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10BA136 second address: 10BA13A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10BC470 second address: 10BC476 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10BC1D4 second address: 10BC1DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10BC1DC second address: 10BC1EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F664452DADAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10BF457 second address: 10BF45B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C36DB second address: 10C36E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C36E0 second address: 10C36E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C36E6 second address: 10C36EC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C3831 second address: 10C3844 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jg 00007F6644F246F2h 0x0000000b jns 00007F6644F246E6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C39C6 second address: 10C39CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C39CA second address: 10C39DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b je 00007F6644F246E6h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C39DB second address: 10C39DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C39DF second address: 10C39F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6644F246EBh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C39F3 second address: 10C39FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C39FA second address: 10C3A0A instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F6644F246EAh 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C3A0A second address: 10C3A0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C3B4A second address: 10C3B4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C3B4E second address: 10C3B52 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C3B52 second address: 10C3B58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C3B58 second address: 10C3B5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C3B5E second address: 10C3B72 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jng 00007F6644F246E6h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jnl 00007F6644F246E6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C3CF6 second address: 10C3D00 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007F664452DAD6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C3D00 second address: 10C3D20 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jng 00007F6644F2471Dh 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F6644F246F0h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C3D20 second address: 10C3D24 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C9DFE second address: 10C9E04 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C895A second address: 10C8966 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jnp 00007F664452DAD6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C8966 second address: 10C8987 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F6644F246F1h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d ja 00007F6644F246E6h 0x00000013 push edi 0x00000014 pop edi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C8D7B second address: 10C8D81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C8D81 second address: 10C8D9F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F6644F246F8h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C8D9F second address: 10C8DA4 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C8DA4 second address: 10C8DB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a push esi 0x0000000b pop esi 0x0000000c pop ecx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C8DB1 second address: 10C8DBD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F664452DAD6h 0x0000000a push edx 0x0000000b pop edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 107111A second address: 107111E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 107111E second address: 1071179 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 nop 0x00000008 mov ecx, 052AFA56h 0x0000000d mov ebx, dword ptr [ebp+1248C216h] 0x00000013 mov edi, dword ptr [ebp+122D2D7Eh] 0x00000019 add eax, ebx 0x0000001b push 00000000h 0x0000001d push edx 0x0000001e call 00007F664452DAD8h 0x00000023 pop edx 0x00000024 mov dword ptr [esp+04h], edx 0x00000028 add dword ptr [esp+04h], 00000017h 0x00000030 inc edx 0x00000031 push edx 0x00000032 ret 0x00000033 pop edx 0x00000034 ret 0x00000035 call 00007F664452DADEh 0x0000003a add dl, 00000026h 0x0000003d pop edx 0x0000003e push eax 0x0000003f push eax 0x00000040 push edx 0x00000041 ja 00007F664452DADCh 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1071179 second address: 10711F5 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 je 00007F6644F246E6h 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f call 00007F6644F246F0h 0x00000014 jc 00007F6644F246ECh 0x0000001a jg 00007F6644F246E6h 0x00000020 pop edi 0x00000021 push 00000004h 0x00000023 push 00000000h 0x00000025 push ebp 0x00000026 call 00007F6644F246E8h 0x0000002b pop ebp 0x0000002c mov dword ptr [esp+04h], ebp 0x00000030 add dword ptr [esp+04h], 0000001Ah 0x00000038 inc ebp 0x00000039 push ebp 0x0000003a ret 0x0000003b pop ebp 0x0000003c ret 0x0000003d jns 00007F6644F246F8h 0x00000043 nop 0x00000044 jmp 00007F6644F246EEh 0x00000049 push eax 0x0000004a pushad 0x0000004b pushad 0x0000004c push eax 0x0000004d push edx 0x0000004e rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C8F45 second address: 10C8F4F instructions: 0x00000000 rdtsc 0x00000002 jne 00007F664452DAD6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C8F4F second address: 10C8F55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C9AFE second address: 10C9B08 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F664452DAD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C9B08 second address: 10C9B0D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C9B0D second address: 10C9B1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jl 00007F664452DAD6h 0x0000000f push esi 0x00000010 pop esi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10C9B1E second address: 10C9B22 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10CCDB1 second address: 10CCDB5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10CC530 second address: 10CC534 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10CC534 second address: 10CC53A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10CC53A second address: 10CC540 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10CC540 second address: 10CC545 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10CC6C5 second address: 10CC6CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10CC6CB second address: 10CC6DF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DADDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10CC6DF second address: 10CC6E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D5F63 second address: 10D5F67 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D5F67 second address: 10D5F6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D5F6D second address: 10D5F73 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D5F73 second address: 10D5FAA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246F7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jbe 00007F6644F246F8h 0x00000013 jmp 00007F6644F246F0h 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D408C second address: 10D4090 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D4090 second address: 10D4096 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D4096 second address: 10D40A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F664452DAD6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D40A0 second address: 10D40A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D40A4 second address: 10D40BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F664452DADEh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f push edi 0x00000010 pop edi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D43F0 second address: 10D43FC instructions: 0x00000000 rdtsc 0x00000002 jp 00007F6644F246E6h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D43FC second address: 10D4401 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D4401 second address: 10D4413 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 pushad 0x00000008 jnp 00007F6644F246E6h 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D49D1 second address: 10D49D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D49D5 second address: 10D49DE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D5050 second address: 10D506F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F664452DAE9h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D506F second address: 10D5074 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D534E second address: 10D5353 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D5353 second address: 10D5359 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D5359 second address: 10D535F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D535F second address: 10D536E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jg 00007F6644F246EEh 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D5689 second address: 10D568D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D568D second address: 10D5693 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D5693 second address: 10D56B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DAE8h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D56B3 second address: 10D56B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D595F second address: 10D5967 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D5967 second address: 10D596D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D596D second address: 10D598E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 pushad 0x00000007 jno 00007F664452DAD8h 0x0000000d je 00007F664452DADAh 0x00000013 js 00007F664452DADEh 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D5C35 second address: 10D5C4F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246F4h 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D5C4F second address: 10D5C5A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jng 00007F664452DAD6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D9022 second address: 10D9026 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D9026 second address: 10D902C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D945D second address: 10D9468 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D9468 second address: 10D946E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D946E second address: 10D9472 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D9472 second address: 10D9493 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 js 00007F664452DAD6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push esi 0x0000000d push edx 0x0000000e pop edx 0x0000000f jng 00007F664452DAD6h 0x00000015 pop esi 0x00000016 popad 0x00000017 js 00007F664452DAF6h 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D9493 second address: 10D949F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10D964F second address: 10D965B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E435A second address: 10E4360 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E4360 second address: 10E4364 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E450A second address: 10E4517 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F6644F246E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E496B second address: 10E496F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E496F second address: 10E498E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007F6644F246F4h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E4ADC second address: 10E4AFF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DAE3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jp 00007F664452DAD6h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E4AFF second address: 10E4B03 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E4B03 second address: 10E4B09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E4B09 second address: 10E4B0E instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E4DBF second address: 10E4DC5 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E4DC5 second address: 10E4DD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007F6644F246ECh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E5003 second address: 10E5008 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E515F second address: 10E5167 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E5167 second address: 10E51BB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DAE4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F664452DADEh 0x0000000f pushad 0x00000010 popad 0x00000011 jo 00007F664452DAD6h 0x00000017 popad 0x00000018 pushad 0x00000019 pushad 0x0000001a jmp 00007F664452DAE8h 0x0000001f jmp 00007F664452DAE1h 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E51BB second address: 10E51CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jg 00007F6644F246E6h 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E609C second address: 10E60A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E60A2 second address: 10E60A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E60A8 second address: 10E60AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10E60AC second address: 10E60C0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jns 00007F6644F246E6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f pushad 0x00000010 push edi 0x00000011 pop edi 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10EA32E second address: 10EA332 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10EEFEF second address: 10EEFF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10EEFF3 second address: 10EF017 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007F664452DAEEh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10EF017 second address: 10EF01D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10EF01D second address: 10EF021 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10EF021 second address: 10EF04D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246F8h 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jc 00007F6644F246E6h 0x00000013 jp 00007F6644F246E6h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10EF04D second address: 10EF051 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10EEBA7 second address: 10EEBC2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 jmp 00007F6644F246F3h 0x0000000c pop edi 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10F14D8 second address: 10F14DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10F6A83 second address: 10F6A8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 10FF3EC second address: 10FF41C instructions: 0x00000000 rdtsc 0x00000002 jne 00007F664452DAD6h 0x00000008 jmp 00007F664452DAE3h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push edx 0x00000012 pop edx 0x00000013 jmp 00007F664452DADFh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 102DD5D second address: 102DD61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 111B4E0 second address: 111B4F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 jns 00007F664452DAD6h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 111B4F1 second address: 111B4F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 111B4F5 second address: 111B4FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 111B7E3 second address: 111B7E8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 111B7E8 second address: 111B7F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 jng 00007F664452DAD6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 111B957 second address: 111B95B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 111BAEA second address: 111BB14 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F664452DAE1h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jnc 00007F664452DAE0h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1120139 second address: 112014C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F6644F246EDh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 112014C second address: 1120158 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F664452DAD6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1120158 second address: 112015C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 112BC01 second address: 112BC05 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 112BC05 second address: 112BC17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6644F246ECh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 113EA05 second address: 113EA09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 113EA09 second address: 113EA18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 113EA18 second address: 113EA1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 113EA1C second address: 113EA28 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jnc 00007F6644F246E6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 113E857 second address: 113E86A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DADCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 113E86A second address: 113E879 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 js 00007F6644F246E6h 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1141632 second address: 1141638 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1141638 second address: 1141647 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F6644F246E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push edi 0x0000000c pop edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1155132 second address: 1155137 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1155414 second address: 115542E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F6644F246EBh 0x0000000e jp 00007F6644F246E6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 115542E second address: 1155432 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1155432 second address: 1155442 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 ja 00007F6644F246EEh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 11558A9 second address: 11558B3 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F664452DAD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1155A22 second address: 1155A54 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246F6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a jmp 00007F6644F246F1h 0x0000000f pop edi 0x00000010 push esi 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1155B6B second address: 1155B7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F664452DAD6h 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1155CEE second address: 1155CF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1155CF2 second address: 1155D06 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F664452DAD6h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c ja 00007F664452DADEh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1155E69 second address: 1155E6F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 115774C second address: 1157754 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1157754 second address: 115775B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 115A10B second address: 115A10F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 115A374 second address: 115A37D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 115A37D second address: 115A389 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 115A389 second address: 115A390 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 115A390 second address: 115A3AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F664452DAE8h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 115D6D6 second address: 115D6DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 115F252 second address: 115F25E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jnp 00007F664452DAD6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 115F25E second address: 115F263 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 115F263 second address: 115F269 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 1074797 second address: 107479B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57502B0 second address: 57502B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57502B6 second address: 57502BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57502BB second address: 57502C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57502C1 second address: 57502E5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F6644F246F9h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57502E5 second address: 57502F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F664452DADCh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57502F5 second address: 575030A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 575030A second address: 5750333 instructions: 0x00000000 rdtsc 0x00000002 mov ax, 1287h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebx, esi 0x0000000a popad 0x0000000b xchg eax, ebp 0x0000000c jmp 00007F664452DAE6h 0x00000011 mov ebp, esp 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5750333 second address: 575033A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov ecx, edx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 575033A second address: 5750340 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5750340 second address: 5750375 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246EEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov edx, dword ptr [ebp+0Ch] 0x0000000e pushad 0x0000000f mov edx, ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 call 00007F6644F246F8h 0x00000018 pop eax 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5750375 second address: 575038F instructions: 0x00000000 rdtsc 0x00000002 call 00007F664452DADBh 0x00000007 pop esi 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov ecx, dword ptr [ebp+08h] 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 575038F second address: 5750393 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5750393 second address: 5750399 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5750399 second address: 57503B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6644F246F6h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57503D3 second address: 57503E5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edx, ax 0x00000006 mov bl, ch 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57503E5 second address: 57503F9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246F0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5770647 second address: 5770656 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DADBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5770656 second address: 57706E7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a jmp 00007F6644F246EEh 0x0000000f push eax 0x00000010 pushad 0x00000011 mov ax, di 0x00000014 jmp 00007F6644F246EDh 0x00000019 popad 0x0000001a xchg eax, ecx 0x0000001b jmp 00007F6644F246EEh 0x00000020 xchg eax, esi 0x00000021 pushad 0x00000022 pushfd 0x00000023 jmp 00007F6644F246EAh 0x00000028 or eax, 7059FB78h 0x0000002e jmp 00007F6644F246EBh 0x00000033 popfd 0x00000034 popad 0x00000035 push eax 0x00000036 jmp 00007F6644F246F9h 0x0000003b xchg eax, esi 0x0000003c push eax 0x0000003d push edx 0x0000003e pushad 0x0000003f mov esi, edx 0x00000041 push ebx 0x00000042 pop esi 0x00000043 popad 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57706E7 second address: 5770702 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F664452DAE7h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5770702 second address: 5770728 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 lea eax, dword ptr [ebp-04h] 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F6644F246F7h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5770728 second address: 5770745 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DAE9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5770745 second address: 577074B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 577074B second address: 5770761 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F664452DADBh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5770761 second address: 57707BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, dx 0x00000006 mov di, A196h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp], eax 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007F6644F246F3h 0x00000017 sub si, EE1Eh 0x0000001c jmp 00007F6644F246F9h 0x00000021 popfd 0x00000022 jmp 00007F6644F246F0h 0x00000027 popad 0x00000028 push dword ptr [ebp+08h] 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57707BF second address: 57707C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57707C3 second address: 57707E0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57707E0 second address: 57707E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5770899 second address: 57708D4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop edx 0x00000005 push esi 0x00000006 pop ebx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a leave 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F6644F246F1h 0x00000014 sbb ch, FFFFFFF6h 0x00000017 jmp 00007F6644F246F1h 0x0000001c popfd 0x0000001d mov eax, 0CC24AE7h 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57708D4 second address: 57601DC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F664452DAE3h 0x00000009 or ax, C32Eh 0x0000000e jmp 00007F664452DAE9h 0x00000013 popfd 0x00000014 pushfd 0x00000015 jmp 00007F664452DAE0h 0x0000001a adc esi, 2630D8A8h 0x00000020 jmp 00007F664452DADBh 0x00000025 popfd 0x00000026 popad 0x00000027 pop edx 0x00000028 pop eax 0x00000029 retn 0004h 0x0000002c nop 0x0000002d cmp eax, 00000000h 0x00000030 setne al 0x00000033 jmp 00007F664452DAD2h 0x00000035 xor ebx, ebx 0x00000037 test al, 01h 0x00000039 jne 00007F664452DAD7h 0x0000003b sub esp, 04h 0x0000003e mov dword ptr [esp], 0000000Dh 0x00000045 call 00007F6648DFB291h 0x0000004a mov edi, edi 0x0000004c push eax 0x0000004d push edx 0x0000004e pushad 0x0000004f jmp 00007F664452DADDh 0x00000054 mov di, cx 0x00000057 popad 0x00000058 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57601DC second address: 5760263 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246EDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F6644F246EEh 0x0000000f push eax 0x00000010 pushad 0x00000011 mov ecx, edx 0x00000013 mov si, dx 0x00000016 popad 0x00000017 xchg eax, ebp 0x00000018 jmp 00007F6644F246EFh 0x0000001d mov ebp, esp 0x0000001f pushad 0x00000020 pushfd 0x00000021 jmp 00007F6644F246EBh 0x00000026 sbb ax, 985Eh 0x0000002b jmp 00007F6644F246F9h 0x00000030 popfd 0x00000031 popad 0x00000032 sub esp, 2Ch 0x00000035 jmp 00007F6644F246EEh 0x0000003a xchg eax, ebx 0x0000003b push eax 0x0000003c push edx 0x0000003d push eax 0x0000003e push edx 0x0000003f jmp 00007F6644F246EAh 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760263 second address: 5760272 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DADBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760272 second address: 576028A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6644F246F4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 576028A second address: 576028E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 576028E second address: 57602B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F6644F246EEh 0x0000000e xchg eax, ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 mov di, BB30h 0x00000016 mov dh, 5Ah 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57602B0 second address: 57602B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57602B6 second address: 57602BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760331 second address: 5760356 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DAE9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub ebx, ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760356 second address: 576036E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246F4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 576036E second address: 57603BA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 4529A2D4h 0x00000008 call 00007F664452DADDh 0x0000000d pop eax 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 mov edi, 00000000h 0x00000016 jmp 00007F664452DADCh 0x0000001b inc ebx 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f pushfd 0x00000020 jmp 00007F664452DADCh 0x00000025 sub ax, B9B8h 0x0000002a jmp 00007F664452DADBh 0x0000002f popfd 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57603BA second address: 57603E2 instructions: 0x00000000 rdtsc 0x00000002 movzx ecx, di 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push edi 0x00000008 mov si, 2BE7h 0x0000000c pop eax 0x0000000d popad 0x0000000e test al, al 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F6644F246F6h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57603E2 second address: 576043B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DADBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F664452DD2Fh 0x0000000f pushad 0x00000010 mov bx, ax 0x00000013 push ecx 0x00000014 mov dx, 4742h 0x00000018 pop edx 0x00000019 popad 0x0000001a lea ecx, dword ptr [ebp-14h] 0x0000001d pushad 0x0000001e call 00007F664452DAE4h 0x00000023 mov di, cx 0x00000026 pop eax 0x00000027 mov cx, dx 0x0000002a popad 0x0000002b mov dword ptr [ebp-14h], edi 0x0000002e push eax 0x0000002f push edx 0x00000030 jmp 00007F664452DAE4h 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 576048F second address: 57604EA instructions: 0x00000000 rdtsc 0x00000002 mov cx, E0C5h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 movzx esi, bx 0x0000000b popad 0x0000000c push eax 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F6644F246EAh 0x00000014 sbb cl, 00000058h 0x00000017 jmp 00007F6644F246EBh 0x0000001c popfd 0x0000001d jmp 00007F6644F246F8h 0x00000022 popad 0x00000023 nop 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007F6644F246F7h 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760513 second address: 5760519 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760519 second address: 576052E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6644F246F1h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 576052E second address: 5760532 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760532 second address: 576056E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test eax, eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushfd 0x0000000e jmp 00007F6644F246F9h 0x00000013 adc ch, FFFFFFC6h 0x00000016 jmp 00007F6644F246F1h 0x0000001b popfd 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 576056E second address: 5760579 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 mov di, ax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760579 second address: 576059E instructions: 0x00000000 rdtsc 0x00000002 movzx esi, bx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 jg 00007F66B53E25F1h 0x0000000e jmp 00007F6644F246EBh 0x00000013 js 00007F6644F2479Eh 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 576059E second address: 57605B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DAE7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57605B9 second address: 576060D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [ebp-14h], edi 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F6644F246ECh 0x00000013 jmp 00007F6644F246F5h 0x00000018 popfd 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F6644F246EEh 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 576060D second address: 5760678 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F664452DAE2h 0x00000008 add ch, FFFFFFE8h 0x0000000b jmp 00007F664452DADBh 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 popad 0x00000014 jne 00007F66B49EB93Dh 0x0000001a jmp 00007F664452DAE6h 0x0000001f mov ebx, dword ptr [ebp+08h] 0x00000022 pushad 0x00000023 movzx eax, bx 0x00000026 mov esi, ebx 0x00000028 popad 0x00000029 lea eax, dword ptr [ebp-2Ch] 0x0000002c push eax 0x0000002d push edx 0x0000002e push eax 0x0000002f push edx 0x00000030 jmp 00007F664452DAE7h 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760678 second address: 576067C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 576067C second address: 5760682 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760682 second address: 57606CF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246F4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a jmp 00007F6644F246F0h 0x0000000f push eax 0x00000010 jmp 00007F6644F246EBh 0x00000015 xchg eax, esi 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F6644F246F5h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57606CF second address: 57606DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F664452DADCh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57606DF second address: 57606E3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57606E3 second address: 5760716 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov al, dh 0x0000000e pushfd 0x0000000f jmp 00007F664452DAE2h 0x00000014 sub si, 6528h 0x00000019 jmp 00007F664452DADBh 0x0000001e popfd 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760716 second address: 57607A7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F6644F246ECh 0x00000013 sub cx, F2B8h 0x00000018 jmp 00007F6644F246EBh 0x0000001d popfd 0x0000001e mov ecx, 15F15AEFh 0x00000023 popad 0x00000024 xchg eax, ebx 0x00000025 pushad 0x00000026 call 00007F6644F246F0h 0x0000002b pushfd 0x0000002c jmp 00007F6644F246F2h 0x00000031 sub ah, 00000048h 0x00000034 jmp 00007F6644F246EBh 0x00000039 popfd 0x0000003a pop eax 0x0000003b mov eax, ebx 0x0000003d popad 0x0000003e push eax 0x0000003f push eax 0x00000040 push edx 0x00000041 jmp 00007F6644F246F1h 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57607FA second address: 576081F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DAE9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 576081F second address: 5760823 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760823 second address: 5760827 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760827 second address: 576082D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 576082D second address: 576003A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ch, 17h 0x00000005 push edx 0x00000006 pop ecx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a je 00007F66B49EB8F4h 0x00000010 xor eax, eax 0x00000012 jmp 00007F664450720Ah 0x00000017 pop esi 0x00000018 pop edi 0x00000019 pop ebx 0x0000001a leave 0x0000001b retn 0004h 0x0000001e nop 0x0000001f xor ebx, ebx 0x00000021 cmp eax, 00000000h 0x00000024 je 00007F664452DC33h 0x0000002a call 00007F6648DFAF5Dh 0x0000002f mov edi, edi 0x00000031 pushad 0x00000032 mov bx, 3870h 0x00000036 jmp 00007F664452DAE9h 0x0000003b popad 0x0000003c xchg eax, ebp 0x0000003d pushad 0x0000003e movzx ecx, bx 0x00000041 mov ecx, edi 0x00000043 popad 0x00000044 push eax 0x00000045 push eax 0x00000046 push edx 0x00000047 push eax 0x00000048 push edx 0x00000049 jmp 00007F664452DADCh 0x0000004e rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 576003A second address: 576003E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 576003E second address: 5760044 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760044 second address: 57600BE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 jmp 00007F6644F246EFh 0x0000000e mov ebp, esp 0x00000010 pushad 0x00000011 mov esi, 439216DBh 0x00000016 movzx esi, bx 0x00000019 popad 0x0000001a push ebx 0x0000001b pushad 0x0000001c pushad 0x0000001d mov esi, 5D026CCBh 0x00000022 pushfd 0x00000023 jmp 00007F6644F246F0h 0x00000028 adc eax, 1B883FD8h 0x0000002e jmp 00007F6644F246EBh 0x00000033 popfd 0x00000034 popad 0x00000035 push eax 0x00000036 push edx 0x00000037 pushfd 0x00000038 jmp 00007F6644F246F6h 0x0000003d xor ax, 8A38h 0x00000042 jmp 00007F6644F246EBh 0x00000047 popfd 0x00000048 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57600BE second address: 57600E6 instructions: 0x00000000 rdtsc 0x00000002 mov edi, eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007F664452DAE7h 0x00000012 movzx esi, bx 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760144 second address: 5760197 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, E82Ah 0x00000007 pushfd 0x00000008 jmp 00007F6644F246EBh 0x0000000d adc eax, 468714CEh 0x00000013 jmp 00007F6644F246F9h 0x00000018 popfd 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c leave 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007F6644F246F8h 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760197 second address: 576019D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 576019D second address: 57601A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57601A3 second address: 57601A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760CD9 second address: 5760CDF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760CDF second address: 5760CE3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760CE3 second address: 5760D06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a jmp 00007F6644F246ECh 0x0000000f cmp dword ptr [75C7459Ch], 05h 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760D06 second address: 5760D0A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760D0A second address: 5760D10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760D10 second address: 5760D16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760D16 second address: 5760D1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760D1A second address: 5760D1E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760D1E second address: 5760D47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007F66B53D23BFh 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F6644F246F9h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760D47 second address: 5760D4D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760D4D second address: 5760D6D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246F3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760D6D second address: 5760D73 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760E0E second address: 5760E14 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760E14 second address: 5760E18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760E18 second address: 5760E1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760E1C second address: 5760E49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xor dword ptr [esp], 55849819h 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 jmp 00007F664452DAE8h 0x00000017 mov ebx, eax 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760E49 second address: 5760E57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6644F246EAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760E57 second address: 5760E5B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760F00 second address: 5760F18 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6644F246F4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760F18 second address: 5760F1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760F31 second address: 5760F36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760F36 second address: 5760F3B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760F3B second address: 5760F7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6644F246F7h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c test al, al 0x0000000e jmp 00007F6644F246F6h 0x00000013 je 00007F66B53C80FAh 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760F7D second address: 5760F83 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760F83 second address: 5760FB0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246F4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [ebp+08h], 00002000h 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F6644F246EAh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760FB0 second address: 5760FB4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5760FB4 second address: 5760FBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 577094C second address: 57709CE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, edx 0x00000005 movsx edx, si 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007F664452DAE2h 0x00000011 push eax 0x00000012 jmp 00007F664452DADBh 0x00000017 xchg eax, ebp 0x00000018 jmp 00007F664452DAE6h 0x0000001d mov ebp, esp 0x0000001f jmp 00007F664452DAE0h 0x00000024 xchg eax, esi 0x00000025 pushad 0x00000026 mov cl, 14h 0x00000028 jmp 00007F664452DAE3h 0x0000002d popad 0x0000002e push eax 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007F664452DAE4h 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57709CE second address: 57709D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 57709D4 second address: 5770A12 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DADDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c jmp 00007F664452DADEh 0x00000011 mov esi, dword ptr [ebp+0Ch] 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F664452DAE7h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5770A12 second address: 5770A1A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edi, si 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5770A1A second address: 5770A64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 test esi, esi 0x00000009 pushad 0x0000000a mov di, cx 0x0000000d jmp 00007F664452DAE6h 0x00000012 popad 0x00000013 je 00007F66B49CB44Fh 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c pushfd 0x0000001d jmp 00007F664452DADDh 0x00000022 jmp 00007F664452DADBh 0x00000027 popfd 0x00000028 mov bl, ch 0x0000002a popad 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5770A64 second address: 5770AC8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6644F246F2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [75C7459Ch], 05h 0x00000010 pushad 0x00000011 call 00007F6644F246EEh 0x00000016 mov bx, si 0x00000019 pop ecx 0x0000001a pushad 0x0000001b mov esi, edi 0x0000001d mov edi, 205D98ACh 0x00000022 popad 0x00000023 popad 0x00000024 je 00007F66B53DA0DFh 0x0000002a pushad 0x0000002b pushad 0x0000002c push ebx 0x0000002d pop esi 0x0000002e push ebx 0x0000002f pop esi 0x00000030 popad 0x00000031 mov edx, 1134ECBAh 0x00000036 popad 0x00000037 push ebp 0x00000038 pushad 0x00000039 popad 0x0000003a mov dword ptr [esp], esi 0x0000003d pushad 0x0000003e mov edx, ecx 0x00000040 push eax 0x00000041 push edx 0x00000042 jmp 00007F6644F246ECh 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5770ADE second address: 5770AE2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5770AE2 second address: 5770B3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushfd 0x00000007 jmp 00007F6644F246F2h 0x0000000c sub ecx, 4096C788h 0x00000012 jmp 00007F6644F246EBh 0x00000017 popfd 0x00000018 popad 0x00000019 xchg eax, esi 0x0000001a jmp 00007F6644F246F6h 0x0000001f push eax 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 call 00007F6644F246ECh 0x00000028 pop eax 0x00000029 movsx edi, si 0x0000002c popad 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5770BE2 second address: 5770BFD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F664452DAE7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5770BFD second address: 5770C02 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\gJkNLYV0ax.exe | RDTSC instruction interceptor: First address: 5770C02 second address: 5770C28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 call 00007F664452DAE5h 0x00000009 pop esi 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pop ebp 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 mov ebx, 3553F96Eh 0x00000016 rdtsc |