Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605364436.00000000013E7000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605289915.0000000005B36000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1403027357.0000000005B60000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1403027357.0000000005B60000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605289915.0000000005B36000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605364436.00000000013E7000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605289915.0000000005B36000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1875264971.0000000005B2E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605364436.00000000013E7000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605289915.0000000005B36000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1475916315.0000000001424000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1514509667.000000000142F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.micro0 |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1403027357.0000000005B60000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605364436.00000000013E7000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605289915.0000000005B36000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1403027357.0000000005B60000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1403027357.0000000005B60000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605289915.0000000005B36000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTru/p&Jr |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605364436.00000000013E7000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605289915.0000000005B36000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1403027357.0000000005B60000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1403027357.0000000005B60000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1875849808.00000000061F9000.00000002.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605121311.0000000005B5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1403027357.0000000005B60000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605364436.00000000013E7000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605289915.0000000005B36000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0A |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605364436.00000000013E7000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605289915.0000000005B36000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0C |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605289915.0000000005B36000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0X |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1875264971.0000000005B2E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605364436.00000000013E7000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605289915.0000000005B36000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/rootr30; |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1403027357.0000000005B60000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1875264971.0000000005B2E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605364436.00000000013E7000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605289915.0000000005B36000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06 |
Source: Amcache.hve.5.dr | String found in binary or memory: http://upx.sf.net |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1403027357.0000000005B60000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1403027357.0000000005B60000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1352567257.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1352637653.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1352742360.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: Yh6fS6qfTE.exe, 00000000.00000002.1875264971.0000000005B39000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://aui-cdn.atlassian.com/ |
Source: Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net |
Source: Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-exp.prod-east.frontend.public.atl-paas.net |
Source: Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net |
Source: Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net |
Source: Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/ |
Source: Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/; |
Source: Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/ |
Source: Yh6fS6qfTE.exe, 00000000.00000002.1872620005.00000000013E7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/ |
Source: Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001441000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1- |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605364436.00000000013E7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com:443/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3 |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605364436.0000000001441000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001441000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/ |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605364436.0000000001441000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001441000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/G% |
Source: Yh6fS6qfTE.exe, 00000000.00000002.1872620005.00000000013E7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe |
Source: Yh6fS6qfTE.exe, 00000000.00000002.1869447514.0000000000D5B000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe.0.0 |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1428212702.0000000005B3D000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1427021454.0000000005B3D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700 |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1428212702.0000000005B3D000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1427021454.0000000005B3D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&cta |
Source: Yh6fS6qfTE.exe, 00000000.00000002.1875264971.0000000005B39000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.cookielaw.org/ |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1352567257.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1352637653.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1352742360.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1352567257.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1352637653.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1352742360.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1352567257.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1352637653.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1352742360.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1428212702.0000000005B3D000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1427021454.0000000005B3D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1428212702.0000000005B3D000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1427021454.0000000005B3D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1352567257.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1352637653.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1352742360.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1352567257.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1352637653.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1352742360.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1352567257.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1352637653.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1352742360.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605364436.00000000013E7000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605289915.0000000005B36000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1875264971.0000000005B39000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dz8aopenkvv6s.cloudfront.net |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1427021454.0000000005B3D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi |
Source: Yh6fS6qfTE.exe, 00000000.00000002.1872268064.00000000013BA000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1514826680.00000000013BD000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1514826680.00000000013C3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/ |
Source: Yh6fS6qfTE.exe, Yh6fS6qfTE.exe, 00000000.00000003.1514826680.00000000013DA000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1431442535.0000000005AB1000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1514826680.00000000013E7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/api |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1514826680.00000000013E7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apic |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1514826680.00000000013E7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat:443/api |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605364436.00000000013E7000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605289915.0000000005B36000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1875264971.0000000005B39000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.prod-east.frontend.public.atl-paas.net |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605364436.00000000013E7000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605289915.0000000005B36000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1875264971.0000000005B39000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1404218755.0000000005BD2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1404218755.0000000005BD2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605364436.00000000013E7000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605289915.0000000005B36000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1875264971.0000000005B39000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1428212702.0000000005B3D000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1427021454.0000000005B3D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15e498ec2b39921665a1fbc954bff40a8106629178eadc64 |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1352567257.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1352637653.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1352742360.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1605159088.0000000005B19000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605364436.00000000013E7000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1605289915.0000000005B36000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1872620005.0000000001425000.00000004.00000020.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000002.1875264971.0000000005B2E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1352567257.0000000005AEE000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1352637653.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1352742360.0000000005AEB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1428212702.0000000005B3D000.00000004.00000800.00020000.00000000.sdmp, Yh6fS6qfTE.exe, 00000000.00000003.1427021454.0000000005B3D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.marriott.com/default.mi?utm_source=admarketplace&utm_medium=cpc&utm_campaign=Marriott_Pr |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1404218755.0000000005BD2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.d-GHL1OW1fkT |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1404218755.0000000005BD2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.sYEKgG4Or0s6 |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1404218755.0000000005BD2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1404218755.0000000005BD2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: Yh6fS6qfTE.exe, 00000000.00000003.1404218755.0000000005BD2000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10F77DA second address: 10F77E0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10F77E0 second address: 10F77FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jng 00007FD09CB0C7E6h 0x0000000e jmp 00007FD09CB0C7EDh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10F66B0 second address: 10F66B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10F6820 second address: 10F6824 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10F6824 second address: 10F6828 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10F69D8 second address: 10F69F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FD09CB0C7F7h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10F69F8 second address: 10F69FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10F69FC second address: 10F6A00 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10F6A00 second address: 10F6A0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10F6A0C second address: 10F6A19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jo 00007FD09CB0C7E6h 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10F9F3E second address: 10F9F42 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA065 second address: 10FA09D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FD09CB0C7F8h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA09D second address: 10FA0BE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151C4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA0BE second address: 10FA0CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CB0C7EAh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA0CD second address: 10FA0FA instructions: 0x00000000 rdtsc 0x00000002 jl 00007FD09CF151B8h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e push edi 0x0000000f jc 00007FD09CF151BCh 0x00000015 jp 00007FD09CF151B6h 0x0000001b pop edi 0x0000001c mov dword ptr [esp+04h], eax 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007FD09CF151BBh 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA0FA second address: 10FA100 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA100 second address: 10FA104 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA104 second address: 10FA11A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop eax 0x00000009 lea ebx, dword ptr [ebp+12455E22h] 0x0000000f clc 0x00000010 push eax 0x00000011 push ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA11A second address: 10FA11E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA11E second address: 10FA122 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA162 second address: 10FA1E3 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FD09CF151B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jbe 00007FD09CF151C7h 0x00000010 jmp 00007FD09CF151C1h 0x00000015 popad 0x00000016 mov dword ptr [esp], eax 0x00000019 jmp 00007FD09CF151BAh 0x0000001e push 00000000h 0x00000020 mov dword ptr [ebp+122D35ECh], edx 0x00000026 push 4D6EDB1Fh 0x0000002b jmp 00007FD09CF151C2h 0x00000030 xor dword ptr [esp], 4D6EDB9Fh 0x00000037 mov edx, dword ptr [ebp+122D2CDDh] 0x0000003d push 00000003h 0x0000003f mov edx, dword ptr [ebp+122D3C24h] 0x00000045 push 00000000h 0x00000047 mov dword ptr [ebp+122D378Ch], ecx 0x0000004d add edx, dword ptr [ebp+122D2DF1h] 0x00000053 push 00000003h 0x00000055 mov si, 072Ah 0x00000059 push 49F5DD85h 0x0000005e pushad 0x0000005f push eax 0x00000060 push edx 0x00000061 push edx 0x00000062 pop edx 0x00000063 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA1E3 second address: 10FA1EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA1EC second address: 10FA1F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA1F2 second address: 10FA216 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 add dword ptr [esp], 760A227Bh 0x0000000d mov dl, FDh 0x0000000f lea ebx, dword ptr [ebp+12455E2Bh] 0x00000015 mov si, bx 0x00000018 mov dword ptr [ebp+122D37E4h], edx 0x0000001e xchg eax, ebx 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA216 second address: 10FA21A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA21A second address: 10FA22C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FD09CB0C7EAh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA2E8 second address: 10FA2FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jl 00007FD09CF151BCh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA2FD second address: 10FA301 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA301 second address: 10FA306 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA39C second address: 10FA3C7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7EEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FD09CB0C7EFh 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 push esi 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA3C7 second address: 10FA3CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10FA3CB second address: 10FA3E4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 mov eax, dword ptr [eax] 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FD09CB0C7EEh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 111AF03 second address: 111AF0D instructions: 0x00000000 rdtsc 0x00000002 ja 00007FD09CF151B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1118D51 second address: 1118D55 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11192C2 second address: 11192C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 111952D second address: 1119531 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1119531 second address: 1119543 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FD09CF151B6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push edx 0x0000000f pop edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1119543 second address: 1119547 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11199BE second address: 11199C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11199C2 second address: 11199D2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 pop eax 0x0000000a jnl 00007FD09CB0C7E6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11199D2 second address: 11199D8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11199D8 second address: 11199E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1119C29 second address: 1119C31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1119C31 second address: 1119C44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 js 00007FD09CB0C7F2h 0x0000000b ja 00007FD09CB0C7E6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1119C44 second address: 1119C48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1119DA7 second address: 1119DAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1119DAB second address: 1119DB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1119DB1 second address: 1119DBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1119DBB second address: 1119DBF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1119F5C second address: 1119F76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CB0C7F4h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1119F76 second address: 1119F83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jne 00007FD09CF151C2h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1119F83 second address: 1119F89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1119F89 second address: 1119F90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1119F90 second address: 1119F9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FD09CB0C7E6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 111A60C second address: 111A625 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 jmp 00007FD09CF151C0h 0x0000000b push eax 0x0000000c pop eax 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 111A625 second address: 111A62D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 111A91B second address: 111A91F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 111A91F second address: 111A95A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b jns 00007FD09CB0C7E6h 0x00000011 js 00007FD09CB0C7E6h 0x00000017 popad 0x00000018 jmp 00007FD09CB0C7F6h 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 js 00007FD09CB0C7EEh 0x00000026 push ecx 0x00000027 pop ecx 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 111A95A second address: 111A96B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CF151BDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 111A96B second address: 111A972 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10E3D72 second address: 10E3D76 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10E3D76 second address: 10E3DD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CB0C7F1h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c jmp 00007FD09CB0C7F5h 0x00000011 push edx 0x00000012 pop edx 0x00000013 pop ecx 0x00000014 pushad 0x00000015 jmp 00007FD09CB0C7F9h 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007FD09CB0C7EFh 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1121DB9 second address: 1121DD1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151C4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1121DD1 second address: 1121DD8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10D9AA0 second address: 10D9AA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10D9AA6 second address: 10D9AAA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1125278 second address: 112528A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FD09CF151B6h 0x0000000a popad 0x0000000b pop edi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112528A second address: 1125290 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1125290 second address: 112529A instructions: 0x00000000 rdtsc 0x00000002 jl 00007FD09CF151B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10D9A8C second address: 10D9AA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FD09CB0C7ECh 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11256F2 second address: 11256F7 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112583D second address: 1125843 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1125843 second address: 1125848 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1125848 second address: 112584D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112584D second address: 1125853 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1125853 second address: 1125875 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FD09CB0C7E6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FD09CB0C7F5h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11259B2 second address: 11259C2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a ja 00007FD09CF151B6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11259C2 second address: 11259C8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11259C8 second address: 11259D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112705F second address: 1127064 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11273F0 second address: 1127403 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1127403 second address: 1127407 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1127407 second address: 112740B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11274B7 second address: 11274C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007FD09CB0C7E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1127687 second address: 112768B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1127748 second address: 1127751 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1127BFC second address: 1127C0F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD09CF151BFh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1127C0F second address: 1127C13 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1127C13 second address: 1127C4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebx 0x0000000b push 00000000h 0x0000000d push edi 0x0000000e call 00007FD09CF151B8h 0x00000013 pop edi 0x00000014 mov dword ptr [esp+04h], edi 0x00000018 add dword ptr [esp+04h], 00000015h 0x00000020 inc edi 0x00000021 push edi 0x00000022 ret 0x00000023 pop edi 0x00000024 ret 0x00000025 jns 00007FD09CF151B6h 0x0000002b push eax 0x0000002c jo 00007FD09CF151BEh 0x00000032 push esi 0x00000033 push eax 0x00000034 push edx 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1127D96 second address: 1127D9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1127D9C second address: 1127DB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 push eax 0x00000007 pop eax 0x00000008 pop edi 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e je 00007FD09CF151B6h 0x00000014 pop edi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1127F6B second address: 1127F71 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1127F71 second address: 1127F88 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FD09CF151B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f je 00007FD09CF151B8h 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1127F88 second address: 1127F8E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1127F8E second address: 1127F92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1128132 second address: 112818B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FD09CB0C7EEh 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e push 00000000h 0x00000010 push edi 0x00000011 call 00007FD09CB0C7E8h 0x00000016 pop edi 0x00000017 mov dword ptr [esp+04h], edi 0x0000001b add dword ptr [esp+04h], 00000017h 0x00000023 inc edi 0x00000024 push edi 0x00000025 ret 0x00000026 pop edi 0x00000027 ret 0x00000028 jmp 00007FD09CB0C7F8h 0x0000002d push eax 0x0000002e push eax 0x0000002f push edx 0x00000030 push ebx 0x00000031 jo 00007FD09CB0C7E6h 0x00000037 pop ebx 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112818B second address: 1128195 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FD09CF151BCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1128620 second address: 1128643 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FD09CB0C7F5h 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push esi 0x00000012 pop esi 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1128643 second address: 1128655 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151BEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1128655 second address: 11286C5 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 pushad 0x0000000a mov ax, 6B00h 0x0000000e jc 00007FD09CB0C7ECh 0x00000014 mov edi, dword ptr [ebp+122D2D21h] 0x0000001a popad 0x0000001b push 00000000h 0x0000001d jmp 00007FD09CB0C7F6h 0x00000022 push 00000000h 0x00000024 push 00000000h 0x00000026 push edx 0x00000027 call 00007FD09CB0C7E8h 0x0000002c pop edx 0x0000002d mov dword ptr [esp+04h], edx 0x00000031 add dword ptr [esp+04h], 0000001Dh 0x00000039 inc edx 0x0000003a push edx 0x0000003b ret 0x0000003c pop edx 0x0000003d ret 0x0000003e sbb di, A1FBh 0x00000043 clc 0x00000044 xchg eax, ebx 0x00000045 pushad 0x00000046 push eax 0x00000047 push edx 0x00000048 jmp 00007FD09CB0C7ECh 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11286C5 second address: 11286E9 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007FD09CF151BCh 0x0000000c popad 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 jmp 00007FD09CF151BAh 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11286E9 second address: 11286EE instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11290C0 second address: 1129140 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 jmp 00007FD09CF151C6h 0x0000000b nop 0x0000000c sbb si, AC25h 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push ebx 0x00000016 call 00007FD09CF151B8h 0x0000001b pop ebx 0x0000001c mov dword ptr [esp+04h], ebx 0x00000020 add dword ptr [esp+04h], 0000001Dh 0x00000028 inc ebx 0x00000029 push ebx 0x0000002a ret 0x0000002b pop ebx 0x0000002c ret 0x0000002d push 00000000h 0x0000002f push 00000000h 0x00000031 push ebx 0x00000032 call 00007FD09CF151B8h 0x00000037 pop ebx 0x00000038 mov dword ptr [esp+04h], ebx 0x0000003c add dword ptr [esp+04h], 00000019h 0x00000044 inc ebx 0x00000045 push ebx 0x00000046 ret 0x00000047 pop ebx 0x00000048 ret 0x00000049 movzx edi, di 0x0000004c mov edi, dword ptr [ebp+122D2E69h] 0x00000052 xchg eax, ebx 0x00000053 push eax 0x00000054 push edx 0x00000055 push eax 0x00000056 push edx 0x00000057 ja 00007FD09CF151B6h 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1129140 second address: 112914A instructions: 0x00000000 rdtsc 0x00000002 jne 00007FD09CB0C7E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112914A second address: 1129150 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1129150 second address: 1129154 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112A2C0 second address: 112A2D5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1129A72 second address: 1129A8C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD09CB0C7F6h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112AACD second address: 112AAD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112AAD6 second address: 112AADA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112AADA second address: 112AADE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112C274 second address: 112C28A instructions: 0x00000000 rdtsc 0x00000002 jl 00007FD09CB0C7ECh 0x00000008 jo 00007FD09CB0C7E6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push ecx 0x00000012 push eax 0x00000013 push edx 0x00000014 push ecx 0x00000015 pop ecx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112BFA8 second address: 112BFC4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151C3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112D697 second address: 112D6F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 add esi, dword ptr [ebp+122D2BE5h] 0x0000000f push 00000000h 0x00000011 mov dword ptr [ebp+122D2429h], edi 0x00000017 push 00000000h 0x00000019 push 00000000h 0x0000001b push ebp 0x0000001c call 00007FD09CB0C7E8h 0x00000021 pop ebp 0x00000022 mov dword ptr [esp+04h], ebp 0x00000026 add dword ptr [esp+04h], 00000019h 0x0000002e inc ebp 0x0000002f push ebp 0x00000030 ret 0x00000031 pop ebp 0x00000032 ret 0x00000033 push eax 0x00000034 push eax 0x00000035 push edx 0x00000036 jc 00007FD09CB0C7FEh 0x0000003c jmp 00007FD09CB0C7F8h 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112F409 second address: 112F413 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FD09CF151B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112F413 second address: 112F41F instructions: 0x00000000 rdtsc 0x00000002 jo 00007FD09CB0C7EEh 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112F41F second address: 112F429 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10D7F78 second address: 10D7F83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10D7F83 second address: 10D7F89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10D7F89 second address: 10D7FA5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7F6h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10D7FA5 second address: 10D7FAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10D7FAB second address: 10D7FAF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112DEF9 second address: 112DEFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112DEFD second address: 112DF03 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1133879 second address: 11338EB instructions: 0x00000000 rdtsc 0x00000002 jng 00007FD09CF151B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov dword ptr [esp], eax 0x0000000e push 00000000h 0x00000010 push eax 0x00000011 call 00007FD09CF151B8h 0x00000016 pop eax 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b add dword ptr [esp+04h], 00000015h 0x00000023 inc eax 0x00000024 push eax 0x00000025 ret 0x00000026 pop eax 0x00000027 ret 0x00000028 sub bh, 00000032h 0x0000002b or dword ptr [ebp+122D2312h], eax 0x00000031 push 00000000h 0x00000033 push 00000000h 0x00000035 push eax 0x00000036 call 00007FD09CF151B8h 0x0000003b pop eax 0x0000003c mov dword ptr [esp+04h], eax 0x00000040 add dword ptr [esp+04h], 00000015h 0x00000048 inc eax 0x00000049 push eax 0x0000004a ret 0x0000004b pop eax 0x0000004c ret 0x0000004d push 00000000h 0x0000004f movzx ebx, cx 0x00000052 jmp 00007FD09CF151C4h 0x00000057 xchg eax, esi 0x00000058 pushad 0x00000059 push eax 0x0000005a push edx 0x0000005b pushad 0x0000005c popad 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11338EB second address: 113390B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop ecx 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FD09CB0C7F1h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1132972 second address: 11329F8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnl 00007FD09CF151B6h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov dword ptr [esp], eax 0x00000011 jmp 00007FD09CF151BFh 0x00000016 push dword ptr fs:[00000000h] 0x0000001d push 00000000h 0x0000001f push ecx 0x00000020 call 00007FD09CF151B8h 0x00000025 pop ecx 0x00000026 mov dword ptr [esp+04h], ecx 0x0000002a add dword ptr [esp+04h], 00000016h 0x00000032 inc ecx 0x00000033 push ecx 0x00000034 ret 0x00000035 pop ecx 0x00000036 ret 0x00000037 cmc 0x00000038 mov dword ptr fs:[00000000h], esp 0x0000003f jmp 00007FD09CF151C0h 0x00000044 mov eax, dword ptr [ebp+122D16A5h] 0x0000004a push FFFFFFFFh 0x0000004c call 00007FD09CF151C4h 0x00000051 sub dword ptr [ebp+122D36FAh], edi 0x00000057 pop ebx 0x00000058 nop 0x00000059 push edx 0x0000005a push eax 0x0000005b push edx 0x0000005c push eax 0x0000005d pop eax 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1134AC8 second address: 1134ACD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 113585F second address: 1135865 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1135865 second address: 113588E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push esi 0x0000000b jmp 00007FD09CB0C7F9h 0x00000010 pop esi 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1135A46 second address: 1135A70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CF151C9h 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f ja 00007FD09CF151B6h 0x00000015 pop ecx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11379B7 second address: 11379D4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7EAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jo 00007FD09CB0C7F4h 0x00000010 push eax 0x00000011 push edx 0x00000012 jno 00007FD09CB0C7E6h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1136B83 second address: 1136B96 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151BFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1136B96 second address: 1136B9C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1136B9C second address: 1136BAB instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1136BAB second address: 1136BAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1136BAF second address: 1136BB5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1136BB5 second address: 1136BBB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11389B7 second address: 1138A25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 jmp 00007FD09CF151C4h 0x0000000e push 00000000h 0x00000010 push 00000000h 0x00000012 push edx 0x00000013 call 00007FD09CF151B8h 0x00000018 pop edx 0x00000019 mov dword ptr [esp+04h], edx 0x0000001d add dword ptr [esp+04h], 00000015h 0x00000025 inc edx 0x00000026 push edx 0x00000027 ret 0x00000028 pop edx 0x00000029 ret 0x0000002a add ebx, dword ptr [ebp+122D31B7h] 0x00000030 push 00000000h 0x00000032 push 00000000h 0x00000034 push edi 0x00000035 call 00007FD09CF151B8h 0x0000003a pop edi 0x0000003b mov dword ptr [esp+04h], edi 0x0000003f add dword ptr [esp+04h], 00000015h 0x00000047 inc edi 0x00000048 push edi 0x00000049 ret 0x0000004a pop edi 0x0000004b ret 0x0000004c mov edi, dword ptr [ebp+122D2CDDh] 0x00000052 xchg eax, esi 0x00000053 push eax 0x00000054 push edx 0x00000055 push eax 0x00000056 push edx 0x00000057 push ecx 0x00000058 pop ecx 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1138A25 second address: 1138A37 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7EEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1138A37 second address: 1138A6F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FD09CF151C8h 0x00000008 jmp 00007FD09CF151BAh 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FD09CF151BBh 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1138A6F second address: 1138A73 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1138A73 second address: 1138A79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1137C2D second address: 1137C33 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1138A79 second address: 1138A7E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1137C33 second address: 1137C45 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push edx 0x00000004 pop edx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c jbe 00007FD09CB0C7E6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1137C45 second address: 1137C65 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151C3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jl 00007FD09CF151B6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1139B56 second address: 1139B5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1139B5B second address: 1139B65 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FD09CF151BCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1138BB5 second address: 1138BBA instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 113BCAD second address: 113BCB7 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FD09CF151B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 113BCB7 second address: 113BCD9 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FD09CB0C7ECh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FD09CB0C7EDh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 113BCD9 second address: 113BCDF instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 113DDB2 second address: 113DDE4 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jmp 00007FD09CB0C7F9h 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FD09CB0C7EDh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1140C2A second address: 1140C46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD09CF151C8h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1140C46 second address: 1140C86 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7F0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e mov dword ptr [ebp+12455E3Dh], edi 0x00000014 mov edi, dword ptr [ebp+122D3B0Bh] 0x0000001a push 00000000h 0x0000001c jns 00007FD09CB0C7ECh 0x00000022 push 00000000h 0x00000024 mov ebx, dword ptr [ebp+122D2CA5h] 0x0000002a xchg eax, esi 0x0000002b pushad 0x0000002c pushad 0x0000002d push eax 0x0000002e push edx 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 113BEA3 second address: 113BEA9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 113BEA9 second address: 113BEC5 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FD09CB0C7E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d je 00007FD09CB0C7F4h 0x00000013 pushad 0x00000014 jl 00007FD09CB0C7E6h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 113CF11 second address: 113CF2F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 jc 00007FD09CF151D0h 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FD09CF151BEh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 113CF2F second address: 113CF33 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 113EF1B second address: 113EF1F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 113EF1F second address: 113EFB8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jno 00007FD09CB0C7E8h 0x0000000c popad 0x0000000d nop 0x0000000e push 00000000h 0x00000010 push edx 0x00000011 call 00007FD09CB0C7E8h 0x00000016 pop edx 0x00000017 mov dword ptr [esp+04h], edx 0x0000001b add dword ptr [esp+04h], 00000019h 0x00000023 inc edx 0x00000024 push edx 0x00000025 ret 0x00000026 pop edx 0x00000027 ret 0x00000028 push dword ptr fs:[00000000h] 0x0000002f sub ebx, 3367FDF2h 0x00000035 mov dword ptr fs:[00000000h], esp 0x0000003c or dword ptr [ebp+12455EA6h], eax 0x00000042 mov eax, dword ptr [ebp+122D1145h] 0x00000048 jg 00007FD09CB0C7EBh 0x0000004e cld 0x0000004f push FFFFFFFFh 0x00000051 push 00000000h 0x00000053 push ecx 0x00000054 call 00007FD09CB0C7E8h 0x00000059 pop ecx 0x0000005a mov dword ptr [esp+04h], ecx 0x0000005e add dword ptr [esp+04h], 00000016h 0x00000066 inc ecx 0x00000067 push ecx 0x00000068 ret 0x00000069 pop ecx 0x0000006a ret 0x0000006b call 00007FD09CB0C7EEh 0x00000070 stc 0x00000071 pop edi 0x00000072 mov bh, ch 0x00000074 nop 0x00000075 jng 00007FD09CB0C7EEh 0x0000007b push edx 0x0000007c push eax 0x0000007d push edx 0x0000007e rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 113FEB5 second address: 113FEC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 pop esi 0x00000008 push eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c jnl 00007FD09CF151B6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 113FEC7 second address: 113FED1 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 113FED1 second address: 113FED5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 113FED5 second address: 113FED9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 113FED9 second address: 113FF37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 mov edi, 0A849BE1h 0x0000000d push dword ptr fs:[00000000h] 0x00000014 add dword ptr [ebp+12453B00h], esi 0x0000001a mov dword ptr fs:[00000000h], esp 0x00000021 push ebx 0x00000022 and bx, F730h 0x00000027 pop edi 0x00000028 mov eax, dword ptr [ebp+122D00DDh] 0x0000002e movsx edi, di 0x00000031 push FFFFFFFFh 0x00000033 push 00000000h 0x00000035 push ecx 0x00000036 call 00007FD09CF151B8h 0x0000003b pop ecx 0x0000003c mov dword ptr [esp+04h], ecx 0x00000040 add dword ptr [esp+04h], 00000018h 0x00000048 inc ecx 0x00000049 push ecx 0x0000004a ret 0x0000004b pop ecx 0x0000004c ret 0x0000004d mov dword ptr [ebp+122D3315h], ebx 0x00000053 push eax 0x00000054 pushad 0x00000055 push eax 0x00000056 push eax 0x00000057 push edx 0x00000058 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1141DB0 second address: 1141DB6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1146D05 second address: 1146D0B instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1146D0B second address: 1146D10 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1146D10 second address: 1146D48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jng 00007FD09CF151B6h 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 jmp 00007FD09CF151C6h 0x00000017 pushad 0x00000018 popad 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c jo 00007FD09CF151CDh 0x00000022 pushad 0x00000023 push edx 0x00000024 pop edx 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 114B4EB second address: 114B4F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 114B4F1 second address: 114B4F6 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10DEC67 second address: 10DEC6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 114AEE6 second address: 114AEEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 114AEEC second address: 114AEF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 114AEF1 second address: 114AF0C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jng 00007FD09CF151B6h 0x00000009 js 00007FD09CF151B6h 0x0000000f jmp 00007FD09CF151BAh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 114F965 second address: 114F980 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CB0C7F7h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 115100C second address: 1151016 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FD09CF151B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1151016 second address: 115101B instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 115101B second address: 1151021 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1151021 second address: 1151029 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10EE025 second address: 10EE04E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151C1h 0x00000007 jmp 00007FD09CF151C0h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pop edx 0x00000011 pop eax 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10EE04E second address: 10EE054 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10EE054 second address: 10EE058 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10EE058 second address: 10EE062 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FD09CB0C7E6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10EE062 second address: 10EE07D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jnl 00007FD09CF151BEh 0x0000000f push eax 0x00000010 push edx 0x00000011 push esi 0x00000012 pop esi 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11566D9 second address: 11566DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11566DD second address: 11566EF instructions: 0x00000000 rdtsc 0x00000002 jng 00007FD09CF151B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jbe 00007FD09CF151BCh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 115AF7C second address: 115AF82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 115B54D second address: 115B553 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 115B80F second address: 115B813 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 115B813 second address: 115B817 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 115BD78 second address: 115BD95 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FD09CB0C7E6h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jnc 00007FD09CB0C7E6h 0x00000013 jbe 00007FD09CB0C7E6h 0x00000019 push esi 0x0000001a pop esi 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 115BD95 second address: 115BDA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jne 00007FD09CF151BCh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 115BDA2 second address: 115BDC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FD09CB0C7F3h 0x0000000b push eax 0x0000000c push edx 0x0000000d jg 00007FD09CB0C7E6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 115BDC3 second address: 115BDCD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 115BDCD second address: 115BDD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 115BF27 second address: 115BF59 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jnl 00007FD09CF151BCh 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 push eax 0x00000015 pop eax 0x00000016 jmp 00007FD09CF151C5h 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 115C0BD second address: 115C0C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1161455 second address: 116145B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 116145B second address: 1161492 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FD09CB0C7E6h 0x0000000a popad 0x0000000b push esi 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e pop esi 0x0000000f jmp 00007FD09CB0C7ECh 0x00000014 popad 0x00000015 je 00007FD09CB0C82Ah 0x0000001b pushad 0x0000001c jmp 00007FD09CB0C7F2h 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1161E79 second address: 1161E7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1161E7D second address: 1161E83 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1161E83 second address: 1161E95 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD09CF151BEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1161FD6 second address: 1161FF2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7F6h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1161FF2 second address: 1161FF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 116215D second address: 1162162 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1166C02 second address: 1166C13 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 jmp 00007FD09CF151BAh 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1166C13 second address: 1166C19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1166C19 second address: 1166C25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1166C25 second address: 1166C2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1166C2B second address: 1166C30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1166D84 second address: 1166DBD instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 jnc 00007FD09CB0C7FBh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f push edi 0x00000010 push eax 0x00000011 pop eax 0x00000012 js 00007FD09CB0C7E6h 0x00000018 pop edi 0x00000019 pushad 0x0000001a pushad 0x0000001b popad 0x0000001c pushad 0x0000001d popad 0x0000001e popad 0x0000001f pushad 0x00000020 pushad 0x00000021 popad 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11672DB second address: 11672E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11672E1 second address: 11672E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1167868 second address: 116786C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11679BE second address: 11679C9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007FD09CB0C7E6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 110FBF8 second address: 110FC02 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FD09CF151B6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 110FC02 second address: 110FC08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1167E0A second address: 1167E0E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1167E0E second address: 1167E14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1166758 second address: 116675D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 116675D second address: 1166769 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1166769 second address: 116676F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 116676F second address: 1166774 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1166774 second address: 116677B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 116C9D5 second address: 116C9E1 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FD09CB0C7E6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 116C9E1 second address: 116C9F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD09CF151C1h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 116C9F6 second address: 116CA1A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7F6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b js 00007FD09CB0C7E6h 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 116B94B second address: 116B957 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 116B957 second address: 116B966 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 ja 00007FD09CB0C7ECh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112FD68 second address: 110F08C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 jmp 00007FD09CF151C8h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp], eax 0x00000010 xor dword ptr [ebp+122D244Dh], edx 0x00000016 call dword ptr [ebp+122D29B7h] 0x0000001c pushad 0x0000001d ja 00007FD09CF151C7h 0x00000023 jp 00007FD09CF151B8h 0x00000029 popad 0x0000002a push edx 0x0000002b pushad 0x0000002c pushad 0x0000002d popad 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11303D2 second address: 1130413 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FD09CB0C7E8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e jmp 00007FD09CB0C7ECh 0x00000013 mov eax, dword ptr [eax] 0x00000015 jmp 00007FD09CB0C7F5h 0x0000001a mov dword ptr [esp+04h], eax 0x0000001e jo 00007FD09CB0C7F0h 0x00000024 push eax 0x00000025 push edx 0x00000026 push edx 0x00000027 pop edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 113057B second address: 1130585 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007FD09CF151B6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 116BD84 second address: 116BD88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 116BD88 second address: 116BD97 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jc 00007FD09CF151DCh 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 116BD97 second address: 116BD9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 116BEDC second address: 116BEE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 116C1AB second address: 116C1B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 116C453 second address: 116C469 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CF151C2h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 116C469 second address: 116C46D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1171616 second address: 117162F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FD09CF151BDh 0x0000000a pushad 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d push edi 0x0000000e pop edi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10DD209 second address: 10DD20F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10DD20F second address: 10DD21E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jc 00007FD09CF151B6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 117507C second address: 1175082 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11775ED second address: 11775F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10DB595 second address: 10DB5A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push esi 0x00000007 push edi 0x00000008 pop edi 0x00000009 pushad 0x0000000a popad 0x0000000b pop esi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10DB5A1 second address: 10DB5A6 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1177185 second address: 11771AC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7ECh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FD09CB0C7F1h 0x00000010 push eax 0x00000011 push edx 0x00000012 push edi 0x00000013 pop edi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11771AC second address: 11771B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11771B0 second address: 11771C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jne 00007FD09CB0C7E6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1179EFF second address: 1179F05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1179F05 second address: 1179F2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FD09CB0C7F4h 0x0000000b push edi 0x0000000c pop edi 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f jmp 00007FD09CB0C7EBh 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 117A31F second address: 117A336 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 ja 00007FD09CF151B6h 0x0000000c popad 0x0000000d jng 00007FD09CF151BEh 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 118014B second address: 1180160 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 jl 00007FD09CB0C7E8h 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 pop eax 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1180160 second address: 1180164 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10F1692 second address: 10F16A6 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FD09CB0C7EAh 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10F16A6 second address: 10F16AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 117F4D3 second address: 117F4D9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 117F4D9 second address: 117F504 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD09CF151C8h 0x00000009 jmp 00007FD09CF151BFh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 117F504 second address: 117F50E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 117F50E second address: 117F514 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 117F677 second address: 117F67B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 117F7E8 second address: 117F820 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FD09CF151B6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FD09CF151C4h 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FD09CF151C1h 0x0000001b push ecx 0x0000001c pop ecx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 117F820 second address: 117F826 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 117F826 second address: 117F82C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 117F82C second address: 117F832 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 117F832 second address: 117F836 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 117F836 second address: 117F83A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 117FCC3 second address: 117FCCD instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FD09CF151B6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 117FCCD second address: 117FCD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 117FCD6 second address: 117FCED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jbe 00007FD09CF151B6h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jnl 00007FD09CF151B6h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 117FCED second address: 117FCF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 117FCF1 second address: 117FD02 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151BDh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1185BEF second address: 1185BF5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1185BF5 second address: 1185BF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1184A8D second address: 1184AB6 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FD09CB0C7EAh 0x00000008 push edx 0x00000009 pop edx 0x0000000a pushad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FD09CB0C7F9h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1184AB6 second address: 1184ABB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1184D7C second address: 1184D94 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7EEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1184D94 second address: 1184DAA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CF151C1h 0x00000009 pop edi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 118593D second address: 1185943 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1185943 second address: 1185949 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1185949 second address: 1185957 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CB0C7EAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1185957 second address: 1185965 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FD09CF151B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1185965 second address: 1185969 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1188CFB second address: 1188D03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1188D03 second address: 1188D21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CB0C7F8h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11886C1 second address: 11886D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CF151BDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11886D2 second address: 11886D6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11886D6 second address: 11886DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 118894B second address: 118895A instructions: 0x00000000 rdtsc 0x00000002 jg 00007FD09CB0C7E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 118895A second address: 1188964 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FD09CF151B6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 118E4FF second address: 118E509 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FD09CB0C7E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 118E509 second address: 118E54C instructions: 0x00000000 rdtsc 0x00000002 jns 00007FD09CF151BCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007FD09CF151C0h 0x00000012 jmp 00007FD09CF151BFh 0x00000017 push eax 0x00000018 pop eax 0x00000019 jmp 00007FD09CF151BEh 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 118EB7B second address: 118EB97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jmp 00007FD09CB0C7F7h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 118EEF4 second address: 118EEFB instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 118EEFB second address: 118EF06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push edx 0x0000000a pop edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 118F687 second address: 118F68D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 118F68D second address: 118F6D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 pushad 0x00000007 pushad 0x00000008 push edi 0x00000009 pop edi 0x0000000a jns 00007FD09CB0C7E6h 0x00000010 popad 0x00000011 jne 00007FD09CB0C7EEh 0x00000017 push ecx 0x00000018 pushad 0x00000019 popad 0x0000001a jmp 00007FD09CB0C7F8h 0x0000001f pop ecx 0x00000020 pushad 0x00000021 jng 00007FD09CB0C7E6h 0x00000027 pushad 0x00000028 popad 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11987A0 second address: 11987A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1198911 second address: 119894A instructions: 0x00000000 rdtsc 0x00000002 jo 00007FD09CB0C7FDh 0x00000008 pushad 0x00000009 jmp 00007FD09CB0C7F7h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 119894A second address: 1198950 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1198BF9 second address: 1198C1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FD09CB0C7F7h 0x0000000c jo 00007FD09CB0C7E6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1198C1D second address: 1198C23 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1198FCA second address: 1199011 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CB0C7F2h 0x00000009 pop ebx 0x0000000a push eax 0x0000000b jmp 00007FD09CB0C7F7h 0x00000010 pop eax 0x00000011 pop ecx 0x00000012 push eax 0x00000013 push edx 0x00000014 jo 00007FD09CB0C7E8h 0x0000001a pushad 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FD09CB0C7EAh 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1199011 second address: 1199017 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1199017 second address: 119903C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD09CB0C7ECh 0x00000009 jmp 00007FD09CB0C7F5h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 119F298 second address: 119F2A2 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FD09CF151B6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 119F2A2 second address: 119F2B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007FD09CB0C7EDh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 119F2B8 second address: 119F2CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FD09CF151BAh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 119F2CB second address: 119F2EC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7F7h 0x00000007 jne 00007FD09CB0C7E6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 119F2EC second address: 119F2F1 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 119F413 second address: 119F45B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FD09CB0C7E6h 0x0000000a pushad 0x0000000b jmp 00007FD09CB0C7ECh 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 js 00007FD09CB0C7E6h 0x00000018 jns 00007FD09CB0C7E6h 0x0000001e popad 0x0000001f jno 00007FD09CB0C7EEh 0x00000025 popad 0x00000026 pushad 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007FD09CB0C7EAh 0x0000002e jg 00007FD09CB0C7E6h 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 119F45B second address: 119F498 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FD09CF151C7h 0x00000010 jmp 00007FD09CF151C5h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 119F793 second address: 119F799 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 119F799 second address: 119F7D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CF151BFh 0x00000009 jmp 00007FD09CF151C9h 0x0000000e popad 0x0000000f jmp 00007FD09CF151BBh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 119FC0C second address: 119FC16 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FD09CB0C7E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 119FD75 second address: 119FD80 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FD09CF151B6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 119FD80 second address: 119FD95 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007FD09CB0C7F0h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11A1026 second address: 11A1031 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jg 00007FD09CF151B6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11A1031 second address: 11A1037 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11A1037 second address: 11A103F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11A103F second address: 11A1045 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11A1045 second address: 11A1050 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 119EE90 second address: 119EE94 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 119EE94 second address: 119EEAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CF151C1h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11A83AF second address: 11A83EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CB0C7EDh 0x00000009 push edi 0x0000000a pop edi 0x0000000b popad 0x0000000c pushad 0x0000000d jns 00007FD09CB0C7F2h 0x00000013 jmp 00007FD09CB0C7F0h 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11A83EA second address: 11A83EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11B41FC second address: 11B421C instructions: 0x00000000 rdtsc 0x00000002 ja 00007FD09CB0C7E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FD09CB0C7F6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11B421C second address: 11B4222 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11B4222 second address: 11B4226 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11B4226 second address: 11B422A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11B3BDD second address: 11B3BED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 ja 00007FD09CB0C811h 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11B3BED second address: 11B3C07 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151C3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11B3D43 second address: 11B3D4D instructions: 0x00000000 rdtsc 0x00000002 jc 00007FD09CB0C7E6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11B3D4D second address: 11B3D5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 pushad 0x00000008 popad 0x00000009 pop ecx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11B3D5A second address: 11B3D70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FD09CB0C7E6h 0x0000000a jnl 00007FD09CB0C7E6h 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11B3D70 second address: 11B3DA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CF151C9h 0x00000009 pushad 0x0000000a popad 0x0000000b jnc 00007FD09CF151B6h 0x00000011 popad 0x00000012 popad 0x00000013 pushad 0x00000014 pushad 0x00000015 jmp 00007FD09CF151BCh 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11B9336 second address: 11B9346 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FD09CB0C7EAh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11B9346 second address: 11B934C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11B8EAB second address: 11B8EAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11B901F second address: 11B902B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007FD09CF151B6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11B902B second address: 11B902F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11B902F second address: 11B9066 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151C7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FD09CF151C7h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11C09B4 second address: 11C09BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11C09BD second address: 11C09C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10E070B second address: 10E0711 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 10E0711 second address: 10E072C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CF151C5h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11C894B second address: 11C8951 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11C8951 second address: 11C8955 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D24B7 second address: 11D24C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 jp 00007FD09CB0C7E6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D24C5 second address: 11D24FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 jnc 00007FD09CF151B6h 0x0000000e pushad 0x0000000f popad 0x00000010 popad 0x00000011 push edx 0x00000012 jmp 00007FD09CF151C2h 0x00000017 jmp 00007FD09CF151BCh 0x0000001c pop edx 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 push esi 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D24FC second address: 11D2517 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007FD09CB0C7F6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D28F3 second address: 11D28F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D28F7 second address: 11D290B instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007FD09CB0C7E8h 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D290B second address: 11D290F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D2A7A second address: 11D2A80 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D2A80 second address: 11D2A86 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D2A86 second address: 11D2A8B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D394B second address: 11D3950 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D3950 second address: 11D3994 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CB0C7F9h 0x00000009 pop edx 0x0000000a jl 00007FD09CB0C7ECh 0x00000010 jl 00007FD09CB0C7E6h 0x00000016 pop edx 0x00000017 pop eax 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FD09CB0C7F6h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D3994 second address: 11D399E instructions: 0x00000000 rdtsc 0x00000002 js 00007FD09CF151BEh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D52CB second address: 11D52F5 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FD09CB0C7E6h 0x00000008 jmp 00007FD09CB0C7F8h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 je 00007FD09CB0C7E6h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D52F5 second address: 11D52F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D7D70 second address: 11D7D92 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FD09CB0C7F2h 0x0000000c ja 00007FD09CB0C7E6h 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D7D92 second address: 11D7D9A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push edi 0x00000007 pop edi 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D7D9A second address: 11D7DCE instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jmp 00007FD09CB0C7F8h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d jo 00007FD09CB0C800h 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FD09CB0C7EAh 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D7DCE second address: 11D7DD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11D99EE second address: 11D99FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jc 00007FD09CB0C7E6h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11E2925 second address: 11E292B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11E292B second address: 11E295E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jbe 00007FD09CB0C7F5h 0x0000000c push ebx 0x0000000d pushad 0x0000000e popad 0x0000000f jns 00007FD09CB0C7E6h 0x00000015 pop ebx 0x00000016 jnp 00007FD09CB0C7F2h 0x0000001c jnp 00007FD09CB0C7E6h 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11E295E second address: 11E2968 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11E2968 second address: 11E297A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jl 00007FD09CB0C7EEh 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11E27C3 second address: 11E27CD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11E27CD second address: 11E27D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11E27D3 second address: 11E27E4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151BDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11E27E4 second address: 11E27E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11E27E9 second address: 11E27EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11F9475 second address: 11F947C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 11F9075 second address: 11F9079 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 120D733 second address: 120D744 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CB0C7EDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 120D744 second address: 120D748 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 120D8F9 second address: 120D907 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FD09CB0C7EAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 120D907 second address: 120D923 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FD09CF151B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jns 00007FD09CF151C2h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 120DD55 second address: 120DD5B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 120DD5B second address: 120DD61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 120DD61 second address: 120DD65 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 120DD65 second address: 120DD6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 120DD6E second address: 120DD74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 120E2CE second address: 120E2EF instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FD09CF151BEh 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007FD09CF151BDh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 120E2EF second address: 120E301 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 pushad 0x0000000a ja 00007FD09CB0C7E6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1212542 second address: 1212546 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1212923 second address: 121294E instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FD09CB0C7E8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d mov edx, dword ptr [ebp+122D2E95h] 0x00000013 push 00000004h 0x00000015 pushad 0x00000016 add dl, FFFFFF84h 0x00000019 popad 0x0000001a call 00007FD09CB0C7E9h 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 121294E second address: 1212954 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1212954 second address: 1212969 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FD09CB0C7ECh 0x00000008 jnc 00007FD09CB0C7E6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push eax 0x00000012 push esi 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1212C6B second address: 1212CD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 pushad 0x00000007 jmp 00007FD09CF151C7h 0x0000000c push ebx 0x0000000d jno 00007FD09CF151B6h 0x00000013 pop ebx 0x00000014 popad 0x00000015 nop 0x00000016 push dword ptr [ebp+122D390Eh] 0x0000001c push 00000000h 0x0000001e push esi 0x0000001f call 00007FD09CF151B8h 0x00000024 pop esi 0x00000025 mov dword ptr [esp+04h], esi 0x00000029 add dword ptr [esp+04h], 00000014h 0x00000031 inc esi 0x00000032 push esi 0x00000033 ret 0x00000034 pop esi 0x00000035 ret 0x00000036 mov dword ptr [ebp+1245D49Dh], eax 0x0000003c push C7B09500h 0x00000041 push eax 0x00000042 push edx 0x00000043 jmp 00007FD09CF151C0h 0x00000048 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1215B9C second address: 1215BA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1215BA2 second address: 1215BC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jns 00007FD09CF151CDh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1215BC4 second address: 1215BEC instructions: 0x00000000 rdtsc 0x00000002 ja 00007FD09CB0C7EEh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FD09CB0C7F0h 0x00000011 push eax 0x00000012 push edx 0x00000013 push esi 0x00000014 pop esi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1215BEC second address: 1215BF2 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1217659 second address: 1217668 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push edi 0x00000006 pushad 0x00000007 popad 0x00000008 jns 00007FD09CB0C7E6h 0x0000000e pop edi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1217668 second address: 121766D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1129D2D second address: 1129D46 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jc 00007FD09CB0C7E6h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jbe 00007FD09CB0C7E6h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 1129D46 second address: 1129D55 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 112A0D5 second address: 112A0D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A0680 second address: 51A0686 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A0786 second address: 51A07BA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7EDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushfd 0x0000000c jmp 00007FD09CB0C7EEh 0x00000011 adc ecx, 635A3C18h 0x00000017 jmp 00007FD09CB0C7EBh 0x0000001c popfd 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A07BA second address: 51A07C6 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, esi 0x00000008 pushad 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A07C6 second address: 51A082A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushfd 0x00000006 jmp 00007FD09CB0C7F8h 0x0000000b jmp 00007FD09CB0C7F5h 0x00000010 popfd 0x00000011 popad 0x00000012 lea eax, dword ptr [ebp-04h] 0x00000015 jmp 00007FD09CB0C7EEh 0x0000001a nop 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e jmp 00007FD09CB0C7F9h 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A082A second address: 51A0858 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FD09CF151C1h 0x0000000f nop 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A0858 second address: 51A085E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A085E second address: 51A0873 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD09CF151C1h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A0873 second address: 51A0884 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push dword ptr [ebp+08h] 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A0884 second address: 51A0888 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A0888 second address: 51A089E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7F2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A0909 second address: 51A091D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD09CF151C0h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A091D second address: 51A0968 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b cmp dword ptr [ebp-04h], 00000000h 0x0000000f jmp 00007FD09CB0C7F6h 0x00000014 mov esi, eax 0x00000016 pushad 0x00000017 mov cl, 6Fh 0x00000019 mov esi, edx 0x0000001b popad 0x0000001c je 00007FD09CB0C81Bh 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007FD09CB0C7F0h 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A09A6 second address: 51A09AB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51900DE second address: 51900F3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop ecx 0x00000005 mov dx, 830Eh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c sub esp, 2Ch 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 push esi 0x00000013 pop edx 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51900F3 second address: 51900F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51900F9 second address: 5190130 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebx 0x0000000c jmp 00007FD09CB0C7EEh 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FD09CB0C7EEh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51901C8 second address: 51901CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51901CC second address: 51901E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7F8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51901E8 second address: 51901EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51901EE second address: 51901F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51901F2 second address: 5190205 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov edi, 00000000h 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190205 second address: 5190209 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190209 second address: 519020D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 519020D second address: 5190213 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190213 second address: 5190234 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop edi 0x00000005 mov edi, eax 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a inc ebx 0x0000000b jmp 00007FD09CF151BEh 0x00000010 test al, al 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190234 second address: 5190238 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190238 second address: 519023E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 519023E second address: 5190244 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51902CE second address: 51902FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, 4069E86Dh 0x00000008 mov eax, 70499E69h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 nop 0x00000011 jmp 00007FD09CF151C4h 0x00000016 push eax 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a mov al, 11h 0x0000001c movsx ebx, cx 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51902FD second address: 5190337 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FD09CB0C7F1h 0x00000009 add esi, 1293B7D6h 0x0000000f jmp 00007FD09CB0C7F1h 0x00000014 popfd 0x00000015 mov dx, ax 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b nop 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190337 second address: 519033B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 519033B second address: 5190341 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190367 second address: 519036D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 519036D second address: 5190463 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7EEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test eax, eax 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FD09CB0C7EEh 0x00000012 or ecx, 26998AB8h 0x00000018 jmp 00007FD09CB0C7EBh 0x0000001d popfd 0x0000001e jmp 00007FD09CB0C7F8h 0x00000023 popad 0x00000024 jg 00007FD10EA0A8B6h 0x0000002a jmp 00007FD09CB0C7F0h 0x0000002f js 00007FD09CB0C81Dh 0x00000035 jmp 00007FD09CB0C7F0h 0x0000003a cmp dword ptr [ebp-14h], edi 0x0000003d pushad 0x0000003e mov cx, 268Dh 0x00000042 mov cx, 9E89h 0x00000046 popad 0x00000047 jne 00007FD10EA0A88Ch 0x0000004d jmp 00007FD09CB0C7F4h 0x00000052 mov ebx, dword ptr [ebp+08h] 0x00000055 jmp 00007FD09CB0C7F0h 0x0000005a lea eax, dword ptr [ebp-2Ch] 0x0000005d pushad 0x0000005e mov dh, ah 0x00000060 pushfd 0x00000061 jmp 00007FD09CB0C7F3h 0x00000066 sub ax, 594Eh 0x0000006b jmp 00007FD09CB0C7F9h 0x00000070 popfd 0x00000071 popad 0x00000072 xchg eax, esi 0x00000073 push eax 0x00000074 push edx 0x00000075 push eax 0x00000076 push edx 0x00000077 push eax 0x00000078 push edx 0x00000079 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190463 second address: 5190467 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190467 second address: 519046D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 519046D second address: 51904CF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151C2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FD09CF151BBh 0x0000000f xchg eax, esi 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007FD09CF151C4h 0x00000017 xor si, 9358h 0x0000001c jmp 00007FD09CF151BBh 0x00000021 popfd 0x00000022 mov dx, si 0x00000025 popad 0x00000026 nop 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007FD09CF151C1h 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51904CF second address: 51904D5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51904D5 second address: 51904D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5180DE5 second address: 5180DEB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5180DEB second address: 5180E05 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151BEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov ax, di 0x0000000e push edi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5180E94 second address: 5180E9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov dx, 5B5Eh 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5180E9D second address: 5180EE1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151C4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 leave 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FD09CF151BDh 0x00000013 and si, 4996h 0x00000018 jmp 00007FD09CF151C1h 0x0000001d popfd 0x0000001e mov ch, 96h 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 519089A second address: 51908A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51908A9 second address: 51908C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FD09CF151C4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51908C1 second address: 51908D9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51908D9 second address: 51908DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51908DD second address: 51908E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51908E1 second address: 51908E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51908E7 second address: 5190916 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FD09CB0C7F8h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e pushad 0x0000000f movsx edx, si 0x00000012 mov bl, cl 0x00000014 popad 0x00000015 xchg eax, ebp 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190916 second address: 519091A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 519091A second address: 5190920 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190920 second address: 519093B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151BFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 519093B second address: 519093F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 519093F second address: 5190943 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190943 second address: 5190949 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190949 second address: 519094F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 519094F second address: 5190975 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7F4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b cmp dword ptr [770E459Ch], 05h 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 mov cl, 63h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190975 second address: 51909BC instructions: 0x00000000 rdtsc 0x00000002 call 00007FD09CF151C9h 0x00000007 pop esi 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dx, 9904h 0x0000000e popad 0x0000000f je 00007FD10EE0321Dh 0x00000015 jmp 00007FD09CF151C3h 0x0000001a pop ebp 0x0000001b pushad 0x0000001c mov si, C41Bh 0x00000020 push eax 0x00000021 push edx 0x00000022 movzx ecx, di 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51909EF second address: 5190A0C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190A0C second address: 5190A65 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FD09CF151C7h 0x00000008 pop eax 0x00000009 jmp 00007FD09CF151C9h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push 3993E087h 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FD09CF151C9h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190A65 second address: 5190A6B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190A6B second address: 5190AA1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop edi 0x00000005 mov cx, 4B75h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c add dword ptr [esp], 3D79BBA1h 0x00000013 pushad 0x00000014 jmp 00007FD09CF151BEh 0x00000019 mov si, 7161h 0x0000001d popad 0x0000001e call 00007FD10EE0A296h 0x00000023 push 77082B70h 0x00000028 push dword ptr fs:[00000000h] 0x0000002f mov eax, dword ptr [esp+10h] 0x00000033 mov dword ptr [esp+10h], ebp 0x00000037 lea ebp, dword ptr [esp+10h] 0x0000003b sub esp, eax 0x0000003d push ebx 0x0000003e push esi 0x0000003f push edi 0x00000040 mov eax, dword ptr [770E4538h] 0x00000045 xor dword ptr [ebp-04h], eax 0x00000048 xor eax, ebp 0x0000004a push eax 0x0000004b mov dword ptr [ebp-18h], esp 0x0000004e push dword ptr [ebp-08h] 0x00000051 mov eax, dword ptr [ebp-04h] 0x00000054 mov dword ptr [ebp-04h], FFFFFFFEh 0x0000005b mov dword ptr [ebp-08h], eax 0x0000005e lea eax, dword ptr [ebp-10h] 0x00000061 mov dword ptr fs:[00000000h], eax 0x00000067 ret 0x00000068 push eax 0x00000069 push edx 0x0000006a pushad 0x0000006b mov bx, 170Ch 0x0000006f pushad 0x00000070 popad 0x00000071 popad 0x00000072 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190AA1 second address: 5190AA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190AA7 second address: 5190AAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190AAB second address: 5190B27 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 sub esi, esi 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007FD09CB0C7F5h 0x00000011 sub si, EC96h 0x00000016 jmp 00007FD09CB0C7F1h 0x0000001b popfd 0x0000001c push esi 0x0000001d pushfd 0x0000001e jmp 00007FD09CB0C7F7h 0x00000023 or ah, FFFFFFCEh 0x00000026 jmp 00007FD09CB0C7F9h 0x0000002b popfd 0x0000002c pop ecx 0x0000002d popad 0x0000002e mov dword ptr [ebp-1Ch], esi 0x00000031 push eax 0x00000032 push edx 0x00000033 pushad 0x00000034 mov ch, 4Eh 0x00000036 movsx ebx, si 0x00000039 popad 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190B90 second address: 5190B94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190B94 second address: 5190B98 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 5190B98 second address: 5190B9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A0A4E second address: 51A0A88 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CB0C7F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushfd 0x0000000e jmp 00007FD09CB0C7EAh 0x00000013 jmp 00007FD09CB0C7F5h 0x00000018 popfd 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A0A88 second address: 51A0A9E instructions: 0x00000000 rdtsc 0x00000002 movzx esi, bx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 call 00007FD09CF151BDh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A0A9E second address: 51A0ADF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push ecx 0x00000009 pushad 0x0000000a popad 0x0000000b pop edx 0x0000000c movzx eax, bx 0x0000000f popad 0x00000010 xchg eax, ebp 0x00000011 jmp 00007FD09CB0C7F7h 0x00000016 mov ebp, esp 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FD09CB0C7F5h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A0ADF second address: 51A0B39 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushfd 0x00000006 jmp 00007FD09CF151BDh 0x0000000b add ecx, 6D64DA96h 0x00000011 jmp 00007FD09CF151C1h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a xchg eax, esi 0x0000001b pushad 0x0000001c push eax 0x0000001d push edx 0x0000001e pushfd 0x0000001f jmp 00007FD09CF151C6h 0x00000024 sub ax, 41E8h 0x00000029 jmp 00007FD09CF151BBh 0x0000002e popfd 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A0B39 second address: 51A0B8D instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FD09CB0C7F8h 0x00000008 sbb ax, D448h 0x0000000d jmp 00007FD09CB0C7EBh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 push eax 0x00000017 jmp 00007FD09CB0C7F9h 0x0000001c xchg eax, esi 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 mov bh, 47h 0x00000022 mov si, 00BBh 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A0B8D second address: 51A0BD1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esi, dword ptr [ebp+0Ch] 0x0000000c jmp 00007FD09CF151BEh 0x00000011 test esi, esi 0x00000013 jmp 00007FD09CF151C0h 0x00000018 je 00007FD10EDF29A8h 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A0BD1 second address: 51A0BD5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A0BD5 second address: 51A0BF2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD09CF151C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A0BF2 second address: 51A0C5F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, EC12h 0x00000007 pushfd 0x00000008 jmp 00007FD09CB0C7F3h 0x0000000d sbb ah, 0000000Eh 0x00000010 jmp 00007FD09CB0C7F9h 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 cmp dword ptr [770E459Ch], 05h 0x00000020 jmp 00007FD09CB0C7EEh 0x00000025 je 00007FD10EA0203Bh 0x0000002b jmp 00007FD09CB0C7F0h 0x00000030 xchg eax, esi 0x00000031 push eax 0x00000032 push edx 0x00000033 push eax 0x00000034 push edx 0x00000035 pushad 0x00000036 popad 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A0C5F second address: 51A0C63 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\Yh6fS6qfTE.exe | RDTSC instruction interceptor: First address: 51A0C63 second address: 51A0C69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |