Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6A562 second address: F6A566 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6A566 second address: F6A570 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F65CDA1C256h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6A570 second address: F6A579 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6A7FB second address: F6A801 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6A801 second address: F6A807 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6A807 second address: F6A80D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6A80D second address: F6A815 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6A815 second address: F6A81B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6A81B second address: F6A827 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 pushad 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6A827 second address: F6A833 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F65CDA1C256h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6A9C9 second address: F6A9CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6A9CD second address: F6A9D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6A9D1 second address: F6A9DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6A9DD second address: F6A9F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jmp 00007F65CDA1C25Fh 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6ACE1 second address: F6ACE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6ACE5 second address: F6AD05 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F65CDA1C25Ah 0x0000000d pop edi 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F65CDA1C25Bh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6AD05 second address: F6AD0C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6C74C second address: F6C750 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6C750 second address: F6C754 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6C754 second address: F6C75A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6C75A second address: F6C77C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jc 00007F65CD790C76h 0x00000009 jng 00007F65CD790C76h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push esi 0x00000014 push eax 0x00000015 pushad 0x00000016 popad 0x00000017 pop eax 0x00000018 pop esi 0x00000019 mov eax, dword ptr [esp+04h] 0x0000001d pushad 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6C77C second address: F6C780 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6C918 second address: F6C922 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F65CD790C7Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6C922 second address: F6C98A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 add dword ptr [esp], 712BB830h 0x0000000d mov dword ptr [ebp+122D1B13h], edx 0x00000013 push 00000003h 0x00000015 or si, 2587h 0x0000001a jns 00007F65CDA1C258h 0x00000020 push 00000000h 0x00000022 push 00000000h 0x00000024 push edx 0x00000025 call 00007F65CDA1C258h 0x0000002a pop edx 0x0000002b mov dword ptr [esp+04h], edx 0x0000002f add dword ptr [esp+04h], 0000001Ah 0x00000037 inc edx 0x00000038 push edx 0x00000039 ret 0x0000003a pop edx 0x0000003b ret 0x0000003c add ecx, dword ptr [ebp+122D397Eh] 0x00000042 push 00000003h 0x00000044 mov dword ptr [ebp+122D1BA0h], esi 0x0000004a mov esi, dword ptr [ebp+122D3936h] 0x00000050 push FBE04B6Ah 0x00000055 pushad 0x00000056 push eax 0x00000057 push edx 0x00000058 jg 00007F65CDA1C256h 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6C98A second address: F6C9FB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 popad 0x00000009 pop eax 0x0000000a popad 0x0000000b xor dword ptr [esp], 3BE04B6Ah 0x00000012 mov dl, al 0x00000014 mov ecx, dword ptr [ebp+122D377Eh] 0x0000001a lea ebx, dword ptr [ebp+124546A8h] 0x00000020 push 00000000h 0x00000022 push esi 0x00000023 call 00007F65CD790C78h 0x00000028 pop esi 0x00000029 mov dword ptr [esp+04h], esi 0x0000002d add dword ptr [esp+04h], 00000018h 0x00000035 inc esi 0x00000036 push esi 0x00000037 ret 0x00000038 pop esi 0x00000039 ret 0x0000003a mov dword ptr [ebp+122DB604h], edx 0x00000040 pushad 0x00000041 mov edi, dword ptr [ebp+122D376Eh] 0x00000047 mov ax, di 0x0000004a popad 0x0000004b xchg eax, ebx 0x0000004c jmp 00007F65CD790C7Ah 0x00000051 push eax 0x00000052 push eax 0x00000053 push edx 0x00000054 push eax 0x00000055 push edx 0x00000056 jmp 00007F65CD790C80h 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6C9FB second address: F6CA05 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F65CDA1C256h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6CA05 second address: F6CA0A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6CADA second address: F6CADE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6CADE second address: F6CB77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnc 00007F65CD790C7Ch 0x0000000c popad 0x0000000d pop eax 0x0000000e cld 0x0000000f push 00000003h 0x00000011 jc 00007F65CD790C8Bh 0x00000017 call 00007F65CD790C81h 0x0000001c xor dl, FFFFFFD1h 0x0000001f pop esi 0x00000020 push 00000000h 0x00000022 je 00007F65CD790C81h 0x00000028 jmp 00007F65CD790C7Bh 0x0000002d push 00000003h 0x0000002f movsx ecx, di 0x00000032 push E9AB03F3h 0x00000037 jns 00007F65CD790C7Ah 0x0000003d push edx 0x0000003e pushad 0x0000003f popad 0x00000040 pop edx 0x00000041 xor dword ptr [esp], 29AB03F3h 0x00000048 call 00007F65CD790C82h 0x0000004d mov ch, bh 0x0000004f pop edi 0x00000050 lea ebx, dword ptr [ebp+124546B3h] 0x00000056 jmp 00007F65CD790C88h 0x0000005b push eax 0x0000005c push ebx 0x0000005d push eax 0x0000005e push edx 0x0000005f push ecx 0x00000060 pop ecx 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F7F7B2 second address: F7F7B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F8DE61 second address: F8DE79 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jl 00007F65CD790C78h 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 jc 00007F65CD790C76h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F8BE97 second address: F8BE9C instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F8C148 second address: F8C166 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F65CD790C7Ch 0x00000009 pop ecx 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e push eax 0x0000000f pop eax 0x00000010 jns 00007F65CD790C76h 0x00000016 pop ecx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F8C295 second address: F8C2A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F65CDA1C256h 0x0000000a pop edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F8C3FD second address: F8C403 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F8C403 second address: F8C407 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F8C407 second address: F8C40B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F8C6AA second address: F8C6B0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F8C82C second address: F8C846 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F65CD790C84h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F8C846 second address: F8C84F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F8C84F second address: F8C85B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jc 00007F65CD790C76h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F8C9CB second address: F8C9D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F8C9D4 second address: F8C9D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F8CDDD second address: F8CDE3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F8CF3E second address: F8CF48 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F65CD790C76h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F82B3D second address: F82B6B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C25Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007F65CDA1C25Eh 0x00000011 popad 0x00000012 pushad 0x00000013 jnp 00007F65CDA1C256h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F4F01E second address: F4F03F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CD790C87h 0x00000009 je 00007F65CD790C76h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F4F03F second address: F4F043 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F4F043 second address: F4F06C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007F65CD790C88h 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F4F06C second address: F4F070 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F8DD07 second address: F8DD11 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007F65CD790C76h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F8DD11 second address: F8DD25 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F65CDA1C256h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e je 00007F65CDA1C256h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F8DD25 second address: F8DD29 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F901DE second address: F901F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C25Ah 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jno 00007F65CDA1C256h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F94ADF second address: F94AE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F94AE7 second address: F94AF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F65CDA1C256h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F5C8BB second address: F5C8E4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jbe 00007F65CD790C76h 0x0000000b pushad 0x0000000c popad 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F65CD790C87h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F5C8E4 second address: F5C8E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F97F57 second address: F97F5D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F97F5D second address: F97F61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9C78F second address: F9C793 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9C793 second address: F9C7A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e jl 00007F65CDA1C256h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9C7A7 second address: F9C7B1 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9C7B1 second address: F9C7B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9C7B5 second address: F9C7BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9CD62 second address: F9CD81 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F65CDA1C256h 0x00000008 jmp 00007F65CDA1C265h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9CEFF second address: F9CF0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a popad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9CF0D second address: F9CF1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 je 00007F65CDA1C256h 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9D833 second address: F9D838 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9D838 second address: F9D854 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CDA1C268h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9D8FC second address: F9D940 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 jmp 00007F65CD790C89h 0x0000000b pop ecx 0x0000000c popad 0x0000000d mov dword ptr [esp+04h], eax 0x00000011 pushad 0x00000012 jmp 00007F65CD790C86h 0x00000017 jbe 00007F65CD790C7Ch 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9D940 second address: F9D955 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 call 00007F65CDA1C259h 0x0000000b push ecx 0x0000000c pushad 0x0000000d push esi 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9D955 second address: F9D965 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ecx 0x00000006 push eax 0x00000007 pushad 0x00000008 jp 00007F65CD790C7Ch 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9D965 second address: F9D996 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007F65CDA1C266h 0x0000000c popad 0x0000000d popad 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 push eax 0x00000013 push edx 0x00000014 jng 00007F65CDA1C25Ch 0x0000001a jng 00007F65CDA1C256h 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9D996 second address: F9D99C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9D99C second address: F9D9A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9D9A0 second address: F9D9C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C7Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [eax] 0x0000000d push eax 0x0000000e push edx 0x0000000f push ebx 0x00000010 jo 00007F65CD790C76h 0x00000016 pop ebx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9D9C1 second address: F9D9EF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F65CDA1C25Ch 0x00000008 jmp 00007F65CDA1C25Fh 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov dword ptr [esp+04h], eax 0x00000014 push ecx 0x00000015 push eax 0x00000016 push edx 0x00000017 jo 00007F65CDA1C256h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9D9EF second address: F9D9F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9DB17 second address: F9DB45 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F65CDA1C267h 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d jmp 00007F65CDA1C25Ah 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9DDB7 second address: F9DDBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F9E607 second address: F9E60D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA085E second address: FA0863 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA00DC second address: FA00FE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C269h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push esi 0x0000000b pop esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA0863 second address: FA087F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F65CD790C7Dh 0x00000008 push edi 0x00000009 pop edi 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA087F second address: FA0885 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA2016 second address: FA201B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA29B1 second address: FA29B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA2738 second address: FA273C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA29B6 second address: FA29E1 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007F65CDA1C25Ah 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F65CDA1C268h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F50B81 second address: F50B87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F50B87 second address: F50BB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F65CDA1C25Ch 0x0000000d jmp 00007F65CDA1C267h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F50BB2 second address: F50BB7 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA89A5 second address: FA89A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA89A9 second address: FA89B3 instructions: 0x00000000 rdtsc 0x00000002 js 00007F65CD790C76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA89B3 second address: FA89B8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA89B8 second address: FA89C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA89C6 second address: FA89D0 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F65CDA1C256h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA89D0 second address: FA8A5E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007F65CD790C76h 0x00000009 jmp 00007F65CD790C83h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 nop 0x00000012 mov dword ptr [ebp+124670ECh], ecx 0x00000018 push 00000000h 0x0000001a push 00000000h 0x0000001c push ebx 0x0000001d call 00007F65CD790C78h 0x00000022 pop ebx 0x00000023 mov dword ptr [esp+04h], ebx 0x00000027 add dword ptr [esp+04h], 00000018h 0x0000002f inc ebx 0x00000030 push ebx 0x00000031 ret 0x00000032 pop ebx 0x00000033 ret 0x00000034 push 00000000h 0x00000036 push 00000000h 0x00000038 push eax 0x00000039 call 00007F65CD790C78h 0x0000003e pop eax 0x0000003f mov dword ptr [esp+04h], eax 0x00000043 add dword ptr [esp+04h], 00000019h 0x0000004b inc eax 0x0000004c push eax 0x0000004d ret 0x0000004e pop eax 0x0000004f ret 0x00000050 mov di, 1A72h 0x00000054 sbb ebx, 19077600h 0x0000005a xchg eax, esi 0x0000005b pushad 0x0000005c jmp 00007F65CD790C7Fh 0x00000061 jg 00007F65CD790C7Ch 0x00000067 push eax 0x00000068 push edx 0x00000069 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA8C11 second address: FA8C33 instructions: 0x00000000 rdtsc 0x00000002 je 00007F65CDA1C256h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F65CDA1C266h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FACA5F second address: FACA6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F65CD790C76h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FACA6C second address: FACAA6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C25Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jns 00007F65CDA1C25Ch 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 jmp 00007F65CDA1C267h 0x00000019 pop edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F618E0 second address: F618E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F618E7 second address: F618FF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F65CDA1C25Ah 0x00000008 push esi 0x00000009 pop esi 0x0000000a push edx 0x0000000b pop edx 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FAE036 second address: FAE03A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FAE03A second address: FAE03E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FAE03E second address: FAE0C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 jmp 00007F65CD790C86h 0x0000000c pop edi 0x0000000d popad 0x0000000e mov dword ptr [esp], eax 0x00000011 mov dword ptr [ebp+122D2381h], edi 0x00000017 jmp 00007F65CD790C88h 0x0000001c push 00000000h 0x0000001e mov bx, AD80h 0x00000022 push 00000000h 0x00000024 jmp 00007F65CD790C84h 0x00000029 xchg eax, esi 0x0000002a jmp 00007F65CD790C80h 0x0000002f push eax 0x00000030 push eax 0x00000031 push edx 0x00000032 pushad 0x00000033 jmp 00007F65CD790C80h 0x00000038 push eax 0x00000039 push edx 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FAE0C1 second address: FAE0C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FAD1CA second address: FAD1E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F65CD790C83h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FAE0C6 second address: FAE0CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FAF0A2 second address: FAF0A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FAF0A6 second address: FAF0AC instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FAF0AC second address: FAF0B6 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F65CD790C7Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FB00C4 second address: FB00E4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C261h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e jno 00007F65CDA1C256h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FB21A8 second address: FB21D6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C87h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007F65CD790C7Ch 0x00000012 push edi 0x00000013 pop edi 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FB32F2 second address: FB32FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnl 00007F65CDA1C256h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FB32FD second address: FB330A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FB330A second address: FB330F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FB6430 second address: FB6447 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C7Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ecx 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FB34DE second address: FB34F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CDA1C260h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FB8852 second address: FB8858 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FBB6C4 second address: FBB6CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F6349D second address: F634B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jmp 00007F65CD790C7Ch 0x0000000b popad 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 pop eax 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FC5EC5 second address: FC5EC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FC5EC9 second address: FC5EF8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C83h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jmp 00007F65CD790C85h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FC5EF8 second address: FC5F02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 push edi 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FC5F02 second address: FC5F0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FC55BA second address: FC55F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F65CDA1C267h 0x00000009 pop esi 0x0000000a jg 00007F65CDA1C26Fh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FB9682 second address: FB9688 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FC5A47 second address: FC5A61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F65CDA1C25Dh 0x0000000b push eax 0x0000000c pop eax 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FC5A61 second address: FC5A65 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FCB38D second address: FCB3CC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C261h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a jmp 00007F65CDA1C260h 0x0000000f pop edi 0x00000010 popad 0x00000011 mov eax, dword ptr [esp+04h] 0x00000015 jmp 00007F65CDA1C25Ch 0x0000001a mov eax, dword ptr [eax] 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f push ecx 0x00000020 pop ecx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FCB474 second address: FCB49B instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F65CD790C7Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e jmp 00007F65CD790C7Bh 0x00000013 mov eax, dword ptr [eax] 0x00000015 push eax 0x00000016 push edx 0x00000017 push ebx 0x00000018 pushad 0x00000019 popad 0x0000001a pop ebx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FCB55D second address: FCB561 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FCB561 second address: FCB5A7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C7Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push ebx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 pop ebx 0x00000013 mov eax, dword ptr [esp+04h] 0x00000017 push eax 0x00000018 push ebx 0x00000019 jc 00007F65CD790C76h 0x0000001f pop ebx 0x00000020 pop eax 0x00000021 mov eax, dword ptr [eax] 0x00000023 jg 00007F65CD790C7Eh 0x00000029 mov dword ptr [esp+04h], eax 0x0000002d pushad 0x0000002e jo 00007F65CD790C7Ch 0x00000034 push eax 0x00000035 push edx 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FCF28B second address: FCF292 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FCF7E9 second address: FCF7FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F65CD790C76h 0x0000000a jnp 00007F65CD790C76h 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FCF7FA second address: FCF808 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F65CDA1C258h 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FCFC26 second address: FCFC43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F65CD790C88h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FCFECB second address: FCFEFA instructions: 0x00000000 rdtsc 0x00000002 jne 00007F65CDA1C256h 0x00000008 jmp 00007F65CDA1C269h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop edx 0x00000010 push edi 0x00000011 push eax 0x00000012 push edx 0x00000013 jnc 00007F65CDA1C256h 0x00000019 push edi 0x0000001a pop edi 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FD0074 second address: FD007A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FD007A second address: FD008F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F65CDA1C25Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FD01C8 second address: FD01E7 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007F65CD790C80h 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b js 00007F65CD790C8Ah 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FD01E7 second address: FD01ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FD60FF second address: FD6103 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FD4D9C second address: FD4DA2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FD4DA2 second address: FD4DAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FD4DAC second address: FD4DB0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FD508F second address: FD50C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F65CD790C87h 0x00000010 jmp 00007F65CD790C87h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FD50C8 second address: FD50CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FD50CC second address: FD50D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FD522E second address: FD5238 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F65CDA1C256h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FD5238 second address: FD528C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F65CD790C89h 0x0000000e pop eax 0x0000000f js 00007F65CD790CEDh 0x00000015 pushad 0x00000016 jmp 00007F65CD790C84h 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FD57E3 second address: FD57EA instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FD5B2D second address: FD5B47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edx 0x00000007 pop edx 0x00000008 popad 0x00000009 push edi 0x0000000a pushad 0x0000000b jmp 00007F65CD790C7Dh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FD5B47 second address: FD5B4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FD4814 second address: FD481E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F65CD790C76h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FD481E second address: FD4822 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F527E5 second address: F527F9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C7Ah 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F527F9 second address: F527FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA692B second address: FA692F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA692F second address: FA6973 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F65CDA1C256h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push ebp 0x0000000f call 00007F65CDA1C258h 0x00000014 pop ebp 0x00000015 mov dword ptr [esp+04h], ebp 0x00000019 add dword ptr [esp+04h], 00000018h 0x00000021 inc ebp 0x00000022 push ebp 0x00000023 ret 0x00000024 pop ebp 0x00000025 ret 0x00000026 jo 00007F65CDA1C25Bh 0x0000002c mov edi, 48345B6Ah 0x00000031 lea eax, dword ptr [ebp+1248E685h] 0x00000037 mov dh, B5h 0x00000039 push eax 0x0000003a push eax 0x0000003b push edi 0x0000003c push eax 0x0000003d push edx 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA6973 second address: F82B3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 mov ecx, esi 0x0000000b call dword ptr [ebp+122D2C87h] 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 jng 00007F65CD790C76h 0x0000001a jmp 00007F65CD790C84h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA6B1F second address: FA6B23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA6E3C second address: FA6E40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA6F92 second address: FA6FA0 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F65CDA1C256h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA6FA0 second address: FA6FB6 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F65CD790C7Ch 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA6FB6 second address: FA6FCF instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push edx 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c pushad 0x0000000d push esi 0x0000000e je 00007F65CDA1C256h 0x00000014 pop esi 0x00000015 push eax 0x00000016 push edx 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA6FCF second address: FA6FD3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA6FD3 second address: FA6FE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [eax] 0x00000009 push eax 0x0000000a push edx 0x0000000b push esi 0x0000000c jp 00007F65CDA1C256h 0x00000012 pop esi 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA7282 second address: FA7287 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA7287 second address: FA72C1 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F65CDA1C258h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push ebx 0x00000011 jmp 00007F65CDA1C25Ch 0x00000016 pop ebx 0x00000017 mov eax, dword ptr [eax] 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c jmp 00007F65CDA1C264h 0x00000021 push esi 0x00000022 pop esi 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA72C1 second address: FA72D7 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push edx 0x00000004 pop edx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jp 00007F65CD790C78h 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA72D7 second address: FA72DC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA7CC5 second address: FA7CCB instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA7CCB second address: FA7CD5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F65CDA1C256h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA7CD5 second address: FA7D2B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C80h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c jmp 00007F65CD790C86h 0x00000011 nop 0x00000012 call 00007F65CD790C86h 0x00000017 mov dword ptr [ebp+122D1BDFh], esi 0x0000001d pop edi 0x0000001e lea eax, dword ptr [ebp+1248E6C9h] 0x00000024 nop 0x00000025 push ecx 0x00000026 pushad 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA7D2B second address: FA7D47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pop ecx 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edi 0x0000000c jmp 00007F65CDA1C25Fh 0x00000011 pop edi 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FDADE7 second address: FDADED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FDADED second address: FDADFD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C25Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FDADFD second address: FDAE28 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F65CD790C8Fh 0x00000008 jmp 00007F65CD790C89h 0x0000000d push eax 0x0000000e push edx 0x0000000f jc 00007F65CD790C76h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FDAE28 second address: FDAE2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FDB34F second address: FDB355 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FDB355 second address: FDB368 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jnl 00007F65CDA1C256h 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FDB368 second address: FDB37D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 js 00007F65CD790C76h 0x0000000d jnc 00007F65CD790C76h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FDB37D second address: FDB382 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FDB4E2 second address: FDB4E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FDE9E6 second address: FDE9EB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FE4506 second address: FE4525 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F65CD790C86h 0x00000008 jmp 00007F65CD790C80h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 pop eax 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FE327B second address: FE3293 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C264h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FE3293 second address: FE3298 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FE33DE second address: FE33E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FE2F86 second address: FE2F8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FE2F8E second address: FE2FA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F65CDA1C256h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jng 00007F65CDA1C256h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FE2FA3 second address: FE2FA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FE2FA7 second address: FE2FAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FE3D8B second address: FE3D9A instructions: 0x00000000 rdtsc 0x00000002 jl 00007F65CD790C76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FED692 second address: FED69C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F65CDA1C256h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FED69C second address: FED6A6 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F65CD790C76h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FED6A6 second address: FED6B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d jnp 00007F65CDA1C256h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FED6B9 second address: FED6EF instructions: 0x00000000 rdtsc 0x00000002 jng 00007F65CD790C76h 0x00000008 jp 00007F65CD790C76h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 jmp 00007F65CD790C86h 0x00000016 jno 00007F65CD790C76h 0x0000001c push edi 0x0000001d pop edi 0x0000001e jns 00007F65CD790C76h 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FED800 second address: FED80D instructions: 0x00000000 rdtsc 0x00000002 jne 00007F65CDA1C256h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FED949 second address: FED94D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FF1CF0 second address: FF1CF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FF1561 second address: FF1576 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C7Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a push ebx 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FF16B5 second address: FF16D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F65CDA1C264h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FF19E7 second address: FF1A0B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007F65CD790C76h 0x00000009 jmp 00007F65CD790C82h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push esi 0x00000014 push edi 0x00000015 pop edi 0x00000016 pop esi 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FF1A0B second address: FF1A10 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FF61CB second address: FF61E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F65CD790C82h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FF61E4 second address: FF61EF instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jnl 00007F65CDA1C256h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FF61EF second address: FF61FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FF657F second address: FF65A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop ecx 0x00000007 pushad 0x00000008 jmp 00007F65CDA1C25Ah 0x0000000d jc 00007F65CDA1C256h 0x00000013 jmp 00007F65CDA1C25Bh 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FF65A3 second address: FF65A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FF65A9 second address: FF65AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FFB56E second address: FFB581 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C7Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FFB87A second address: FFB89F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F65CDA1C256h 0x0000000a pushad 0x0000000b jmp 00007F65CDA1C266h 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FFB89F second address: FFB8B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 pop edx 0x00000009 popad 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jng 00007F65CD790C76h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FFBA04 second address: FFBA08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FFBA08 second address: FFBA3A instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F65CD790C76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007F65CD790C81h 0x00000010 js 00007F65CD790C76h 0x00000016 popad 0x00000017 push ebx 0x00000018 pushad 0x00000019 popad 0x0000001a pop ebx 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f ja 00007F65CD790C76h 0x00000025 pop eax 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FFBA3A second address: FFBA4F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CDA1C25Fh 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FFBA4F second address: FFBA5C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edx 0x00000008 pop edx 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FFBBB1 second address: FFBBBD instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FFBBBD second address: FFBBC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FFBBC1 second address: FFBBC7 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA76BE second address: FA7742 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F65CD790C7Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push ebp 0x00000010 call 00007F65CD790C78h 0x00000015 pop ebp 0x00000016 mov dword ptr [esp+04h], ebp 0x0000001a add dword ptr [esp+04h], 00000017h 0x00000022 inc ebp 0x00000023 push ebp 0x00000024 ret 0x00000025 pop ebp 0x00000026 ret 0x00000027 mov ebx, dword ptr [ebp+1248E6C4h] 0x0000002d mov edi, dword ptr [ebp+122D389Eh] 0x00000033 add eax, ebx 0x00000035 push 00000000h 0x00000037 push esi 0x00000038 call 00007F65CD790C78h 0x0000003d pop esi 0x0000003e mov dword ptr [esp+04h], esi 0x00000042 add dword ptr [esp+04h], 00000016h 0x0000004a inc esi 0x0000004b push esi 0x0000004c ret 0x0000004d pop esi 0x0000004e ret 0x0000004f nop 0x00000050 push edi 0x00000051 push esi 0x00000052 jmp 00007F65CD790C86h 0x00000057 pop esi 0x00000058 pop edi 0x00000059 push eax 0x0000005a push eax 0x0000005b push edx 0x0000005c jl 00007F65CD790C78h 0x00000062 push esi 0x00000063 pop esi 0x00000064 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA7742 second address: FA7748 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA7748 second address: FA77C2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push ebp 0x0000000f call 00007F65CD790C78h 0x00000014 pop ebp 0x00000015 mov dword ptr [esp+04h], ebp 0x00000019 add dword ptr [esp+04h], 0000001Bh 0x00000021 inc ebp 0x00000022 push ebp 0x00000023 ret 0x00000024 pop ebp 0x00000025 ret 0x00000026 add cx, AD4Ch 0x0000002b jno 00007F65CD790C7Ah 0x00000031 push 00000004h 0x00000033 push 00000000h 0x00000035 push edi 0x00000036 call 00007F65CD790C78h 0x0000003b pop edi 0x0000003c mov dword ptr [esp+04h], edi 0x00000040 add dword ptr [esp+04h], 0000001Dh 0x00000048 inc edi 0x00000049 push edi 0x0000004a ret 0x0000004b pop edi 0x0000004c ret 0x0000004d mov edx, eax 0x0000004f push eax 0x00000050 push eax 0x00000051 push edx 0x00000052 push eax 0x00000053 push edx 0x00000054 push eax 0x00000055 push edx 0x00000056 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA77C2 second address: FA77C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FA77C6 second address: FA77CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FFBEB2 second address: FFBECA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jnc 00007F65CDA1C256h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jo 00007F65CDA1C25Ch 0x00000012 jc 00007F65CDA1C256h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FFBECA second address: FFBED6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F65CD790C76h 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FFBED6 second address: FFBEDA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FFBEDA second address: FFBEF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F65CD790C83h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FFCB58 second address: FFCB7B instructions: 0x00000000 rdtsc 0x00000002 jng 00007F65CDA1C25Eh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jne 00007F65CDA1C25Ch 0x00000011 jnl 00007F65CDA1C256h 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: FFCB7B second address: FFCB7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 100381D second address: 1003822 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 100399D second address: 10039A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1003C57 second address: 1003C64 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F65CDA1C256h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1003C64 second address: 1003C6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1003F5D second address: 1003F63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 100481E second address: 1004839 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F65CD790C84h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1004839 second address: 100483F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 100483F second address: 1004845 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1004845 second address: 100484B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1009986 second address: 100998A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 100998A second address: 100999F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F65CDA1C25Fh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 100999F second address: 10099B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CD790C7Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 10099B2 second address: 10099B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 10089B4 second address: 10089BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F65CD790C76h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 10089BE second address: 10089C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1008CD8 second address: 1008CDE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1008CDE second address: 1008CE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1008CE8 second address: 1008CF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F65CD790C76h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1008E33 second address: 1008E37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1009308 second address: 1009320 instructions: 0x00000000 rdtsc 0x00000002 je 00007F65CD790C7Eh 0x00000008 push edi 0x00000009 pop edi 0x0000000a jg 00007F65CD790C76h 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1009320 second address: 1009324 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1009324 second address: 1009346 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C85h 0x00000007 jnp 00007F65CD790C76h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1009346 second address: 1009359 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F65CDA1C256h 0x0000000a pushad 0x0000000b popad 0x0000000c jns 00007F65CDA1C256h 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1009359 second address: 100937B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 ja 00007F65CD790C76h 0x0000000b je 00007F65CD790C76h 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 js 00007F65CD790C76h 0x0000001c jnl 00007F65CD790C76h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1009663 second address: 1009695 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jmp 00007F65CDA1C260h 0x0000000b push edx 0x0000000c pop edx 0x0000000d popad 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F65CDA1C266h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1009695 second address: 100969C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 100969C second address: 10096B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F65CDA1C25Ch 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jns 00007F65CDA1C256h 0x00000012 push edx 0x00000013 pop edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 100E4F3 second address: 100E4F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 100E4F7 second address: 100E522 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007F65CDA1C25Eh 0x00000008 jmp 00007F65CDA1C265h 0x0000000d pop ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 100E522 second address: 100E528 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 100E528 second address: 100E52C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 10106BB second address: 10106C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 10106C3 second address: 10106C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 10106C7 second address: 10106D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jc 00007F65CD790C76h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 10106D7 second address: 10106DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 10106DB second address: 10106DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F5FED3 second address: F5FED7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F5FED7 second address: F5FEE6 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F65CD790C76h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1016CC7 second address: 1016CDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F65CDA1C256h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jnp 00007F65CDA1C256h 0x00000013 push edi 0x00000014 pop edi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1016CDC second address: 1016CEE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop esi 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c ja 00007F65CD790C76h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1016CEE second address: 1016CF2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1016F8C second address: 1016F90 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1016F90 second address: 1016FB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F65CDA1C256h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007F65CDA1C260h 0x00000014 pop eax 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1017388 second address: 101738E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 101738E second address: 101739A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 101739A second address: 10173A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 10173A0 second address: 10173A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 101761B second address: 1017635 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jo 00007F65CD790C85h 0x0000000b push edx 0x0000000c pop edx 0x0000000d jmp 00007F65CD790C7Dh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1017635 second address: 1017684 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007F65CDA1C256h 0x00000009 jmp 00007F65CDA1C269h 0x0000000e jmp 00007F65CDA1C264h 0x00000013 jmp 00007F65CDA1C25Ah 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b pushad 0x0000001c push edi 0x0000001d jns 00007F65CDA1C256h 0x00000023 pop edi 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1017684 second address: 10176AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jl 00007F65CD790C7Ch 0x0000000b pushad 0x0000000c jmp 00007F65CD790C83h 0x00000011 push edi 0x00000012 pop edi 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 101874F second address: 1018757 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1018757 second address: 1018762 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push edi 0x00000008 pop edi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1018762 second address: 1018766 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 10166EA second address: 10166FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push edi 0x0000000d pop edi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 10166FA second address: 101670B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b jns 00007F65CDA1C256h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 101670B second address: 101670F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 101BA9E second address: 101BAA5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F5780A second address: F5780E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F5780E second address: F5782A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C268h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F5782A second address: F5783A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 pop eax 0x00000009 jnc 00007F65CD790C76h 0x0000000f pop edi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 102066C second address: 1020694 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F65CDA1C256h 0x0000000a push edi 0x0000000b pop edi 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F65CDA1C267h 0x00000014 push eax 0x00000015 pop eax 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1020694 second address: 102069A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 102DDF1 second address: 102DDF5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1031938 second address: 1031963 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F65CD790C7Dh 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e jmp 00007F65CD790C85h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1049001 second address: 1049006 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F592CD second address: F592D2 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F592D2 second address: F592F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F65CDA1C256h 0x0000000a pop ecx 0x0000000b jmp 00007F65CDA1C25Ch 0x00000010 pop edx 0x00000011 pop eax 0x00000012 pushad 0x00000013 push eax 0x00000014 jns 00007F65CDA1C256h 0x0000001a push edi 0x0000001b pop edi 0x0000001c pop eax 0x0000001d pushad 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: F592F9 second address: F59301 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1047D0E second address: 1047D28 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C262h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a pushad 0x0000000b popad 0x0000000c pop esi 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1047D28 second address: 1047D2D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1047E81 second address: 1047E8B instructions: 0x00000000 rdtsc 0x00000002 je 00007F65CDA1C256h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 104837D second address: 1048383 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1048383 second address: 1048387 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 104EBD6 second address: 104EBDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 104EBDA second address: 104EBDE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 109C8C4 second address: 109C8C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 109C8C8 second address: 109C8E9 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F65CDA1C256h 0x00000008 jmp 00007F65CDA1C267h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 109C4A1 second address: 109C4A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 109C4A5 second address: 109C4AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 109C4AE second address: 109C4B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 109C4B4 second address: 109C4E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push ecx 0x00000006 pushad 0x00000007 popad 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop ecx 0x0000000b jmp 00007F65CDA1C265h 0x00000010 popad 0x00000011 jc 00007F65CDA1C27Ah 0x00000017 jbe 00007F65CDA1C270h 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1160F3E second address: 1160F42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1161351 second address: 116138D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C25Fh 0x00000007 jmp 00007F65CDA1C267h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push ebx 0x0000000f jo 00007F65CDA1C256h 0x00000015 pop ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 jns 00007F65CDA1C256h 0x0000001e push edx 0x0000001f pop edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 116138D second address: 11613A4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jne 00007F65CD790C7Eh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 11613A4 second address: 11613BC instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F65CDA1C262h 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1161843 second address: 1161852 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 js 00007F65CD790C76h 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 116197A second address: 116197E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 116197E second address: 1161998 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F65CD790C7Fh 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1165D71 second address: 1165D7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F65CDA1C256h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1165E0F second address: 1165E1D instructions: 0x00000000 rdtsc 0x00000002 js 00007F65CD790C76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1165FC2 second address: 1165FD8 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F65CDA1C256h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edi 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jnc 00007F65CDA1C256h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 1165FD8 second address: 1165FDE instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 116637E second address: 1166385 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80010 second address: 6E80014 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80014 second address: 6E8001A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8001A second address: 6E8002B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CD790C7Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8002B second address: 6E8005C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebp 0x00000009 jmp 00007F65CDA1C25Ah 0x0000000e mov dword ptr [esp], ebp 0x00000011 pushad 0x00000012 popad 0x00000013 mov ebp, esp 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F65CDA1C265h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8005C second address: 6E8006C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CD790C7Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8006C second address: 6E800BC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C25Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr fs:[00000030h] 0x00000011 pushad 0x00000012 push eax 0x00000013 call 00007F65CDA1C25Bh 0x00000018 pop esi 0x00000019 pop edi 0x0000001a movzx ecx, bx 0x0000001d popad 0x0000001e sub esp, 18h 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 pushfd 0x00000025 jmp 00007F65CDA1C25Ah 0x0000002a xor cx, 8A38h 0x0000002f jmp 00007F65CDA1C25Bh 0x00000034 popfd 0x00000035 mov dx, ax 0x00000038 popad 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E800BC second address: 6E80160 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C85h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a jmp 00007F65CD790C7Eh 0x0000000f push eax 0x00000010 pushad 0x00000011 pushad 0x00000012 jmp 00007F65CD790C87h 0x00000017 mov si, DC2Fh 0x0000001b popad 0x0000001c pushfd 0x0000001d jmp 00007F65CD790C84h 0x00000022 jmp 00007F65CD790C85h 0x00000027 popfd 0x00000028 popad 0x00000029 xchg eax, ebx 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d pushfd 0x0000002e jmp 00007F65CD790C83h 0x00000033 jmp 00007F65CD790C83h 0x00000038 popfd 0x00000039 mov cx, 92DFh 0x0000003d popad 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80160 second address: 6E80197 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C265h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebx, dword ptr [eax+10h] 0x0000000c jmp 00007F65CDA1C25Eh 0x00000011 xchg eax, esi 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 movsx edx, ax 0x00000018 mov ecx, 268E5F45h 0x0000001d popad 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80197 second address: 6E801FA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ch, dl 0x00000005 jmp 00007F65CD790C7Ah 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e jmp 00007F65CD790C7Bh 0x00000013 xchg eax, esi 0x00000014 pushad 0x00000015 pushfd 0x00000016 jmp 00007F65CD790C84h 0x0000001b add cx, 9D38h 0x00000020 jmp 00007F65CD790C7Bh 0x00000025 popfd 0x00000026 mov dx, si 0x00000029 popad 0x0000002a mov esi, dword ptr [762C06ECh] 0x00000030 push eax 0x00000031 push edx 0x00000032 jmp 00007F65CD790C81h 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E801FA second address: 6E80277 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C261h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b jmp 00007F65CDA1C25Eh 0x00000010 jne 00007F65CDA1D147h 0x00000016 pushad 0x00000017 call 00007F65CDA1C25Eh 0x0000001c mov edx, eax 0x0000001e pop eax 0x0000001f jmp 00007F65CDA1C267h 0x00000024 popad 0x00000025 xchg eax, edi 0x00000026 jmp 00007F65CDA1C266h 0x0000002b push eax 0x0000002c push eax 0x0000002d push edx 0x0000002e jmp 00007F65CDA1C25Eh 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80277 second address: 6E8028D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, edi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8028D second address: 6E80291 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80291 second address: 6E802AC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C87h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E802AC second address: 6E80303 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F65CDA1C262h 0x00000009 sub eax, 0A6C02A8h 0x0000000f jmp 00007F65CDA1C25Bh 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 call dword ptr [76290B60h] 0x0000001e mov eax, 75A0E5E0h 0x00000023 ret 0x00000024 jmp 00007F65CDA1C266h 0x00000029 push 00000044h 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e push edx 0x0000002f jmp 00007F65CDA1C25Ah 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80303 second address: 6E80307 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80307 second address: 6E8030D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8030D second address: 6E80313 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80313 second address: 6E8033A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edi 0x00000009 jmp 00007F65CDA1C264h 0x0000000e xchg eax, edi 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 mov si, bx 0x00000015 push ebx 0x00000016 pop esi 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8033A second address: 6E803CC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F65CD790C80h 0x00000009 or ax, 54F8h 0x0000000e jmp 00007F65CD790C7Bh 0x00000013 popfd 0x00000014 pushfd 0x00000015 jmp 00007F65CD790C88h 0x0000001a or eax, 6722AF58h 0x00000020 jmp 00007F65CD790C7Bh 0x00000025 popfd 0x00000026 popad 0x00000027 pop edx 0x00000028 pop eax 0x00000029 push eax 0x0000002a pushad 0x0000002b pushfd 0x0000002c jmp 00007F65CD790C82h 0x00000031 sub si, B9B8h 0x00000036 jmp 00007F65CD790C7Bh 0x0000003b popfd 0x0000003c popad 0x0000003d xchg eax, edi 0x0000003e push eax 0x0000003f push edx 0x00000040 jmp 00007F65CD790C85h 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E803CC second address: 6E803F2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C261h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [eax] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F65CDA1C25Dh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E803F2 second address: 6E80402 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CD790C7Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80402 second address: 6E80416 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr fs:[00000030h] 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80416 second address: 6E8041C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8041C second address: 6E80460 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C25Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [eax+18h] 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007F65CDA1C25Bh 0x00000015 add ecx, 21A9F39Eh 0x0000001b jmp 00007F65CDA1C269h 0x00000020 popfd 0x00000021 mov edi, ecx 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E804A8 second address: 6E804C6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 call 00007F65CD790C7Eh 0x0000000a pop esi 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov esi, eax 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E804C6 second address: 6E804CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E804CA second address: 6E80587 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F65CD790C83h 0x00000008 or esi, 2145A91Eh 0x0000000e jmp 00007F65CD790C89h 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 movzx esi, di 0x00000019 popad 0x0000001a test esi, esi 0x0000001c pushad 0x0000001d pushfd 0x0000001e jmp 00007F65CD790C89h 0x00000023 jmp 00007F65CD790C7Bh 0x00000028 popfd 0x00000029 pushfd 0x0000002a jmp 00007F65CD790C88h 0x0000002f xor eax, 631DA8A8h 0x00000035 jmp 00007F65CD790C7Bh 0x0000003a popfd 0x0000003b popad 0x0000003c je 00007F663CB4FDC3h 0x00000042 jmp 00007F65CD790C86h 0x00000047 sub eax, eax 0x00000049 push eax 0x0000004a push edx 0x0000004b jmp 00007F65CD790C7Ch 0x00000050 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80587 second address: 6E805AA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C25Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi], edi 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jmp 00007F65CDA1C25Bh 0x00000013 movzx ecx, di 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E805AA second address: 6E805DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C82h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+04h], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F65CD790C87h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E805DC second address: 6E805F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CDA1C264h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E805F4 second address: 6E8060B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esi+08h], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F65CD790C7Ah 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8060B second address: 6E80611 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80611 second address: 6E80615 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80615 second address: 6E8063A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C25Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esi+0Ch], eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F65CDA1C25Dh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8063A second address: 6E80658 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bl, 4Ch 0x00000005 mov si, CEDFh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [ebx+4Ch] 0x0000000f pushad 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 mov bx, cx 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 mov esi, 407B6665h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80658 second address: 6E806D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov dword ptr [esi+10h], eax 0x00000008 jmp 00007F65CDA1C267h 0x0000000d mov eax, dword ptr [ebx+50h] 0x00000010 pushad 0x00000011 mov cx, A7CBh 0x00000015 jmp 00007F65CDA1C260h 0x0000001a popad 0x0000001b mov dword ptr [esi+14h], eax 0x0000001e jmp 00007F65CDA1C260h 0x00000023 mov eax, dword ptr [ebx+54h] 0x00000026 jmp 00007F65CDA1C260h 0x0000002b mov dword ptr [esi+18h], eax 0x0000002e push eax 0x0000002f push edx 0x00000030 jmp 00007F65CDA1C267h 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E806D2 second address: 6E8078F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F65CD790C7Fh 0x00000008 pushfd 0x00000009 jmp 00007F65CD790C88h 0x0000000e jmp 00007F65CD790C85h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 mov eax, dword ptr [ebx+58h] 0x0000001a pushad 0x0000001b mov dx, 49BEh 0x0000001f popad 0x00000020 mov dword ptr [esi+1Ch], eax 0x00000023 jmp 00007F65CD790C85h 0x00000028 mov eax, dword ptr [ebx+5Ch] 0x0000002b pushad 0x0000002c push ecx 0x0000002d pushfd 0x0000002e jmp 00007F65CD790C83h 0x00000033 add si, EBCEh 0x00000038 jmp 00007F65CD790C89h 0x0000003d popfd 0x0000003e pop eax 0x0000003f mov si, bx 0x00000042 popad 0x00000043 mov dword ptr [esi+20h], eax 0x00000046 push eax 0x00000047 push edx 0x00000048 jmp 00007F65CD790C86h 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8078F second address: 6E807F9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, edi 0x00000005 mov si, bx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [ebx+60h] 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007F65CDA1C265h 0x00000015 add ax, F816h 0x0000001a jmp 00007F65CDA1C261h 0x0000001f popfd 0x00000020 call 00007F65CDA1C260h 0x00000025 call 00007F65CDA1C262h 0x0000002a pop ecx 0x0000002b pop edi 0x0000002c popad 0x0000002d mov dword ptr [esi+24h], eax 0x00000030 push eax 0x00000031 push edx 0x00000032 push eax 0x00000033 push edx 0x00000034 pushad 0x00000035 popad 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E807F9 second address: 6E8080C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C7Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8080C second address: 6E80812 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80971 second address: 6E80992 instructions: 0x00000000 rdtsc 0x00000002 mov si, 6B27h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 call 00007F65CD790C7Ch 0x0000000d pushad 0x0000000e popad 0x0000000f pop esi 0x00000010 popad 0x00000011 mov eax, dword ptr [ebx+1Ch] 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80992 second address: 6E80996 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80996 second address: 6E8099C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8099C second address: 6E809B7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C25Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+3Ch], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov cx, di 0x00000012 mov al, bh 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E809B7 second address: 6E809FE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dl, ACh 0x00000005 jmp 00007F65CD790C80h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov eax, dword ptr [ebx+20h] 0x00000010 jmp 00007F65CD790C80h 0x00000015 mov dword ptr [esi+40h], eax 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F65CD790C87h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E809FE second address: 6E80A30 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C269h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 lea eax, dword ptr [ebx+00000080h] 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F65CDA1C25Dh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80A30 second address: 6E80A71 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, eax 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push 00000001h 0x0000000a jmp 00007F65CD790C84h 0x0000000f nop 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 jmp 00007F65CD790C7Dh 0x00000018 call 00007F65CD790C80h 0x0000001d pop esi 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80A71 second address: 6E80ABB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C260h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F65CDA1C261h 0x00000011 sub ax, 44E6h 0x00000016 jmp 00007F65CDA1C261h 0x0000001b popfd 0x0000001c movzx ecx, dx 0x0000001f popad 0x00000020 nop 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 pushad 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80ABB second address: 6E80ABF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80ABF second address: 6E80AC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80AC5 second address: 6E80AD3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CD790C7Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80AD3 second address: 6E80AD7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80B58 second address: 6E80B5C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80B5C second address: 6E80B62 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80B62 second address: 6E80B68 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80B68 second address: 6E80B6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80B6C second address: 6E80BA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test edi, edi 0x0000000a pushad 0x0000000b movzx eax, di 0x0000000e mov si, di 0x00000011 popad 0x00000012 js 00007F663CB4F7BBh 0x00000018 jmp 00007F65CD790C89h 0x0000001d mov eax, dword ptr [ebp-0Ch] 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80BA6 second address: 6E80BAC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80BAC second address: 6E80BB2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80BB2 second address: 6E80BCE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esi+04h], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F65CDA1C25Fh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80BCE second address: 6E80BF4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cl, dl 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a lea eax, dword ptr [ebx+78h] 0x0000000d jmp 00007F65CD790C7Ch 0x00000012 push 00000001h 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 mov bx, B670h 0x0000001b mov cx, dx 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80BF4 second address: 6E80C23 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F65CDA1C260h 0x00000008 jmp 00007F65CDA1C262h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 nop 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80C23 second address: 6E80C29 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80C29 second address: 6E80C3D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 movzx ecx, dx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 mov bl, 58h 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80C3D second address: 6E80C77 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edi, ax 0x00000006 mov ax, F5D5h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e jmp 00007F65CD790C80h 0x00000013 lea eax, dword ptr [ebp-08h] 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F65CD790C87h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80CD9 second address: 6E80D49 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F65CDA1C25Dh 0x00000008 adc eax, 60B05AE6h 0x0000000e jmp 00007F65CDA1C261h 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 popad 0x00000017 mov edi, eax 0x00000019 pushad 0x0000001a mov si, 4FB3h 0x0000001e movzx esi, dx 0x00000021 popad 0x00000022 test edi, edi 0x00000024 pushad 0x00000025 pushfd 0x00000026 jmp 00007F65CDA1C261h 0x0000002b and cl, FFFFFFF6h 0x0000002e jmp 00007F65CDA1C261h 0x00000033 popfd 0x00000034 movzx esi, bx 0x00000037 popad 0x00000038 js 00007F663CDDABD2h 0x0000003e push eax 0x0000003f push edx 0x00000040 push eax 0x00000041 push edx 0x00000042 pushad 0x00000043 popad 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80D49 second address: 6E80D5D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C80h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80D5D second address: 6E80E31 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C25Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [ebp-04h] 0x0000000c jmp 00007F65CDA1C266h 0x00000011 mov dword ptr [esi+08h], eax 0x00000014 jmp 00007F65CDA1C260h 0x00000019 lea eax, dword ptr [ebx+70h] 0x0000001c jmp 00007F65CDA1C260h 0x00000021 push 00000001h 0x00000023 pushad 0x00000024 pushfd 0x00000025 jmp 00007F65CDA1C25Eh 0x0000002a jmp 00007F65CDA1C265h 0x0000002f popfd 0x00000030 pushad 0x00000031 pushfd 0x00000032 jmp 00007F65CDA1C25Eh 0x00000037 sbb ch, FFFFFF98h 0x0000003a jmp 00007F65CDA1C25Bh 0x0000003f popfd 0x00000040 pushad 0x00000041 popad 0x00000042 popad 0x00000043 popad 0x00000044 nop 0x00000045 jmp 00007F65CDA1C264h 0x0000004a push eax 0x0000004b push eax 0x0000004c push edx 0x0000004d pushad 0x0000004e pushfd 0x0000004f jmp 00007F65CDA1C25Ch 0x00000054 or ax, 5728h 0x00000059 jmp 00007F65CDA1C25Bh 0x0000005e popfd 0x0000005f movzx eax, bx 0x00000062 popad 0x00000063 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80E31 second address: 6E80E3F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d pop edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80E3F second address: 6E80E9E instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F65CDA1C260h 0x00000008 or ah, FFFFFFB8h 0x0000000b jmp 00007F65CDA1C25Bh 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 mov bl, cl 0x00000015 popad 0x00000016 lea eax, dword ptr [ebp-18h] 0x00000019 jmp 00007F65CDA1C25Bh 0x0000001e nop 0x0000001f jmp 00007F65CDA1C266h 0x00000024 push eax 0x00000025 pushad 0x00000026 mov ebx, 75C6B6F4h 0x0000002b mov dx, 4E60h 0x0000002f popad 0x00000030 nop 0x00000031 push eax 0x00000032 push edx 0x00000033 push eax 0x00000034 push edx 0x00000035 push eax 0x00000036 push edx 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80E9E second address: 6E80EA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80EA2 second address: 6E80EA6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80EA6 second address: 6E80EAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80EE0 second address: 6E80F55 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F65CDA1C267h 0x00000009 and si, 034Eh 0x0000000e jmp 00007F65CDA1C269h 0x00000013 popfd 0x00000014 mov ecx, 1653BB57h 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c mov edi, eax 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 mov esi, edx 0x00000023 pushfd 0x00000024 jmp 00007F65CDA1C25Bh 0x00000029 xor si, 315Eh 0x0000002e jmp 00007F65CDA1C269h 0x00000033 popfd 0x00000034 popad 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80F55 second address: 6E80FE4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, B572h 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c test edi, edi 0x0000000e pushad 0x0000000f pushad 0x00000010 pushfd 0x00000011 jmp 00007F65CD790C7Bh 0x00000016 sub esi, 41CD4B6Eh 0x0000001c jmp 00007F65CD790C89h 0x00000021 popfd 0x00000022 jmp 00007F65CD790C80h 0x00000027 popad 0x00000028 mov ecx, 7FC1A901h 0x0000002d popad 0x0000002e js 00007F663CB4F37Dh 0x00000034 pushad 0x00000035 pushfd 0x00000036 jmp 00007F65CD790C7Ah 0x0000003b sbb cl, 00000018h 0x0000003e jmp 00007F65CD790C7Bh 0x00000043 popfd 0x00000044 mov cx, A5CFh 0x00000048 popad 0x00000049 mov eax, dword ptr [ebp-14h] 0x0000004c push eax 0x0000004d push edx 0x0000004e jmp 00007F65CD790C81h 0x00000053 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80FE4 second address: 6E80FF4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CDA1C25Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E80FF4 second address: 6E8101E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ecx, esi 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F65CD790C85h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8101E second address: 6E8108D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C261h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+0Ch], eax 0x0000000c jmp 00007F65CDA1C25Eh 0x00000011 mov edx, 762C06ECh 0x00000016 pushad 0x00000017 pushfd 0x00000018 jmp 00007F65CDA1C25Eh 0x0000001d or eax, 4BE6FB98h 0x00000023 jmp 00007F65CDA1C25Bh 0x00000028 popfd 0x00000029 mov ch, 8Dh 0x0000002b popad 0x0000002c mov eax, 00000000h 0x00000031 jmp 00007F65CDA1C260h 0x00000036 lock cmpxchg dword ptr [edx], ecx 0x0000003a push eax 0x0000003b push edx 0x0000003c pushad 0x0000003d mov ah, DFh 0x0000003f popad 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8108D second address: 6E810AA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C82h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E810AA second address: 6E810AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E810AE second address: 6E810B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E810B2 second address: 6E810B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E810B8 second address: 6E810BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E810BE second address: 6E810C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E810C2 second address: 6E810C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E810C6 second address: 6E810D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test eax, eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E810D6 second address: 6E810E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E810E5 second address: 6E81161 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C269h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007F663CDDA830h 0x0000000f jmp 00007F65CDA1C25Eh 0x00000014 mov edx, dword ptr [ebp+08h] 0x00000017 jmp 00007F65CDA1C260h 0x0000001c mov eax, dword ptr [esi] 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 mov ax, bx 0x00000024 pushfd 0x00000025 jmp 00007F65CDA1C269h 0x0000002a sub cl, 00000016h 0x0000002d jmp 00007F65CDA1C261h 0x00000032 popfd 0x00000033 popad 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E81161 second address: 6E811CE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [edx], eax 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007F65CD790C7Ch 0x00000012 adc al, 00000068h 0x00000015 jmp 00007F65CD790C7Bh 0x0000001a popfd 0x0000001b pushfd 0x0000001c jmp 00007F65CD790C88h 0x00000021 jmp 00007F65CD790C85h 0x00000026 popfd 0x00000027 popad 0x00000028 mov eax, dword ptr [esi+04h] 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 popad 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E811CE second address: 6E811D4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E811D4 second address: 6E811DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E811DA second address: 6E8121F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C25Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [edx+04h], eax 0x0000000e jmp 00007F65CDA1C260h 0x00000013 mov eax, dword ptr [esi+08h] 0x00000016 jmp 00007F65CDA1C260h 0x0000001b mov dword ptr [edx+08h], eax 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 mov dx, 6BD0h 0x00000025 mov cl, dh 0x00000027 popad 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8121F second address: 6E812FB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, 6794h 0x00000007 pushfd 0x00000008 jmp 00007F65CD790C7Dh 0x0000000d sub esi, 5BC8A856h 0x00000013 jmp 00007F65CD790C81h 0x00000018 popfd 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c mov eax, dword ptr [esi+0Ch] 0x0000001f pushad 0x00000020 mov dh, ch 0x00000022 pushfd 0x00000023 jmp 00007F65CD790C89h 0x00000028 sub ax, 4C66h 0x0000002d jmp 00007F65CD790C81h 0x00000032 popfd 0x00000033 popad 0x00000034 mov dword ptr [edx+0Ch], eax 0x00000037 jmp 00007F65CD790C7Eh 0x0000003c mov eax, dword ptr [esi+10h] 0x0000003f jmp 00007F65CD790C80h 0x00000044 mov dword ptr [edx+10h], eax 0x00000047 jmp 00007F65CD790C80h 0x0000004c mov eax, dword ptr [esi+14h] 0x0000004f jmp 00007F65CD790C80h 0x00000054 mov dword ptr [edx+14h], eax 0x00000057 push eax 0x00000058 push edx 0x00000059 pushad 0x0000005a pushfd 0x0000005b jmp 00007F65CD790C7Dh 0x00000060 xor al, FFFFFF86h 0x00000063 jmp 00007F65CD790C81h 0x00000068 popfd 0x00000069 popad 0x0000006a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E812FB second address: 6E8131E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C25Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esi+18h] 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F65CDA1C25Dh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8131E second address: 6E8132E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CD790C7Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8132E second address: 6E81332 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E81332 second address: 6E8136E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [edx+18h], eax 0x0000000b jmp 00007F65CD790C87h 0x00000010 mov eax, dword ptr [esi+1Ch] 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F65CD790C85h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8136E second address: 6E8137E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CDA1C25Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8137E second address: 6E81398 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [edx+1Ch], eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E81398 second address: 6E813B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C267h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E813B3 second address: 6E813F0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov bl, 6Fh 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esi+20h] 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 call 00007F65CD790C89h 0x00000015 pop eax 0x00000016 call 00007F65CD790C81h 0x0000001b pop esi 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E813F0 second address: 6E81487 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C25Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [edx+20h], eax 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F65CDA1C25Eh 0x00000013 and eax, 2E2673C8h 0x00000019 jmp 00007F65CDA1C25Bh 0x0000001e popfd 0x0000001f pushfd 0x00000020 jmp 00007F65CDA1C268h 0x00000025 sbb ax, 7628h 0x0000002a jmp 00007F65CDA1C25Bh 0x0000002f popfd 0x00000030 popad 0x00000031 mov eax, dword ptr [esi+24h] 0x00000034 jmp 00007F65CDA1C266h 0x00000039 mov dword ptr [edx+24h], eax 0x0000003c push eax 0x0000003d push edx 0x0000003e jmp 00007F65CDA1C267h 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E81487 second address: 6E8149F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CD790C84h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8149F second address: 6E814B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esi+28h] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F65CDA1C25Ah 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E814B6 second address: 6E814DF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [edx+28h], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F65CD790C85h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E814DF second address: 6E81538 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C261h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ecx, dword ptr [esi+2Ch] 0x0000000c jmp 00007F65CDA1C25Eh 0x00000011 mov dword ptr [edx+2Ch], ecx 0x00000014 jmp 00007F65CDA1C260h 0x00000019 mov ax, word ptr [esi+30h] 0x0000001d jmp 00007F65CDA1C260h 0x00000022 mov word ptr [edx+30h], ax 0x00000026 push eax 0x00000027 push edx 0x00000028 pushad 0x00000029 mov bl, E8h 0x0000002b mov ebx, eax 0x0000002d popad 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E81538 second address: 6E8158F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop ecx 0x00000005 mov ah, bl 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov ax, word ptr [esi+32h] 0x0000000e jmp 00007F65CD790C84h 0x00000013 mov word ptr [edx+32h], ax 0x00000017 jmp 00007F65CD790C80h 0x0000001c mov eax, dword ptr [esi+34h] 0x0000001f pushad 0x00000020 mov di, cx 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007F65CD790C88h 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8158F second address: 6E815AF instructions: 0x00000000 rdtsc 0x00000002 mov bx, si 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 mov dword ptr [edx+34h], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F65CDA1C263h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E815AF second address: 6E8165C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test ecx, 00000700h 0x0000000f jmp 00007F65CD790C7Eh 0x00000014 jne 00007F663CB4EDADh 0x0000001a pushad 0x0000001b mov dx, ax 0x0000001e call 00007F65CD790C7Ah 0x00000023 pushfd 0x00000024 jmp 00007F65CD790C82h 0x00000029 adc eax, 233932A8h 0x0000002f jmp 00007F65CD790C7Bh 0x00000034 popfd 0x00000035 pop esi 0x00000036 popad 0x00000037 or dword ptr [edx+38h], FFFFFFFFh 0x0000003b pushad 0x0000003c pushfd 0x0000003d jmp 00007F65CD790C80h 0x00000042 adc eax, 6E232508h 0x00000048 jmp 00007F65CD790C7Bh 0x0000004d popfd 0x0000004e popad 0x0000004f or dword ptr [edx+3Ch], FFFFFFFFh 0x00000053 push eax 0x00000054 push edx 0x00000055 push eax 0x00000056 push edx 0x00000057 jmp 00007F65CD790C80h 0x0000005c rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8165C second address: 6E8166B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C25Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8166B second address: 6E81680 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, dx 0x00000006 mov ecx, ebx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b or dword ptr [edx+40h], FFFFFFFFh 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E81680 second address: 6E81696 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C262h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E81696 second address: 6E8169C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E8169C second address: 6E816A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E816A0 second address: 6E816E1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop esi 0x00000009 pushad 0x0000000a mov bx, BF1Ah 0x0000000e pushfd 0x0000000f jmp 00007F65CD790C7Bh 0x00000014 sub cl, FFFFFFBEh 0x00000017 jmp 00007F65CD790C89h 0x0000001c popfd 0x0000001d popad 0x0000001e pop ebx 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 pushad 0x00000023 popad 0x00000024 push ebx 0x00000025 pop ecx 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6EC0C87 second address: 6EC0C99 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CDA1C25Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6EC0C99 second address: 6EC0CCA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 jmp 00007F65CD790C7Ch 0x0000000e mov dword ptr [esp], ebp 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F65CD790C87h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6EC0CCA second address: 6EC0CD0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6EC0CD0 second address: 6EC0CD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6EC0CD4 second address: 6EC0CFA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C25Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jmp 00007F65CDA1C25Bh 0x00000015 mov cx, 287Fh 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6EC0CFA second address: 6EC0D00 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E1003C second address: 6E10042 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E10042 second address: 6E10066 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C88h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E10066 second address: 6E1006A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E1006A second address: 6E10087 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E10087 second address: 6E100A3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C261h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov ecx, ebx 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E100A3 second address: 6E100A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E10710 second address: 6E10720 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CDA1C25Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E10720 second address: 6E1076B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d mov eax, 55C6D24Bh 0x00000012 pushfd 0x00000013 jmp 00007F65CD790C80h 0x00000018 add ax, 5758h 0x0000001d jmp 00007F65CD790C7Bh 0x00000022 popfd 0x00000023 popad 0x00000024 push eax 0x00000025 pushad 0x00000026 movsx ebx, cx 0x00000029 mov bx, ax 0x0000002c popad 0x0000002d xchg eax, ebp 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 push edx 0x00000032 pushad 0x00000033 popad 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E1076B second address: 6E1077A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C25Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E1077A second address: 6E10792 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CD790C84h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E10792 second address: 6E10796 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E10796 second address: 6E107BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F65CD790C89h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E107BD second address: 6E107C3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E107C3 second address: 6E107DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CD790C83h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E107DA second address: 6E107EC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov al, AAh 0x0000000e movsx ebx, ax 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E10BB6 second address: 6E10BDB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F65CD790C80h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E10BDB second address: 6E10BE1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E10BE1 second address: 6E10BE7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E10BE7 second address: 6E10BEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E10BEB second address: 6E10BEF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E60AB6 second address: 6E60ABA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E60ABA second address: 6E60AC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E60AC0 second address: 6E60AD1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CDA1C25Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E40015 second address: 6E4003C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b mov esi, 640B2863h 0x00000010 mov si, E7BFh 0x00000014 popad 0x00000015 push eax 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 push edi 0x0000001a pop esi 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E4003C second address: 6E40089 instructions: 0x00000000 rdtsc 0x00000002 mov edx, 2E9FCD90h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F65CDA1C269h 0x0000000e popad 0x0000000f xchg eax, ebp 0x00000010 jmp 00007F65CDA1C25Eh 0x00000015 mov ebp, esp 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007F65CDA1C267h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E40089 second address: 6E4008F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E4008F second address: 6E40093 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E40093 second address: 6E40097 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E40097 second address: 6E400AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 and esp, FFFFFFF0h 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F65CDA1C25Ah 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E400AE second address: 6E400CE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CD790C7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub esp, 44h 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov edx, 051B6586h 0x00000014 mov edi, 39B85412h 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E400CE second address: 6E40163 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F65CDA1C266h 0x00000008 pushfd 0x00000009 jmp 00007F65CDA1C262h 0x0000000e sub ecx, 306D6B58h 0x00000014 jmp 00007F65CDA1C25Bh 0x00000019 popfd 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d xchg eax, ebx 0x0000001e pushad 0x0000001f mov cx, 362Bh 0x00000023 pushfd 0x00000024 jmp 00007F65CDA1C260h 0x00000029 sbb ecx, 698175B8h 0x0000002f jmp 00007F65CDA1C25Bh 0x00000034 popfd 0x00000035 popad 0x00000036 push eax 0x00000037 jmp 00007F65CDA1C269h 0x0000003c xchg eax, ebx 0x0000003d push eax 0x0000003e push edx 0x0000003f jmp 00007F65CDA1C25Dh 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E40163 second address: 6E40173 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F65CD790C7Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E40173 second address: 6E40199 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C25Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F65CDA1C260h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E40199 second address: 6E4019F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E4019F second address: 6E401B2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bl, ah 0x00000005 mov cx, bx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f movsx edi, ax 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E401B2 second address: 6E401B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E401B8 second address: 6E401BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E401BC second address: 6E401CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E401CB second address: 6E401CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E401CF second address: 6E401D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E401D5 second address: 6E4027F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 761734FEh 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push esi 0x0000000c jmp 00007F65CDA1C262h 0x00000011 mov dword ptr [esp], edi 0x00000014 pushad 0x00000015 pushfd 0x00000016 jmp 00007F65CDA1C25Eh 0x0000001b or eax, 58F423F8h 0x00000021 jmp 00007F65CDA1C25Bh 0x00000026 popfd 0x00000027 pushfd 0x00000028 jmp 00007F65CDA1C268h 0x0000002d sub esi, 6890FE58h 0x00000033 jmp 00007F65CDA1C25Bh 0x00000038 popfd 0x00000039 popad 0x0000003a mov edi, dword ptr [ebp+08h] 0x0000003d pushad 0x0000003e mov al, F5h 0x00000040 jmp 00007F65CDA1C261h 0x00000045 popad 0x00000046 mov dword ptr [esp+24h], 00000000h 0x0000004e jmp 00007F65CDA1C25Eh 0x00000053 lock bts dword ptr [edi], 00000000h 0x00000058 push eax 0x00000059 push edx 0x0000005a pushad 0x0000005b movsx edx, ax 0x0000005e push eax 0x0000005f push edx 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E4027F second address: 6E40284 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E40284 second address: 6E402F8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F65CDA1C265h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jc 00007F663DF2E3ECh 0x0000000f pushad 0x00000010 mov ecx, 4C3E6663h 0x00000015 jmp 00007F65CDA1C268h 0x0000001a popad 0x0000001b pop edi 0x0000001c jmp 00007F65CDA1C260h 0x00000021 pop esi 0x00000022 jmp 00007F65CDA1C260h 0x00000027 pop ebx 0x00000028 push eax 0x00000029 push edx 0x0000002a pushad 0x0000002b jmp 00007F65CDA1C25Dh 0x00000030 push ecx 0x00000031 pop edx 0x00000032 popad 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E402F8 second address: 6E402FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E402FE second address: 6E4034D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esp, ebp 0x0000000a pushad 0x0000000b mov dh, 44h 0x0000000d call 00007F65CDA1C25Ah 0x00000012 pushfd 0x00000013 jmp 00007F65CDA1C262h 0x00000018 jmp 00007F65CDA1C265h 0x0000001d popfd 0x0000001e pop esi 0x0000001f popad 0x00000020 pop ebp 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007F65CDA1C25Ah 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E708A5 second address: 6E708AB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E708AB second address: 6E708B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E708B1 second address: 6E708B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E708B5 second address: 6E708B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E708B9 second address: 6E70901 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a mov edi, 686A2728h 0x0000000f push eax 0x00000010 push edx 0x00000011 pushfd 0x00000012 jmp 00007F65CD790C87h 0x00000017 xor si, F06Eh 0x0000001c jmp 00007F65CD790C89h 0x00000021 popfd 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\p3a0oZ4U7X.exe | RDTSC instruction interceptor: First address: 6E70901 second address: 6E70958 instructions: 0x00000000 rdtsc 0x00000002 mov ax, 8DF7h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F65CDA1C268h 0x00000011 sub ch, 00000018h 0x00000014 jmp 00007F65CDA1C25Bh 0x00000019 popfd 0x0000001a pushad 0x0000001b call 00007F65CDA1C266h 0x00000020 pop esi 0x00000021 mov dh, F8h 0x00000023 popad 0x00000024 popad 0x00000025 mov ebp, esp 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc |