Source: zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: zLP3oiwG1g.exe, 00000000.00000003.1419189430.00000000051D8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: zLP3oiwG1g.exe, 00000000.00000003.1419189430.00000000051D8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051A5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U |
Source: zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051A5000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: zLP3oiwG1g.exe, 00000000.00000003.1543300122.0000000000356000.00000004.00000020.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1446181758.0000000000342000.00000004.00000020.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1484141788.0000000000353000.00000004.00000020.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1467082412.0000000000342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.micro |
Source: zLP3oiwG1g.exe, 00000000.00000003.1419189430.00000000051D8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: zLP3oiwG1g.exe, 00000000.00000003.1419189430.00000000051D8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: zLP3oiwG1g.exe, 00000000.00000003.1419189430.00000000051D8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: zLP3oiwG1g.exe, 00000000.00000003.1419189430.00000000051D8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: zLP3oiwG1g.exe, 00000000.00000003.1419189430.00000000051D8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: zLP3oiwG1g.exe, 00000000.00000003.1618402977.00000000051BD000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000002.1893736231.0000000005929000.00000002.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: zLP3oiwG1g.exe, 00000000.00000003.1419189430.00000000051D8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0A |
Source: zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0C |
Source: zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0X |
Source: zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051A5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F |
Source: zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051A5000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/rootr30; |
Source: zLP3oiwG1g.exe, 00000000.00000003.1419189430.00000000051D8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051A5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A |
Source: zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051A5000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06 |
Source: Amcache.hve.5.dr | String found in binary or memory: http://upx.sf.net |
Source: zLP3oiwG1g.exe, 00000000.00000003.1419189430.00000000051D8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: zLP3oiwG1g.exe, 00000000.00000003.1419189430.00000000051D8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: zLP3oiwG1g.exe, 00000000.00000003.1366230963.0000000005169000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1365911755.000000000516C000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1366695801.0000000005169000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: zLP3oiwG1g.exe, 00000000.00000003.1618442191.00000000051AE000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051AE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aui-cdn.atlassian.com/ |
Source: zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051AE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net |
Source: zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051AE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-exp.prod-east.frontend.public.atl-paas.net |
Source: zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051AE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net |
Source: zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051AE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net |
Source: zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051AE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/ |
Source: zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051AE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/; |
Source: zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051AE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/ |
Source: zLP3oiwG1g.exe | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/ |
Source: zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000377000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1- |
Source: zLP3oiwG1g.exe, 00000000.00000003.1618522019.0000000000377000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/p |
Source: zLP3oiwG1g.exe, 00000000.00000002.1887811563.00000000002F4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com:443$$ |
Source: zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com:443/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3 |
Source: zLP3oiwG1g.exe, zLP3oiwG1g.exe, 00000000.00000003.1543259911.000000000037A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/ |
Source: zLP3oiwG1g.exe, 00000000.00000003.1543259911.000000000037A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/D |
Source: zLP3oiwG1g.exe, 00000000.00000003.1618522019.0000000000377000.00000004.00000020.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1543259911.000000000037A000.00000004.00000020.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000377000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/Q= |
Source: zLP3oiwG1g.exe, 00000000.00000002.1887811563.000000000030B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe |
Source: zLP3oiwG1g.exe, 00000000.00000002.1887616838.00000000001BA000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe.0.0 |
Source: zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exeT2 |
Source: zLP3oiwG1g.exe, 00000000.00000002.1887811563.000000000030B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exex |
Source: zLP3oiwG1g.exe, 00000000.00000002.1887811563.00000000002F4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org:443/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe |
Source: zLP3oiwG1g.exe, 00000000.00000003.1420495784.000000000520B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700 |
Source: zLP3oiwG1g.exe, 00000000.00000003.1420495784.000000000520B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&cta |
Source: zLP3oiwG1g.exe, 00000000.00000003.1618442191.00000000051AE000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051AE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.cookielaw.org/ |
Source: zLP3oiwG1g.exe, 00000000.00000003.1366230963.0000000005169000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1365911755.000000000516C000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1366695801.0000000005169000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: zLP3oiwG1g.exe, 00000000.00000003.1366230963.0000000005169000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1365911755.000000000516C000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1366695801.0000000005169000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: zLP3oiwG1g.exe, 00000000.00000003.1366230963.0000000005169000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1365911755.000000000516C000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1366695801.0000000005169000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: zLP3oiwG1g.exe, 00000000.00000003.1420495784.000000000520B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg |
Source: zLP3oiwG1g.exe, 00000000.00000003.1420495784.000000000520B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: zLP3oiwG1g.exe, 00000000.00000003.1366230963.0000000005169000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1365911755.000000000516C000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1366695801.0000000005169000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: zLP3oiwG1g.exe, 00000000.00000003.1366230963.0000000005169000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1365911755.000000000516C000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1366695801.0000000005169000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: zLP3oiwG1g.exe, 00000000.00000003.1366230963.0000000005169000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1365911755.000000000516C000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1366695801.0000000005169000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: zLP3oiwG1g.exe, 00000000.00000003.1618442191.00000000051AE000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051AE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://dz8aopenkvv6s.cloudfront.net |
Source: zLP3oiwG1g.exe, 00000000.00000003.1420495784.000000000520B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi |
Source: zLP3oiwG1g.exe, 00000000.00000003.1543259911.000000000037A000.00000004.00000020.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1445178694.00000000051BF000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1445027007.00000000051BF000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1442892518.00000000051BF000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1442445932.00000000051BF000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1445987512.00000000051C2000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1393576879.00000000051A9000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1543194348.00000000051BD000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1445509932.00000000051BF000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1543075788.00000000051BC000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1484141788.000000000037C000.00000004.00000020.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000377000.00000004.00000020.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1442722226.00000000051BF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/ |
Source: zLP3oiwG1g.exe, 00000000.00000003.1470542881.00000000051AC000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1419335143.00000000051AC000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1396948693.00000000051AC000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1543075788.00000000051AC000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1396086235.00000000051A9000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1396513281.00000000051AC000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1618442191.00000000051AC000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051AC000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1470979861.00000000051AC000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1445721130.00000000051AC000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1396336946.00000000051AC000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1483664745.00000000051AC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/)) |
Source: zLP3oiwG1g.exe, 00000000.00000003.1483664745.00000000051C2000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1444894119.00000000051BF000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1418508560.00000000051BF000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1445178694.00000000051BF000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1445027007.00000000051BF000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1420455624.00000000051BF000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1442892518.00000000051BF000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1442445932.00000000051BF000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1445987512.00000000051C2000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1543194348.00000000051BD000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1445509932.00000000051BF000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1418683409.00000000051BF000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1543075788.00000000051BC000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1442722226.00000000051BF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/H( |
Source: zLP3oiwG1g.exe, 00000000.00000003.1418572620.000000000038C000.00000004.00000020.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1484141788.000000000036D000.00000004.00000020.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1484141788.000000000037C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/api |
Source: zLP3oiwG1g.exe, 00000000.00000003.1543259911.000000000037A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/api&04 |
Source: zLP3oiwG1g.exe, 00000000.00000003.1470717759.000000000037E000.00000004.00000020.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1466927575.000000000037E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/pi |
Source: zLP3oiwG1g.exe, 00000000.00000003.1470717759.000000000037E000.00000004.00000020.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1466927575.000000000037E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/s |
Source: zLP3oiwG1g.exe, 00000000.00000002.1887811563.00000000002F4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat:443/api |
Source: zLP3oiwG1g.exe, 00000000.00000002.1887811563.00000000002F4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat:443/apin.txtPK |
Source: zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051AE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.prod-east.frontend.public.atl-paas.net |
Source: zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051AE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net |
Source: zLP3oiwG1g.exe, 00000000.00000003.1420184620.000000000525A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: zLP3oiwG1g.exe, 00000000.00000003.1420184620.000000000525A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: zLP3oiwG1g.exe, 00000000.00000003.1618442191.00000000051AE000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051AE000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website |
Source: zLP3oiwG1g.exe, 00000000.00000003.1420495784.000000000520B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15e498ec2b39921665a1fbc954bff40a8106629178eadc64 |
Source: zLP3oiwG1g.exe, 00000000.00000003.1366230963.0000000005169000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1365911755.000000000516C000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1366695801.0000000005169000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: zLP3oiwG1g.exe, 00000000.00000002.1893151594.00000000051A5000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000002.1887811563.0000000000342000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: zLP3oiwG1g.exe, 00000000.00000003.1366230963.0000000005169000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1365911755.000000000516C000.00000004.00000800.00020000.00000000.sdmp, zLP3oiwG1g.exe, 00000000.00000003.1366695801.0000000005169000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: zLP3oiwG1g.exe, 00000000.00000003.1420495784.000000000520B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.marriott.com/default.mi?utm_source=admarketplace&utm_medium=cpc&utm_campaign=Marriott_Pr |
Source: zLP3oiwG1g.exe, 00000000.00000003.1420184620.000000000525A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.d-GHL1OW1fkT |
Source: zLP3oiwG1g.exe, 00000000.00000003.1420184620.000000000525A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.sYEKgG4Or0s6 |
Source: zLP3oiwG1g.exe, 00000000.00000003.1420184620.000000000525A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: zLP3oiwG1g.exe, 00000000.00000003.1420184620.000000000525A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: zLP3oiwG1g.exe, 00000000.00000003.1420184620.000000000525A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4086F9 second address: 408710 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4B3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 408009 second address: 40800E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58AB29 second address: 58AB2D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 589B47 second address: 589B6C instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FC69CE9FC56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FC69CE9FC5Ch 0x00000012 jmp 00007FC69CE9FC5Ch 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 589B6C second address: 589B7A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007FC69CB9B4ACh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 589B7A second address: 589B83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 589E46 second address: 589E4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 589E4C second address: 589E50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 589E50 second address: 589EAE instructions: 0x00000000 rdtsc 0x00000002 jo 00007FC69CB9B4A6h 0x00000008 jmp 00007FC69CB9B4B8h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop esi 0x00000010 pushad 0x00000011 jmp 00007FC69CB9B4ADh 0x00000016 jnc 00007FC69CB9B4BAh 0x0000001c push eax 0x0000001d push edx 0x0000001e jns 00007FC69CB9B4A6h 0x00000024 jmp 00007FC69CB9B4ABh 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58A435 second address: 58A43F instructions: 0x00000000 rdtsc 0x00000002 jg 00007FC69CE9FC56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58D304 second address: 58D309 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58D309 second address: 58D376 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CE9FC65h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c jns 00007FC69CE9FC57h 0x00000012 movzx ecx, cx 0x00000015 push 00000000h 0x00000017 push 00000000h 0x00000019 push ebp 0x0000001a call 00007FC69CE9FC58h 0x0000001f pop ebp 0x00000020 mov dword ptr [esp+04h], ebp 0x00000024 add dword ptr [esp+04h], 00000016h 0x0000002c inc ebp 0x0000002d push ebp 0x0000002e ret 0x0000002f pop ebp 0x00000030 ret 0x00000031 call 00007FC69CE9FC59h 0x00000036 jns 00007FC69CE9FC64h 0x0000003c push eax 0x0000003d pushad 0x0000003e push eax 0x0000003f push edx 0x00000040 jo 00007FC69CE9FC56h 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58D376 second address: 58D3B0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4B1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e popad 0x0000000f popad 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FC69CB9B4B6h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58D3B0 second address: 58D3B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58D3B4 second address: 58D3BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58D3BA second address: 58D3BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58D3BF second address: 58D3E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push edi 0x0000000c jmp 00007FC69CB9B4ABh 0x00000011 pop edi 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 js 00007FC69CB9B4B0h 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58D49D second address: 58D4A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58D4E0 second address: 58D4E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58D4E4 second address: 58D56B instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FC69CE9FC56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d pop ebx 0x0000000e popad 0x0000000f nop 0x00000010 jmp 00007FC69CE9FC5Eh 0x00000015 push 00000000h 0x00000017 mov ecx, dword ptr [ebp+122D2CF9h] 0x0000001d push 2DC97680h 0x00000022 jmp 00007FC69CE9FC5Ch 0x00000027 xor dword ptr [esp], 2DC97600h 0x0000002e mov esi, ebx 0x00000030 sbb di, 30DEh 0x00000035 push 00000003h 0x00000037 clc 0x00000038 push 00000000h 0x0000003a call 00007FC69CE9FC5Fh 0x0000003f mov edi, dword ptr [ebp+122D1E36h] 0x00000045 pop edi 0x00000046 push 00000003h 0x00000048 jmp 00007FC69CE9FC66h 0x0000004d call 00007FC69CE9FC59h 0x00000052 push eax 0x00000053 push edx 0x00000054 push eax 0x00000055 push edx 0x00000056 pushad 0x00000057 popad 0x00000058 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58D56B second address: 58D571 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58D571 second address: 58D578 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58D578 second address: 58D589 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jc 00007FC69CB9B4AEh 0x0000000e push edi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58D589 second address: 58D5BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 mov eax, dword ptr [esp+04h] 0x00000009 jng 00007FC69CE9FC5Eh 0x0000000f mov eax, dword ptr [eax] 0x00000011 jmp 00007FC69CE9FC64h 0x00000016 mov dword ptr [esp+04h], eax 0x0000001a push esi 0x0000001b push ebx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58D5BE second address: 58D608 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop esi 0x00000006 pop eax 0x00000007 xor dword ptr [ebp+122D37A5h], edi 0x0000000d lea ebx, dword ptr [ebp+1245917Eh] 0x00000013 push 00000000h 0x00000015 push ebx 0x00000016 call 00007FC69CB9B4A8h 0x0000001b pop ebx 0x0000001c mov dword ptr [esp+04h], ebx 0x00000020 add dword ptr [esp+04h], 00000018h 0x00000028 inc ebx 0x00000029 push ebx 0x0000002a ret 0x0000002b pop ebx 0x0000002c ret 0x0000002d mov ecx, dword ptr [ebp+122D2EE1h] 0x00000033 xchg eax, ebx 0x00000034 pushad 0x00000035 jmp 00007FC69CB9B4ABh 0x0000003a push eax 0x0000003b push edx 0x0000003c push eax 0x0000003d push edx 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58D608 second address: 58D60C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58D60C second address: 58D610 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58D71A second address: 58D7E0 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FC69CE9FC66h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a add dword ptr [esp], 6B3817D1h 0x00000011 mov si, C5FBh 0x00000015 push 00000003h 0x00000017 movzx edi, cx 0x0000001a jmp 00007FC69CE9FC65h 0x0000001f push 00000000h 0x00000021 mov di, EC5Bh 0x00000025 push 00000003h 0x00000027 push 749AA7A5h 0x0000002c push ecx 0x0000002d jmp 00007FC69CE9FC64h 0x00000032 pop ecx 0x00000033 add dword ptr [esp], 4B65585Bh 0x0000003a jp 00007FC69CE9FC5Ch 0x00000040 lea ebx, dword ptr [ebp+12459189h] 0x00000046 push 00000000h 0x00000048 push ecx 0x00000049 call 00007FC69CE9FC58h 0x0000004e pop ecx 0x0000004f mov dword ptr [esp+04h], ecx 0x00000053 add dword ptr [esp+04h], 0000001Ch 0x0000005b inc ecx 0x0000005c push ecx 0x0000005d ret 0x0000005e pop ecx 0x0000005f ret 0x00000060 jmp 00007FC69CE9FC62h 0x00000065 jng 00007FC69CE9FC56h 0x0000006b push eax 0x0000006c jo 00007FC69CE9FC7Bh 0x00000072 push eax 0x00000073 push edx 0x00000074 jo 00007FC69CE9FC56h 0x0000007a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5AC8A5 second address: 5AC8E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC69CB9B4B7h 0x00000009 popad 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FC69CB9B4B9h 0x00000014 jg 00007FC69CB9B4A6h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5AC8E5 second address: 5AC8FC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CE9FC63h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5AC8FC second address: 5AC90E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jbe 00007FC69CB9B4ACh 0x0000000c jnp 00007FC69CB9B4A6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5AC90E second address: 5AC914 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5AC914 second address: 5AC918 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ACA41 second address: 5ACA47 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ACA47 second address: 5ACA50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ACA50 second address: 5ACA5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FC69CE9FC56h 0x0000000a pop esi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ACA5B second address: 5ACA7C instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FC69CB9B4ACh 0x00000008 jne 00007FC69CB9B4A8h 0x0000000e pushad 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 jnp 00007FC69CB9B4B0h 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ACC01 second address: 5ACC22 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007FC69CE9FC63h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jbe 00007FC69CE9FC6Bh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ACD5E second address: 5ACD7E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4B2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jnp 00007FC69CB9B4A6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ACD7E second address: 5ACD9F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FC69CE9FC67h 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 583865 second address: 583898 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4B7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007FC69CB9B4B4h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 583898 second address: 58389C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5AD0AA second address: 5AD0B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5AD393 second address: 5AD39C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5AD608 second address: 5AD61B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b ja 00007FC69CB9B4A6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5AD61B second address: 5AD61F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5AD8C1 second address: 5AD8F6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4B1h 0x00000007 jmp 00007FC69CB9B4B4h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f jne 00007FC69CB9B4A8h 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5AD8F6 second address: 5AD8FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 56DB56 second address: 56DB5E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 56DB5E second address: 56DB6E instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push edi 0x00000004 pop edi 0x00000005 push edi 0x00000006 pop edi 0x00000007 pop edi 0x00000008 js 00007FC69CE9FC5Ch 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 56DB6E second address: 56DB84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnl 00007FC69CB9B4AEh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5AE3FB second address: 5AE402 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop ecx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B2ABC second address: 5B2AC6 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FC69CB9B4A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B2FE2 second address: 5B2FE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B20D3 second address: 5B20D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B20D7 second address: 5B20DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B20DD second address: 5B20E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B20E1 second address: 5B20F8 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FC69CE9FC56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jg 00007FC69CE9FC58h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B3345 second address: 5B3353 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC69CB9B4AAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5802B6 second address: 5802BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5802BC second address: 5802C6 instructions: 0x00000000 rdtsc 0x00000002 js 00007FC69CB9B4A6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B8FBC second address: 5B8FC8 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B8FC8 second address: 5B8FCE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B8FCE second address: 5B8FD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B8FD2 second address: 5B8FD6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B8FD6 second address: 5B8FE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B9290 second address: 5B92BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 je 00007FC69CB9B4A6h 0x0000000b push edi 0x0000000c pop edi 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007FC69CB9B4B6h 0x00000014 popad 0x00000015 pop edx 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B92BD second address: 5B92C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B92C1 second address: 5B92D6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4B1h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B92D6 second address: 5B92F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC69CE9FC68h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B972A second address: 5B9739 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jc 00007FC69CB9B4A6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B9739 second address: 5B973D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B973D second address: 5B9741 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5B9741 second address: 5B9747 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BCFF1 second address: 5BCFF5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BD1BD second address: 5BD1C7 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FC69CE9FC56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BD1C7 second address: 5BD1D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FC69CB9B4A6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BD58A second address: 5BD58E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BDA97 second address: 5BDABF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jng 00007FC69CB9B4A6h 0x00000009 push edi 0x0000000a pop edi 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov dword ptr [esp], ebx 0x00000011 mov dword ptr [ebp+122D29D1h], esi 0x00000017 nop 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FC69CB9B4AEh 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BDC78 second address: 5BDC7E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BDC7E second address: 5BDC85 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BDE21 second address: 5BDE25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BDFCE second address: 5BDFD4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BE05E second address: 5BE070 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC69CE9FC5Dh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C0606 second address: 5C060A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C1399 second address: 5C13AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 jmp 00007FC69CE9FC5Bh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C10A7 second address: 5C10AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C13AF second address: 5C13B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C13B4 second address: 5C13B9 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C350E second address: 5C351B instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FC69CE9FC56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C48A6 second address: 5C48AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C3D09 second address: 5C3D0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C45F3 second address: 5C4605 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC69CB9B4AEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C48AA second address: 5C48B4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C4605 second address: 5C4609 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C48B4 second address: 5C4937 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push edx 0x0000000b call 00007FC69CE9FC58h 0x00000010 pop edx 0x00000011 mov dword ptr [esp+04h], edx 0x00000015 add dword ptr [esp+04h], 0000001Dh 0x0000001d inc edx 0x0000001e push edx 0x0000001f ret 0x00000020 pop edx 0x00000021 ret 0x00000022 call 00007FC69CE9FC5Ah 0x00000027 jmp 00007FC69CE9FC5Fh 0x0000002c pop esi 0x0000002d or dword ptr [ebp+122D1ED4h], edx 0x00000033 push 00000000h 0x00000035 push 00000000h 0x00000037 pushad 0x00000038 pushad 0x00000039 mov eax, 0E362597h 0x0000003e jmp 00007FC69CE9FC64h 0x00000043 popad 0x00000044 jmp 00007FC69CE9FC5Eh 0x00000049 popad 0x0000004a xchg eax, ebx 0x0000004b push eax 0x0000004c push edx 0x0000004d push eax 0x0000004e push edx 0x0000004f push eax 0x00000050 push edx 0x00000051 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C4937 second address: 5C493B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C493B second address: 5C4941 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C6534 second address: 5C6542 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 jo 00007FC69CB9B4A6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C756D second address: 5C7572 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C9539 second address: 5C9544 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007FC69CB9B4A6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C7572 second address: 5C7578 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5C766A second address: 5C7673 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5CACA8 second address: 5CAD40 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007FC69CE9FC5Bh 0x0000000c nop 0x0000000d sub dword ptr [ebp+122D1D9Ah], eax 0x00000013 push dword ptr fs:[00000000h] 0x0000001a push 00000000h 0x0000001c push eax 0x0000001d call 00007FC69CE9FC58h 0x00000022 pop eax 0x00000023 mov dword ptr [esp+04h], eax 0x00000027 add dword ptr [esp+04h], 00000016h 0x0000002f inc eax 0x00000030 push eax 0x00000031 ret 0x00000032 pop eax 0x00000033 ret 0x00000034 mov di, 1014h 0x00000038 mov bl, 6Dh 0x0000003a mov dword ptr fs:[00000000h], esp 0x00000041 adc di, 6897h 0x00000046 mov edi, 6C2BDC45h 0x0000004b mov eax, dword ptr [ebp+122D07FDh] 0x00000051 mov bl, al 0x00000053 push FFFFFFFFh 0x00000055 call 00007FC69CE9FC63h 0x0000005a sub edi, dword ptr [ebp+122D2F5Dh] 0x00000060 pop ebx 0x00000061 sub edi, dword ptr [ebp+122D1DC6h] 0x00000067 push eax 0x00000068 je 00007FC69CE9FC6Eh 0x0000006e push eax 0x0000006f push edx 0x00000070 jmp 00007FC69CE9FC60h 0x00000075 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5CCB53 second address: 5CCBD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 js 00007FC69CB9B4ACh 0x0000000b popad 0x0000000c push eax 0x0000000d push ebx 0x0000000e jmp 00007FC69CB9B4ABh 0x00000013 pop ebx 0x00000014 nop 0x00000015 mov edi, dword ptr [ebp+122D2198h] 0x0000001b push 00000000h 0x0000001d push 00000000h 0x0000001f push edx 0x00000020 call 00007FC69CB9B4A8h 0x00000025 pop edx 0x00000026 mov dword ptr [esp+04h], edx 0x0000002a add dword ptr [esp+04h], 00000017h 0x00000032 inc edx 0x00000033 push edx 0x00000034 ret 0x00000035 pop edx 0x00000036 ret 0x00000037 movzx edi, ax 0x0000003a push 00000000h 0x0000003c push 00000000h 0x0000003e push ebp 0x0000003f call 00007FC69CB9B4A8h 0x00000044 pop ebp 0x00000045 mov dword ptr [esp+04h], ebp 0x00000049 add dword ptr [esp+04h], 0000001Ah 0x00000051 inc ebp 0x00000052 push ebp 0x00000053 ret 0x00000054 pop ebp 0x00000055 ret 0x00000056 mov bx, ax 0x00000059 xchg eax, esi 0x0000005a push eax 0x0000005b push edx 0x0000005c jns 00007FC69CB9B4ACh 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5CBBB9 second address: 5CBBC0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5CCDC1 second address: 5CCDD4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jc 00007FC69CB9B4A6h 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push edi 0x00000012 pop edi 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5CCDD4 second address: 5CCDDA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5CDE46 second address: 5CDE4A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5CEB2B second address: 5CEBBD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CE9FC60h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FC69CE9FC5Ah 0x0000000f nop 0x00000010 push esi 0x00000011 mov edi, 1D4841EFh 0x00000016 pop edi 0x00000017 mov ebx, dword ptr [ebp+122D32CEh] 0x0000001d push 00000000h 0x0000001f push 00000000h 0x00000021 push ebx 0x00000022 call 00007FC69CE9FC58h 0x00000027 pop ebx 0x00000028 mov dword ptr [esp+04h], ebx 0x0000002c add dword ptr [esp+04h], 0000001Dh 0x00000034 inc ebx 0x00000035 push ebx 0x00000036 ret 0x00000037 pop ebx 0x00000038 ret 0x00000039 push 00000000h 0x0000003b push 00000000h 0x0000003d push ebp 0x0000003e call 00007FC69CE9FC58h 0x00000043 pop ebp 0x00000044 mov dword ptr [esp+04h], ebp 0x00000048 add dword ptr [esp+04h], 0000001Dh 0x00000050 inc ebp 0x00000051 push ebp 0x00000052 ret 0x00000053 pop ebp 0x00000054 ret 0x00000055 jbe 00007FC69CE9FC5Ch 0x0000005b or dword ptr [ebp+122D1C9Eh], edi 0x00000061 push eax 0x00000062 pushad 0x00000063 pushad 0x00000064 jp 00007FC69CE9FC56h 0x0000006a push eax 0x0000006b push edx 0x0000006c rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5CEBBD second address: 5CEBD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FC69CB9B4B2h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5CDE4A second address: 5CDE54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5CDE54 second address: 5CDE65 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FC69CB9B4A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5CDE65 second address: 5CDE6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5CFCAE second address: 5CFCC6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4B4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5CED13 second address: 5CED2B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CE9FC5Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pushad 0x0000000e popad 0x0000000f pop ecx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5CED2B second address: 5CEDE5 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FC69CB9B4B8h 0x00000008 jmp 00007FC69CB9B4B2h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f nop 0x00000010 mov ebx, dword ptr [ebp+122D37A5h] 0x00000016 push dword ptr fs:[00000000h] 0x0000001d push 00000000h 0x0000001f push edi 0x00000020 call 00007FC69CB9B4A8h 0x00000025 pop edi 0x00000026 mov dword ptr [esp+04h], edi 0x0000002a add dword ptr [esp+04h], 00000018h 0x00000032 inc edi 0x00000033 push edi 0x00000034 ret 0x00000035 pop edi 0x00000036 ret 0x00000037 mov edi, dword ptr [ebp+122D217Dh] 0x0000003d mov dword ptr fs:[00000000h], esp 0x00000044 pushad 0x00000045 stc 0x00000046 push ebx 0x00000047 jl 00007FC69CB9B4A6h 0x0000004d pop esi 0x0000004e popad 0x0000004f mov eax, dword ptr [ebp+122D0C35h] 0x00000055 movsx edi, ax 0x00000058 push FFFFFFFFh 0x0000005a push 00000000h 0x0000005c push edi 0x0000005d call 00007FC69CB9B4A8h 0x00000062 pop edi 0x00000063 mov dword ptr [esp+04h], edi 0x00000067 add dword ptr [esp+04h], 0000001Ch 0x0000006f inc edi 0x00000070 push edi 0x00000071 ret 0x00000072 pop edi 0x00000073 ret 0x00000074 push eax 0x00000075 pushad 0x00000076 jmp 00007FC69CB9B4B5h 0x0000007b push eax 0x0000007c push edx 0x0000007d jmp 00007FC69CB9B4B0h 0x00000082 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5D0C33 second address: 5D0CAC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CE9FC5Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push esi 0x0000000f call 00007FC69CE9FC58h 0x00000014 pop esi 0x00000015 mov dword ptr [esp+04h], esi 0x00000019 add dword ptr [esp+04h], 00000018h 0x00000021 inc esi 0x00000022 push esi 0x00000023 ret 0x00000024 pop esi 0x00000025 ret 0x00000026 pushad 0x00000027 jl 00007FC69CE9FC58h 0x0000002d pushad 0x0000002e popad 0x0000002f cld 0x00000030 popad 0x00000031 push 00000000h 0x00000033 mov ebx, dword ptr [ebp+122D1DBFh] 0x00000039 push 00000000h 0x0000003b push 00000000h 0x0000003d push edx 0x0000003e call 00007FC69CE9FC58h 0x00000043 pop edx 0x00000044 mov dword ptr [esp+04h], edx 0x00000048 add dword ptr [esp+04h], 0000001Ah 0x00000050 inc edx 0x00000051 push edx 0x00000052 ret 0x00000053 pop edx 0x00000054 ret 0x00000055 jmp 00007FC69CE9FC5Ah 0x0000005a push eax 0x0000005b push ecx 0x0000005c push eax 0x0000005d push edx 0x0000005e push eax 0x0000005f push edx 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5D0CAC second address: 5D0CB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5D1CA3 second address: 5D1CA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5D1CA8 second address: 5D1CAE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5D1CAE second address: 5D1CB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 585353 second address: 58535D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007FC69CB9B4A6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 58535D second address: 58536D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a jno 00007FC69CE9FC56h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5CFEB9 second address: 5CFEBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5D52AF second address: 5D52B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5D1FA0 second address: 5D1FD3 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FC69CB9B4BDh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c jng 00007FC69CB9B4A8h 0x00000012 push eax 0x00000013 push edx 0x00000014 jc 00007FC69CB9B4A6h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5D70F1 second address: 5D7120 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FC69CE9FC62h 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push edx 0x0000000f jmp 00007FC69CE9FC62h 0x00000014 pop edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5D7120 second address: 5D7126 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5D7126 second address: 5D716F instructions: 0x00000000 rdtsc 0x00000002 ja 00007FC69CE9FC56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push edx 0x00000010 call 00007FC69CE9FC58h 0x00000015 pop edx 0x00000016 mov dword ptr [esp+04h], edx 0x0000001a add dword ptr [esp+04h], 0000001Bh 0x00000022 inc edx 0x00000023 push edx 0x00000024 ret 0x00000025 pop edx 0x00000026 ret 0x00000027 mov edi, 757E11E4h 0x0000002c push 00000000h 0x0000002e sbb bh, FFFFFFD6h 0x00000031 push 00000000h 0x00000033 xor edi, 70B1410Dh 0x00000039 push eax 0x0000003a push eax 0x0000003b push edx 0x0000003c push eax 0x0000003d push edx 0x0000003e pop edx 0x0000003f pop eax 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5D72F5 second address: 5D72FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5D72FB second address: 5D7390 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 mov bl, 43h 0x0000000b push dword ptr fs:[00000000h] 0x00000012 mov edi, dword ptr [ebp+124574ABh] 0x00000018 mov dword ptr fs:[00000000h], esp 0x0000001f mov edi, 0A8BB338h 0x00000024 mov eax, dword ptr [ebp+122D1389h] 0x0000002a push 00000000h 0x0000002c push eax 0x0000002d call 00007FC69CE9FC58h 0x00000032 pop eax 0x00000033 mov dword ptr [esp+04h], eax 0x00000037 add dword ptr [esp+04h], 00000015h 0x0000003f inc eax 0x00000040 push eax 0x00000041 ret 0x00000042 pop eax 0x00000043 ret 0x00000044 mov edi, dword ptr [ebp+122D30E1h] 0x0000004a mov bx, A2A6h 0x0000004e push FFFFFFFFh 0x00000050 push 00000000h 0x00000052 push edi 0x00000053 call 00007FC69CE9FC58h 0x00000058 pop edi 0x00000059 mov dword ptr [esp+04h], edi 0x0000005d add dword ptr [esp+04h], 00000015h 0x00000065 inc edi 0x00000066 push edi 0x00000067 ret 0x00000068 pop edi 0x00000069 ret 0x0000006a jmp 00007FC69CE9FC5Ah 0x0000006f push eax 0x00000070 pushad 0x00000071 push eax 0x00000072 push edx 0x00000073 jmp 00007FC69CE9FC67h 0x00000078 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5D8299 second address: 5D829D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5D829D second address: 5D836A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a mov di, ax 0x0000000d push dword ptr fs:[00000000h] 0x00000014 push 00000000h 0x00000016 push ebp 0x00000017 call 00007FC69CE9FC58h 0x0000001c pop ebp 0x0000001d mov dword ptr [esp+04h], ebp 0x00000021 add dword ptr [esp+04h], 00000019h 0x00000029 inc ebp 0x0000002a push ebp 0x0000002b ret 0x0000002c pop ebp 0x0000002d ret 0x0000002e jns 00007FC69CE9FC5Bh 0x00000034 jmp 00007FC69CE9FC60h 0x00000039 mov dword ptr fs:[00000000h], esp 0x00000040 mov dword ptr [ebp+122D5B72h], edi 0x00000046 mov eax, dword ptr [ebp+122D022Dh] 0x0000004c push 00000000h 0x0000004e push ebx 0x0000004f call 00007FC69CE9FC58h 0x00000054 pop ebx 0x00000055 mov dword ptr [esp+04h], ebx 0x00000059 add dword ptr [esp+04h], 0000001Ah 0x00000061 inc ebx 0x00000062 push ebx 0x00000063 ret 0x00000064 pop ebx 0x00000065 ret 0x00000066 mov dword ptr [ebp+122D2565h], esi 0x0000006c movzx edi, di 0x0000006f push FFFFFFFFh 0x00000071 jmp 00007FC69CE9FC69h 0x00000076 or bx, F5E1h 0x0000007b nop 0x0000007c pushad 0x0000007d jmp 00007FC69CE9FC68h 0x00000082 pushad 0x00000083 push eax 0x00000084 pop eax 0x00000085 push eax 0x00000086 push edx 0x00000087 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E20E4 second address: 5E20E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E20E8 second address: 5E210E instructions: 0x00000000 rdtsc 0x00000002 jc 00007FC69CE9FC56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FC69CE9FC68h 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E210E second address: 5E2122 instructions: 0x00000000 rdtsc 0x00000002 js 00007FC69CB9B4A6h 0x00000008 jnl 00007FC69CB9B4A6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push esi 0x00000013 pop esi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E2122 second address: 5E2126 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E2126 second address: 5E2146 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a jmp 00007FC69CB9B4B3h 0x0000000f pushad 0x00000010 popad 0x00000011 pop ebx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E185F second address: 5E1863 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E1863 second address: 5E1869 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E1869 second address: 5E1875 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 jnc 00007FC69CE9FC56h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E19CC second address: 5E19D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E19D0 second address: 5E1A0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebx 0x00000009 pushad 0x0000000a jmp 00007FC69CE9FC67h 0x0000000f jmp 00007FC69CE9FC65h 0x00000014 push eax 0x00000015 push edx 0x00000016 jbe 00007FC69CE9FC56h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E1B99 second address: 5E1BBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jp 00007FC69CB9B4B8h 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E1BBA second address: 5E1BBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E1BBE second address: 5E1BC8 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E1BC8 second address: 5E1BCE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E6DA5 second address: 5E6DCB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4B8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d jnp 00007FC69CB9B4A6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E6DCB second address: 5E6DD8 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FC69CE9FC56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E6DD8 second address: 5E6DE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a push edx 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E6DE6 second address: 5E6DF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 mov eax, dword ptr [eax] 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E6DF3 second address: 5E6DF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E6DF9 second address: 5E6DFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E6DFE second address: 5E6E08 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007FC69CB9B4A6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E6EED second address: 5E6F0C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CE9FC63h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edi 0x0000000c pushad 0x0000000d push eax 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E6F0C second address: 5E6F53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a push ebx 0x0000000b js 00007FC69CB9B4A8h 0x00000011 pushad 0x00000012 popad 0x00000013 pop ebx 0x00000014 mov eax, dword ptr [eax] 0x00000016 pushad 0x00000017 jmp 00007FC69CB9B4B5h 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FC69CB9B4B9h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5E7030 second address: 5E7034 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ED566 second address: 5ED56C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ED56C second address: 5ED575 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ED575 second address: 5ED581 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FC69CB9B4AEh 0x00000008 push edi 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ED581 second address: 5ED58A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 push edx 0x00000006 pop edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5EC1E5 second address: 5EC1FC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4AFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5EC1FC second address: 5EC204 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5EC77B second address: 5EC785 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FC69CB9B4A6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5EC785 second address: 5EC7A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jmp 00007FC69CE9FC63h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5EC7A1 second address: 5EC7BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FC69CB9B4AEh 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5EC7BA second address: 5EC7CF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FC69CE9FC5Fh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5EC7CF second address: 5EC7FB instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007FC69CB9B4ADh 0x00000008 jno 00007FC69CB9B4A6h 0x0000000e pop edi 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 jmp 00007FC69CB9B4B0h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ECBE4 second address: 5ECBED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push ebx 0x00000006 push edx 0x00000007 pop edx 0x00000008 pop ebx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ECBED second address: 5ECBF3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ECBF3 second address: 5ECC41 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FC69CE9FC56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FC69CE9FC66h 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pushad 0x00000012 jns 00007FC69CE9FC6Bh 0x00000018 push eax 0x00000019 push edx 0x0000001a push esi 0x0000001b pop esi 0x0000001c jmp 00007FC69CE9FC5Ch 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ECDAC second address: 5ECDCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC69CB9B4B9h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ECDCA second address: 5ECDE2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC69CE9FC62h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ECDE2 second address: 5ECDE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ECF7D second address: 5ECF84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ECF84 second address: 5ECFB7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 pop eax 0x00000007 jmp 00007FC69CB9B4ADh 0x0000000c jl 00007FC69CB9B4A6h 0x00000012 popad 0x00000013 pushad 0x00000014 jmp 00007FC69CB9B4B5h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ED14F second address: 5ED158 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ED158 second address: 5ED15C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ED15C second address: 5ED160 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ED2AF second address: 5ED2B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5ED2B3 second address: 5ED2B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F1799 second address: 5F179D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F5F25 second address: 5F5F29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F5F29 second address: 5F5F39 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jne 00007FC69CB9B4A6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F6634 second address: 5F663A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F663A second address: 5F663E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F663E second address: 5F6642 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F6642 second address: 5F6648 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F68E5 second address: 5F68E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F68E9 second address: 5F6919 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4B6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FC69CB9B4A8h 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FC69CB9B4AAh 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F6A4F second address: 5F6A53 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F6BA8 second address: 5F6BC9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 jmp 00007FC69CB9B4ACh 0x0000000e pop edi 0x0000000f pushad 0x00000010 jo 00007FC69CB9B4AEh 0x00000016 pushad 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F6BC9 second address: 5F6BDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push edi 0x00000007 pop edi 0x00000008 jmp 00007FC69CE9FC5Ah 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F6BDB second address: 5F6BDF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F6BDF second address: 5F6BE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F6BE5 second address: 5F6BEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F6D48 second address: 5F6D91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC69CE9FC67h 0x00000009 jmp 00007FC69CE9FC66h 0x0000000e popad 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 jmp 00007FC69CE9FC5Ch 0x00000017 pushad 0x00000018 popad 0x00000019 pushad 0x0000001a popad 0x0000001b popad 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F6D91 second address: 5F6D97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F6D97 second address: 5F6DB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC69CE9FC5Eh 0x00000009 popad 0x0000000a popad 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jp 00007FC69CE9FC56h 0x00000014 push ecx 0x00000015 pop ecx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F6DB6 second address: 5F6DD6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FC69CB9B4B6h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F6DD6 second address: 5F6DDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F6F42 second address: 5F6F46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F6F46 second address: 5F6F4E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5F6F4E second address: 5F6F55 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5A1FB4 second address: 5A1FD9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jg 00007FC69CE9FC58h 0x0000000c pushad 0x0000000d popad 0x0000000e push edx 0x0000000f jmp 00007FC69CE9FC63h 0x00000014 push esi 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6002E5 second address: 6002FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 pushad 0x00000008 push edi 0x00000009 pop edi 0x0000000a jno 00007FC69CB9B4A6h 0x00000010 popad 0x00000011 pop edx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6002FD second address: 600318 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CE9FC67h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5FF232 second address: 5FF236 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5FF236 second address: 5FF23C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5FF39A second address: 5FF3BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edi 0x00000007 jmp 00007FC69CB9B4B7h 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5FF3BC second address: 5FF3C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5FF7CE second address: 5FF7D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5FF7D2 second address: 5FF7D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5FFA95 second address: 5FFA99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5FFD19 second address: 5FFD47 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 push edx 0x0000000a pop edx 0x0000000b jmp 00007FC69CE9FC5Ch 0x00000010 pop esi 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 jmp 00007FC69CE9FC5Eh 0x0000001a push ebx 0x0000001b pop ebx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5FFD47 second address: 5FFD60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FC69CB9B4B4h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5FFD60 second address: 5FFD66 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5FFD66 second address: 5FFD6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 604D7B second address: 604DBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 jmp 00007FC69CE9FC62h 0x0000000c jp 00007FC69CE9FC5Ah 0x00000012 popad 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 jmp 00007FC69CE9FC66h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 604DBA second address: 604DC0 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 603C39 second address: 603C41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BB9C4 second address: 5BB9D6 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FC69CB9B4A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f pushad 0x00000010 popad 0x00000011 pop ebx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BB9D6 second address: 5BB9DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BB9DC second address: 5BB9E0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BBDF2 second address: 408009 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC69CE9FC61h 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c jmp 00007FC69CE9FC63h 0x00000011 nop 0x00000012 mov di, bx 0x00000015 push dword ptr [ebp+122D16DDh] 0x0000001b mov cx, AA31h 0x0000001f call dword ptr [ebp+122D1FAEh] 0x00000025 pushad 0x00000026 clc 0x00000027 xor eax, eax 0x00000029 stc 0x0000002a jmp 00007FC69CE9FC64h 0x0000002f mov edx, dword ptr [esp+28h] 0x00000033 stc 0x00000034 mov dword ptr [ebp+122D2D51h], eax 0x0000003a pushad 0x0000003b push ebx 0x0000003c jg 00007FC69CE9FC56h 0x00000042 pop edx 0x00000043 mov ecx, dword ptr [ebp+122D2D25h] 0x00000049 popad 0x0000004a sub dword ptr [ebp+122D1E1Ch], ebx 0x00000050 mov esi, 0000003Ch 0x00000055 sub dword ptr [ebp+122D1CA3h], ebx 0x0000005b add esi, dword ptr [esp+24h] 0x0000005f jg 00007FC69CE9FC57h 0x00000065 lodsw 0x00000067 mov dword ptr [ebp+122D1E1Ch], ebx 0x0000006d add eax, dword ptr [esp+24h] 0x00000071 pushad 0x00000072 push edi 0x00000073 mov dword ptr [ebp+122D1CA3h], ecx 0x00000079 pop ebx 0x0000007a mov dword ptr [ebp+122D2198h], ebx 0x00000080 popad 0x00000081 mov ebx, dword ptr [esp+24h] 0x00000085 stc 0x00000086 nop 0x00000087 push eax 0x00000088 push edx 0x00000089 push edx 0x0000008a push eax 0x0000008b push edx 0x0000008c rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BBEC1 second address: 408009 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4B0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c adc edi, 504DCB9Ah 0x00000012 push dword ptr [ebp+122D16DDh] 0x00000018 mov edi, esi 0x0000001a call dword ptr [ebp+122D1FAEh] 0x00000020 pushad 0x00000021 clc 0x00000022 xor eax, eax 0x00000024 stc 0x00000025 jmp 00007FC69CB9B4B4h 0x0000002a mov edx, dword ptr [esp+28h] 0x0000002e stc 0x0000002f mov dword ptr [ebp+122D2D51h], eax 0x00000035 pushad 0x00000036 push ebx 0x00000037 jg 00007FC69CB9B4A6h 0x0000003d pop edx 0x0000003e mov ecx, dword ptr [ebp+122D2D25h] 0x00000044 popad 0x00000045 sub dword ptr [ebp+122D1E1Ch], ebx 0x0000004b mov esi, 0000003Ch 0x00000050 sub dword ptr [ebp+122D1CA3h], ebx 0x00000056 add esi, dword ptr [esp+24h] 0x0000005a jg 00007FC69CB9B4A7h 0x00000060 lodsw 0x00000062 mov dword ptr [ebp+122D1E1Ch], ebx 0x00000068 add eax, dword ptr [esp+24h] 0x0000006c pushad 0x0000006d push edi 0x0000006e mov dword ptr [ebp+122D1CA3h], ecx 0x00000074 pop ebx 0x00000075 mov dword ptr [ebp+122D2198h], ebx 0x0000007b popad 0x0000007c mov ebx, dword ptr [esp+24h] 0x00000080 stc 0x00000081 nop 0x00000082 push eax 0x00000083 push edx 0x00000084 push edx 0x00000085 push eax 0x00000086 push edx 0x00000087 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BBF68 second address: 5BBF89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC69CE9FC68h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BBF89 second address: 5BBF8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BC13D second address: 5BC174 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CE9FC69h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp], esi 0x0000000d push edx 0x0000000e push edx 0x0000000f and cl, 00000074h 0x00000012 pop ecx 0x00000013 pop edx 0x00000014 nop 0x00000015 push eax 0x00000016 push edx 0x00000017 jbe 00007FC69CE9FC5Ch 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BC2AC second address: 5BC2B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BC49F second address: 5BC4B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC69CE9FC5Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BC4B1 second address: 5BC4C0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BC4C0 second address: 5BC4C6 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BC85D second address: 5BC876 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push edi 0x0000000b pop edi 0x0000000c jmp 00007FC69CB9B4ACh 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5BC876 second address: 5BC891 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC69CE9FC67h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 604441 second address: 604464 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007FC69CB9B4B7h 0x0000000b jc 00007FC69CB9B4A6h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 604464 second address: 604468 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 608137 second address: 60813B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 60813B second address: 608148 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push edx 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 5796EF second address: 579705 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4AEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 579705 second address: 579709 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 607DBA second address: 607DBE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 607DBE second address: 607DD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jno 00007FC69CE9FC56h 0x0000000e jnl 00007FC69CE9FC56h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 607DD2 second address: 607DD6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 607DD6 second address: 607DFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push edi 0x0000000a pop edi 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 popad 0x00000011 pushad 0x00000012 jmp 00007FC69CE9FC62h 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 607DFE second address: 607E04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 607E04 second address: 607E08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 607E08 second address: 607E20 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007FC69CB9B4ABh 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 60B16A second address: 60B16E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 60B16E second address: 60B172 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 60B172 second address: 60B18F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jbe 00007FC69CE9FC56h 0x00000010 jmp 00007FC69CE9FC5Bh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 60B18F second address: 60B194 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 611875 second address: 611887 instructions: 0x00000000 rdtsc 0x00000002 je 00007FC69CE9FC56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 610B96 second address: 610BAD instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FC69CB9B4AEh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 610BAD second address: 610BB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop ebx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 610BB4 second address: 610BBB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 610BBB second address: 610BC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6112E3 second address: 6112E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6112E7 second address: 6112EC instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 61143D second address: 611443 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 611443 second address: 611447 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 616074 second address: 616085 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FC69CB9B4A6h 0x0000000a pushad 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 616332 second address: 616346 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC69CE9FC5Eh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 616346 second address: 616353 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 pushad 0x00000009 popad 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 616353 second address: 61635B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 push edi 0x00000007 pop edi 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 61635B second address: 61635F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 61635F second address: 616365 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 61662D second address: 616633 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 616633 second address: 616639 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 616639 second address: 61663E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 616A3A second address: 616A3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 616A3E second address: 616A59 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4ADh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jno 00007FC69CB9B4A6h 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 61B499 second address: 61B4B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop esi 0x00000007 ja 00007FC69CE9FC5Eh 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 pop eax 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 61B4B2 second address: 61B4B8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6231C8 second address: 6231DE instructions: 0x00000000 rdtsc 0x00000002 jl 00007FC69CE9FC5Ah 0x00000008 pushad 0x00000009 popad 0x0000000a push esi 0x0000000b pop esi 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 jg 00007FC69CE9FC56h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6211EF second address: 6211F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007FC69CB9B4A6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6211F9 second address: 621204 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 62134E second address: 621352 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 621352 second address: 62136A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007FC69CE9FC5Bh 0x00000011 pop edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 622AD5 second address: 622AD9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 622AD9 second address: 622ADD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 622ADD second address: 622AE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 622AE3 second address: 622B07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jc 00007FC69CE9FC56h 0x0000000d jmp 00007FC69CE9FC65h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 622DF6 second address: 622E14 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC69CB9B4ACh 0x00000009 jmp 00007FC69CB9B4AEh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 622E14 second address: 622E5C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 js 00007FC69CE9FC56h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jg 00007FC69CE9FCA4h 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FC69CE9FC69h 0x0000001b jmp 00007FC69CE9FC69h 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 628AB7 second address: 628AD1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FC69CB9B4B5h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 628C7E second address: 628C84 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6290C0 second address: 6290C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 629200 second address: 62920C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jc 00007FC69CE9FC56h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 62920C second address: 629210 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 629210 second address: 629233 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FC69CE9FC5Ch 0x0000000e jmp 00007FC69CE9FC5Eh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6294E9 second address: 6294ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6294ED second address: 6294F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 62E4F4 second address: 62E515 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jnp 00007FC69CB9B4A6h 0x0000000d push edx 0x0000000e pop edx 0x0000000f jmp 00007FC69CB9B4B0h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 62E515 second address: 62E53C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FC69CE9FC5Ah 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jng 00007FC69CE9FC58h 0x00000013 jmp 00007FC69CE9FC5Dh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 56DB80 second address: 56DB84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 636332 second address: 636336 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 636336 second address: 63633A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 636469 second address: 63648A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 push esi 0x00000006 pop esi 0x00000007 pop ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FC69CE9FC5Ch 0x0000000f jmp 00007FC69CE9FC5Bh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 636921 second address: 636927 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 636927 second address: 636949 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FC69CE9FC64h 0x0000000c jbe 00007FC69CE9FC56h 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 636EAE second address: 636EB3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 636EB3 second address: 636EBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 637022 second address: 63703A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jc 00007FC69CB9B4ACh 0x0000000e js 00007FC69CB9B4A6h 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 63703A second address: 637040 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 637040 second address: 637044 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 637044 second address: 637048 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 637048 second address: 637061 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC69CB9B4AEh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c pushad 0x0000000d push esi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 637061 second address: 63706A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 63706A second address: 63706E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 63706E second address: 637072 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 638079 second address: 63807F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 635E9B second address: 635EB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 js 00007FC69CE9FC60h 0x0000000d jmp 00007FC69CE9FC5Ah 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 647ECC second address: 647ED5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 647ED5 second address: 647EDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 647EDB second address: 647EDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 647EDF second address: 647EE3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 647EE3 second address: 647F0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 pushad 0x00000008 jmp 00007FC69CB9B4ACh 0x0000000d push ecx 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007FC69CB9B4B1h 0x00000015 pop ecx 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 652C56 second address: 652C6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 jmp 00007FC69CE9FC60h 0x0000000d pop edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 662290 second address: 662299 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 662299 second address: 6622F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jp 00007FC69CE9FC5Ch 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jng 00007FC69CE9FC6Ch 0x00000014 jmp 00007FC69CE9FC64h 0x00000019 push edx 0x0000001a pop edx 0x0000001b pushad 0x0000001c jmp 00007FC69CE9FC5Ah 0x00000021 jmp 00007FC69CE9FC65h 0x00000026 jmp 00007FC69CE9FC5Dh 0x0000002b popad 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6686D3 second address: 6686EF instructions: 0x00000000 rdtsc 0x00000002 jng 00007FC69CB9B4A6h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ecx 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 jmp 00007FC69CB9B4AAh 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6686EF second address: 6686F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 668847 second address: 66884B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6689C3 second address: 6689F8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC69CE9FC64h 0x00000008 js 00007FC69CE9FC56h 0x0000000e pushad 0x0000000f popad 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 jmp 00007FC69CE9FC5Eh 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6689F8 second address: 6689FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6689FE second address: 668A08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 668A08 second address: 668A0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 668A0D second address: 668A1F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 je 00007FC69CE9FC56h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f pop eax 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 668A1F second address: 668A25 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 668CE5 second address: 668CFB instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jnc 00007FC69CE9FC5Ch 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 668CFB second address: 668D0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 jp 00007FC69CB9B4A6h 0x0000000c popad 0x0000000d push edi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 668FF3 second address: 668FF7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 66997D second address: 669982 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 669982 second address: 669993 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jl 00007FC69CE9FC56h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 669993 second address: 669997 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 66EAF0 second address: 66EB08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC69CE9FC61h 0x00000009 push edi 0x0000000a pop edi 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 671571 second address: 67157D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 67157D second address: 671587 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 671587 second address: 6715A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FC69CB9B4B7h 0x0000000c push esi 0x0000000d pop esi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6A5129 second address: 6A5135 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 ja 00007FC69CE9FC56h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6A5135 second address: 6A514B instructions: 0x00000000 rdtsc 0x00000002 jg 00007FC69CB9B4ACh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c push eax 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6A514B second address: 6A5156 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6A5156 second address: 6A5177 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4B9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6A5177 second address: 6A517B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6A4B70 second address: 6A4B8C instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jo 00007FC69CB9B4A6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ebx 0x0000000d jne 00007FC69CB9B4A6h 0x00000013 pop ebx 0x00000014 js 00007FC69CB9B4ACh 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6A676D second address: 6A6771 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6A6771 second address: 6A6777 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6AA968 second address: 6AA979 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FC69CE9FC56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b push eax 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6AA979 second address: 6AA97D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6AA97D second address: 6AA9BE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CE9FC65h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a nop 0x0000000b push esi 0x0000000c mov dx, F79Fh 0x00000010 pop edx 0x00000011 push 00000004h 0x00000013 adc dl, FFFFFFB6h 0x00000016 push 1CDD30BFh 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007FC69CE9FC64h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6AA9BE second address: 6AA9C3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6AABF2 second address: 6AABF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6AABF7 second address: 6AAC8F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jl 00007FC69CB9B4A6h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push esi 0x00000010 jnc 00007FC69CB9B4A8h 0x00000016 pop esi 0x00000017 nop 0x00000018 push 00000000h 0x0000001a push edi 0x0000001b call 00007FC69CB9B4A8h 0x00000020 pop edi 0x00000021 mov dword ptr [esp+04h], edi 0x00000025 add dword ptr [esp+04h], 00000016h 0x0000002d inc edi 0x0000002e push edi 0x0000002f ret 0x00000030 pop edi 0x00000031 ret 0x00000032 jmp 00007FC69CB9B4B6h 0x00000037 push dword ptr [ebp+122D2574h] 0x0000003d push 00000000h 0x0000003f push ebp 0x00000040 call 00007FC69CB9B4A8h 0x00000045 pop ebp 0x00000046 mov dword ptr [esp+04h], ebp 0x0000004a add dword ptr [esp+04h], 00000019h 0x00000052 inc ebp 0x00000053 push ebp 0x00000054 ret 0x00000055 pop ebp 0x00000056 ret 0x00000057 call 00007FC69CB9B4B4h 0x0000005c push esi 0x0000005d mov dh, ah 0x0000005f pop edx 0x00000060 pop edx 0x00000061 push 6BAE690Bh 0x00000066 pushad 0x00000067 push eax 0x00000068 push edx 0x00000069 pushad 0x0000006a popad 0x0000006b rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6AC68D second address: 6AC691 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6AC691 second address: 6AC6B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC69CB9B4B2h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f jne 00007FC69CB9B4A6h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 6AE1B8 second address: 6AE1BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 581D76 second address: 581D7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 47F02C0 second address: 47F02C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 47F02C7 second address: 47F030F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push ebx 0x00000008 pushad 0x00000009 pushfd 0x0000000a jmp 00007FC69CB9B4ACh 0x0000000f sub ax, 7C38h 0x00000014 jmp 00007FC69CB9B4ABh 0x00000019 popfd 0x0000001a popad 0x0000001b mov dword ptr [esp], ebp 0x0000001e pushad 0x0000001f mov di, 6C26h 0x00000023 mov dl, 24h 0x00000025 popad 0x00000026 mov ebp, esp 0x00000028 pushad 0x00000029 mov si, F87Bh 0x0000002d mov ax, A157h 0x00000031 popad 0x00000032 mov edx, dword ptr [ebp+0Ch] 0x00000035 push eax 0x00000036 push edx 0x00000037 push eax 0x00000038 push edx 0x00000039 pushad 0x0000003a popad 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 47F030F second address: 47F031E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CE9FC5Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810720 second address: 4810726 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810726 second address: 481072A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 481072A second address: 4810749 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FC69CB9B4B4h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810749 second address: 481074F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 481074F second address: 4810753 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810753 second address: 48107B8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CE9FC5Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FC69CE9FC5Ch 0x00000013 adc esi, 38038208h 0x00000019 jmp 00007FC69CE9FC5Bh 0x0000001e popfd 0x0000001f movzx eax, di 0x00000022 popad 0x00000023 push eax 0x00000024 jmp 00007FC69CE9FC62h 0x00000029 xchg eax, esi 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007FC69CE9FC67h 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 48107B8 second address: 48107D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC69CB9B4B4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 48107D0 second address: 48107D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 48107D4 second address: 481082F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 lea eax, dword ptr [ebp-04h] 0x0000000b pushad 0x0000000c movsx edx, ax 0x0000000f mov bl, ch 0x00000011 popad 0x00000012 push ecx 0x00000013 pushad 0x00000014 pushfd 0x00000015 jmp 00007FC69CB9B4B3h 0x0000001a or eax, 55EDD26Eh 0x00000020 jmp 00007FC69CB9B4B9h 0x00000025 popfd 0x00000026 popad 0x00000027 mov dword ptr [esp], eax 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007FC69CB9B4ADh 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 48108EC second address: 4810915 instructions: 0x00000000 rdtsc 0x00000002 mov edi, 46F25ED6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov esi, eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f call 00007FC69CE9FC66h 0x00000014 pop eax 0x00000015 mov ecx, edx 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810915 second address: 481092C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC69CB9B4B3h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810970 second address: 4810974 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810974 second address: 481097A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 481097A second address: 4810981 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810981 second address: 48109B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, esi 0x00000009 pushad 0x0000000a mov eax, 747C4E71h 0x0000000f push eax 0x00000010 push edx 0x00000011 pushfd 0x00000012 jmp 00007FC69CB9B4ACh 0x00000017 xor ecx, 0329F348h 0x0000001d jmp 00007FC69CB9B4ABh 0x00000022 popfd 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 48109B1 second address: 48001C9 instructions: 0x00000000 rdtsc 0x00000002 mov dl, ch 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pop esi 0x00000008 jmp 00007FC69CE9FC5Bh 0x0000000d leave 0x0000000e jmp 00007FC69CE9FC66h 0x00000013 retn 0004h 0x00000016 nop 0x00000017 cmp eax, 00000000h 0x0000001a setne al 0x0000001d jmp 00007FC69CE9FC52h 0x0000001f xor ebx, ebx 0x00000021 test al, 01h 0x00000023 jne 00007FC69CE9FC57h 0x00000025 sub esp, 04h 0x00000028 mov dword ptr [esp], 0000000Dh 0x0000002f call 00007FC6A12BD3F9h 0x00000034 mov edi, edi 0x00000036 push eax 0x00000037 push edx 0x00000038 jmp 00007FC69CE9FC67h 0x0000003d rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 48001C9 second address: 48001ED instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4B9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 48001ED second address: 4800213 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov dh, al 0x00000007 popad 0x00000008 push eax 0x00000009 pushad 0x0000000a mov dh, ah 0x0000000c push edx 0x0000000d mov bx, si 0x00000010 pop esi 0x00000011 popad 0x00000012 xchg eax, ebp 0x00000013 pushad 0x00000014 pushad 0x00000015 push edi 0x00000016 pop esi 0x00000017 push ebx 0x00000018 pop eax 0x00000019 popad 0x0000001a movsx edx, ax 0x0000001d popad 0x0000001e mov ebp, esp 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 pushad 0x00000024 popad 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800213 second address: 4800219 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800219 second address: 4800255 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 sub esp, 2Ch 0x0000000b jmp 00007FC69CE9FC69h 0x00000010 xchg eax, ebx 0x00000011 pushad 0x00000012 mov esi, 23D55843h 0x00000017 push ecx 0x00000018 mov di, D54Ah 0x0000001c pop ebx 0x0000001d popad 0x0000001e push eax 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 mov ecx, 20D57169h 0x00000027 popad 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800255 second address: 480025B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 480025B second address: 4800296 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CE9FC5Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebx 0x0000000c jmp 00007FC69CE9FC60h 0x00000011 xchg eax, edi 0x00000012 jmp 00007FC69CE9FC60h 0x00000017 push eax 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800296 second address: 480029A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 480029A second address: 48002A0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 48002A0 second address: 48002B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC69CB9B4B2h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 48002EF second address: 480036C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CE9FC67h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub edi, edi 0x0000000b pushad 0x0000000c jmp 00007FC69CE9FC65h 0x00000011 mov dx, cx 0x00000014 popad 0x00000015 inc ebx 0x00000016 pushad 0x00000017 call 00007FC69CE9FC5Fh 0x0000001c mov bh, ch 0x0000001e pop edi 0x0000001f popad 0x00000020 test al, al 0x00000022 jmp 00007FC69CE9FC60h 0x00000027 je 00007FC69CE9FDD5h 0x0000002d push eax 0x0000002e push edx 0x0000002f jmp 00007FC69CE9FC67h 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 480036C second address: 48003B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cl, dl 0x00000005 push esi 0x00000006 pop edi 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a lea ecx, dword ptr [ebp-14h] 0x0000000d jmp 00007FC69CB9B4AAh 0x00000012 mov dword ptr [ebp-14h], edi 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 jmp 00007FC69CB9B4ADh 0x0000001d pushfd 0x0000001e jmp 00007FC69CB9B4B0h 0x00000023 adc ah, FFFFFF98h 0x00000026 jmp 00007FC69CB9B4ABh 0x0000002b popfd 0x0000002c popad 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 48003E7 second address: 48003F6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebp 0x0000000b pushad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 48003F6 second address: 4800400 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 mov cx, dx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 480052E second address: 4800532 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800532 second address: 4800536 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800536 second address: 480053C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 480053C second address: 4800558 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC69CB9B4B8h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800558 second address: 4800579 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 pushad 0x0000000a mov edi, esi 0x0000000c popad 0x0000000d nop 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FC69CE9FC61h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800579 second address: 48005B6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4B1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FC69CB9B4B1h 0x0000000f nop 0x00000010 jmp 00007FC69CB9B4AEh 0x00000015 xchg eax, ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 48005B6 second address: 48005BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 48005BA second address: 48005D7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4B9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 48005D7 second address: 4800644 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC69CE9FC67h 0x00000008 mov dx, cx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f pushad 0x00000010 pushfd 0x00000011 jmp 00007FC69CE9FC5Bh 0x00000016 sub ah, FFFFFFFEh 0x00000019 jmp 00007FC69CE9FC69h 0x0000001e popfd 0x0000001f mov ecx, 0694CF47h 0x00000024 popad 0x00000025 xchg eax, ebx 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007FC69CE9FC69h 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800644 second address: 4800649 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 48006B8 second address: 4800031 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CE9FC61h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b jmp 00007FC69CE9FC5Eh 0x00000010 je 00007FC70F72DBCEh 0x00000016 xor eax, eax 0x00000018 jmp 00007FC69CE7938Ah 0x0000001d pop esi 0x0000001e pop edi 0x0000001f pop ebx 0x00000020 leave 0x00000021 retn 0004h 0x00000024 nop 0x00000025 xor ebx, ebx 0x00000027 cmp eax, 00000000h 0x0000002a je 00007FC69CE9FDB3h 0x00000030 call 00007FC6A12BD0DDh 0x00000035 mov edi, edi 0x00000037 jmp 00007FC69CE9FC67h 0x0000003c xchg eax, ebp 0x0000003d push eax 0x0000003e push edx 0x0000003f jmp 00007FC69CE9FC65h 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800031 second address: 4800049 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edx, cx 0x00000006 mov ecx, 6510FB5Fh 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 push eax 0x00000013 pop ebx 0x00000014 movzx esi, di 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800049 second address: 4800058 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC69CE9FC5Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800058 second address: 480005C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 480005C second address: 480006B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 480006B second address: 4800079 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4AAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800079 second address: 4800150 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CE9FC5Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FC69CE9FC64h 0x00000012 add si, A888h 0x00000017 jmp 00007FC69CE9FC5Bh 0x0000001c popfd 0x0000001d pushfd 0x0000001e jmp 00007FC69CE9FC68h 0x00000023 sub esi, 382B0AE8h 0x00000029 jmp 00007FC69CE9FC5Bh 0x0000002e popfd 0x0000002f popad 0x00000030 xchg eax, ecx 0x00000031 jmp 00007FC69CE9FC66h 0x00000036 push eax 0x00000037 jmp 00007FC69CE9FC5Bh 0x0000003c xchg eax, ecx 0x0000003d push eax 0x0000003e push edx 0x0000003f pushad 0x00000040 pushfd 0x00000041 jmp 00007FC69CE9FC5Bh 0x00000046 xor cx, 6F8Eh 0x0000004b jmp 00007FC69CE9FC69h 0x00000050 popfd 0x00000051 pushfd 0x00000052 jmp 00007FC69CE9FC60h 0x00000057 or al, 00000008h 0x0000005a jmp 00007FC69CE9FC5Bh 0x0000005f popfd 0x00000060 popad 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800150 second address: 4800156 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800156 second address: 480015A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800B0F second address: 4800B15 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800B15 second address: 4800B19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800B19 second address: 4800B1D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800B80 second address: 4800B86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800B86 second address: 4800BA8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push 1636FD7Eh 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FC69CB9B4B3h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800BA8 second address: 4800BDB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CE9FC69h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor dword ptr [esp], 613B6156h 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FC69CE9FC5Dh 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800BDB second address: 4800BEB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC69CB9B4ACh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800C49 second address: 4800C4F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800C4F second address: 4800C53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800C53 second address: 4800C82 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test al, al 0x0000000a jmp 00007FC69CE9FC66h 0x0000000f je 00007FC70F713968h 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 push edi 0x00000019 pop eax 0x0000001a movsx edi, cx 0x0000001d popad 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800C82 second address: 4800C88 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800C88 second address: 4800CBC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CE9FC5Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b cmp dword ptr [ebp+08h], 00002000h 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 call 00007FC69CE9FC63h 0x0000001a pop ecx 0x0000001b push edi 0x0000001c pop ecx 0x0000001d popad 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4800CBC second address: 4800CC3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 48109F9 second address: 4810A11 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC69CE9FC64h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810A11 second address: 4810A21 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810A21 second address: 4810A26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810A26 second address: 4810A2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810A2C second address: 4810A30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810A30 second address: 4810A41 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810A41 second address: 4810A45 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810A45 second address: 4810A4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810A4B second address: 4810AA5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CE9FC5Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FC69CE9FC5Dh 0x00000012 sub esi, 252D6DE6h 0x00000018 jmp 00007FC69CE9FC61h 0x0000001d popfd 0x0000001e popad 0x0000001f xchg eax, esi 0x00000020 jmp 00007FC69CE9FC5Eh 0x00000025 push eax 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007FC69CE9FC5Eh 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810AA5 second address: 4810B12 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4ABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a pushad 0x0000000b mov bh, al 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007FC69CB9B4B7h 0x00000014 add si, F32Eh 0x00000019 jmp 00007FC69CB9B4B9h 0x0000001e popfd 0x0000001f mov edi, ecx 0x00000021 popad 0x00000022 popad 0x00000023 mov esi, dword ptr [ebp+0Ch] 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007FC69CB9B4B9h 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810B12 second address: 4810B6A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov al, dh 0x00000005 mov di, ax 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b test esi, esi 0x0000000d jmp 00007FC69CE9FC62h 0x00000012 je 00007FC70F70D4DCh 0x00000018 pushad 0x00000019 jmp 00007FC69CE9FC5Eh 0x0000001e mov edx, eax 0x00000020 popad 0x00000021 cmp dword ptr [770E459Ch], 05h 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007FC69CE9FC66h 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810B6A second address: 4810B6E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810B6E second address: 4810B74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810B74 second address: 4810BCA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FC69CB9B4B3h 0x00000009 adc ah, 0000000Eh 0x0000000c jmp 00007FC69CB9B4B9h 0x00000011 popfd 0x00000012 popad 0x00000013 pop edx 0x00000014 pop eax 0x00000015 je 00007FC70F420D92h 0x0000001b jmp 00007FC69CB9B4AEh 0x00000020 xchg eax, esi 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 mov si, bx 0x00000027 movsx ebx, si 0x0000002a popad 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810BCA second address: 4810BDC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC69CE9FC5Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810BDC second address: 4810BE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810C3E second address: 4810C4E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC69CE9FC5Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810C4E second address: 4810C66 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC69CB9B4ABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\zLP3oiwG1g.exe | RDTSC instruction interceptor: First address: 4810C66 second address: 4810C6C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |