Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DCE1A6 second address: DCE1AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DCE1AC second address: DCE1B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DCE1B4 second address: DCE1CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 js 00007FC1D4CF3C2Ah 0x0000000b push edx 0x0000000c pop edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f jng 00007FC1D4CF3C2Ch 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DDE4AE second address: DDE4BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 je 00007FC1D4F13866h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DDE723 second address: DDE729 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DDE729 second address: DDE72E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DDE72E second address: DDE742 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC1D4CF3C2Ah 0x00000009 jns 00007FC1D4CF3C26h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DDEB26 second address: DDEB31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FC1D4F13866h 0x0000000a pop esi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DDEB31 second address: DDEB38 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DDECBB second address: DDECDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC1D4F1386Dh 0x00000009 jmp 00007FC1D4F13871h 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DDECDE second address: DDECE3 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DE1527 second address: DE1559 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 jnp 00007FC1D4F13870h 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FC1D4F13873h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DE169B second address: DE169F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DE169F second address: DE16A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DE175B second address: DE1761 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DE1761 second address: DE1771 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jg 00007FC1D4F13866h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DE1771 second address: DE17D4 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FC1D4CF3C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FC1D4CF3C2Bh 0x0000000f popad 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 jmp 00007FC1D4CF3C2Dh 0x00000019 mov eax, dword ptr [eax] 0x0000001b jmp 00007FC1D4CF3C2Fh 0x00000020 mov dword ptr [esp+04h], eax 0x00000024 jnc 00007FC1D4CF3C32h 0x0000002a pop eax 0x0000002b movzx ecx, cx 0x0000002e lea ebx, dword ptr [ebp+12BA9264h] 0x00000034 add dword ptr [ebp+12A23580h], eax 0x0000003a push eax 0x0000003b push eax 0x0000003c pushad 0x0000003d push eax 0x0000003e push edx 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E02BB1 second address: E02BB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E00AEF second address: E00B12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jmp 00007FC1D4CF3C38h 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e push edi 0x0000000f pop edi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E010E2 second address: E010E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E010E6 second address: E01112 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jp 00007FC1D4CF3C26h 0x0000000d pop ebx 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FC1D4CF3C37h 0x00000016 push edi 0x00000017 push edx 0x00000018 pop edx 0x00000019 pop edi 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E01239 second address: E0123D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E0123D second address: E01253 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FC1D4CF3C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jl 00007FC1D4CF3C2Ch 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E01A3B second address: E01A41 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E01A41 second address: E01A4C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007FC1D4CF3C26h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E025BF second address: E025DE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13879h 0x00000007 push eax 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E02739 second address: E02772 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C33h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edi 0x0000000c push edx 0x0000000d pop edx 0x0000000e jl 00007FC1D4CF3C26h 0x00000014 pop edi 0x00000015 jmp 00007FC1D4CF3C36h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E02772 second address: E02789 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FC1D4F1386Eh 0x0000000a pop edi 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E029EE second address: E029F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E029F2 second address: E02A02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jng 00007FC1D4F13866h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E02A02 second address: E02A1E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FC1D4CF3C34h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E02A1E second address: E02A33 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13871h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E02A33 second address: E02A51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FC1D4CF3C36h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E06F1B second address: E06F1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E06F1F second address: E06F23 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E06F23 second address: E06F3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 pushad 0x00000009 ja 00007FC1D4F13868h 0x0000000f push eax 0x00000010 push edx 0x00000011 je 00007FC1D4F13866h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E07078 second address: E0707C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E0707C second address: E07082 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E07082 second address: E070D0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C2Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d jmp 00007FC1D4CF3C37h 0x00000012 mov eax, dword ptr [eax] 0x00000014 jp 00007FC1D4CF3C32h 0x0000001a mov dword ptr [esp+04h], eax 0x0000001e push eax 0x0000001f push edx 0x00000020 push edx 0x00000021 js 00007FC1D4CF3C26h 0x00000027 pop edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E07324 second address: E07328 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E092E8 second address: E092ED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DCAB8B second address: DCAB8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DCAB8F second address: DCAB93 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E0DCB2 second address: E0DCB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E11067 second address: E1106D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1106D second address: E110AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jg 00007FC1D4F1386Ch 0x0000000b popad 0x0000000c mov eax, dword ptr [eax] 0x0000000e jmp 00007FC1D4F13876h 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FC1D4F13872h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E110AF second address: E110B4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E116C6 second address: E116CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E11C14 second address: E11C1D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E11CD6 second address: E11D31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 xchg eax, ebx 0x00000006 push 00000000h 0x00000008 push eax 0x00000009 call 00007FC1D4F13868h 0x0000000e pop eax 0x0000000f mov dword ptr [esp+04h], eax 0x00000013 add dword ptr [esp+04h], 00000015h 0x0000001b inc eax 0x0000001c push eax 0x0000001d ret 0x0000001e pop eax 0x0000001f ret 0x00000020 jmp 00007FC1D4F13874h 0x00000025 nop 0x00000026 pushad 0x00000027 push edi 0x00000028 pushad 0x00000029 popad 0x0000002a pop edi 0x0000002b jmp 00007FC1D4F13873h 0x00000030 popad 0x00000031 push eax 0x00000032 push edi 0x00000033 push eax 0x00000034 push edx 0x00000035 jc 00007FC1D4F13866h 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E11E85 second address: E11E8A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E11F58 second address: E11F6D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F1386Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E12062 second address: E12066 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E12066 second address: E1206A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1206A second address: E12070 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E12070 second address: E12075 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E12184 second address: E12188 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E12188 second address: E1218E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1223E second address: E12242 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1228D second address: E122F1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13879h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push ebx 0x0000000f call 00007FC1D4F13868h 0x00000014 pop ebx 0x00000015 mov dword ptr [esp+04h], ebx 0x00000019 add dword ptr [esp+04h], 0000001Bh 0x00000021 inc ebx 0x00000022 push ebx 0x00000023 ret 0x00000024 pop ebx 0x00000025 ret 0x00000026 mov edi, 28F05F9Eh 0x0000002b mov edi, edx 0x0000002d xchg eax, ebx 0x0000002e jmp 00007FC1D4F13873h 0x00000033 push eax 0x00000034 pushad 0x00000035 push eax 0x00000036 push edx 0x00000037 push edi 0x00000038 pop edi 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DC25BC second address: DC25C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FC1D4CF3C26h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DC25C8 second address: DC25D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DC25D2 second address: DC25D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DC25D8 second address: DC2602 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FC1D4F13876h 0x0000000b popad 0x0000000c jmp 00007FC1D4F1386Dh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E15787 second address: E15791 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FC1D4CF3C2Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E15E99 second address: E15E9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1BFEE second address: E1BFF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1BFF2 second address: E1BFF6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1BFF6 second address: E1BFFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1BFFC second address: E1C001 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1C001 second address: E1C072 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c pushad 0x0000000d pushad 0x0000000e jg 00007FC1D4CF3C26h 0x00000014 mov dx, AB5Fh 0x00000018 popad 0x00000019 sub dword ptr [ebp+12A21A82h], ecx 0x0000001f popad 0x00000020 jc 00007FC1D4CF3C32h 0x00000026 jnc 00007FC1D4CF3C2Ch 0x0000002c push 00000000h 0x0000002e mov dword ptr [ebp+12A234E6h], ebx 0x00000034 push 00000000h 0x00000036 sbb si, C84Bh 0x0000003b xchg eax, ebx 0x0000003c jmp 00007FC1D4CF3C2Eh 0x00000041 push eax 0x00000042 pushad 0x00000043 jmp 00007FC1D4CF3C37h 0x00000048 push eax 0x00000049 push edx 0x0000004a jne 00007FC1D4CF3C26h 0x00000050 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1CB0A second address: E1CB1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 pushad 0x00000009 jg 00007FC1D4F13866h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1CB1B second address: E1CB24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1C8E1 second address: E1C8EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1CB24 second address: E1CB28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1C8EC second address: E1C8F5 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1E5D3 second address: E1E5D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1D411 second address: E1D417 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1D417 second address: E1D41C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1EDBF second address: E1EDED instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13879h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FC1D4F1386Fh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E20E7C second address: E20E80 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1EDED second address: E1EDF1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E20E80 second address: E20E96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FC1D4CF3C2Dh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E233B3 second address: E233C0 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FC1D4F13866h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E233C0 second address: E233FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC1D4CF3C35h 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jns 00007FC1D4CF3C3Fh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E24509 second address: E2452A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 jmp 00007FC1D4F13879h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E23607 second address: E23618 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jc 00007FC1D4CF3C26h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E2452A second address: E245C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push ebp 0x0000000a call 00007FC1D4F13868h 0x0000000f pop ebp 0x00000010 mov dword ptr [esp+04h], ebp 0x00000014 add dword ptr [esp+04h], 0000001Ch 0x0000001c inc ebp 0x0000001d push ebp 0x0000001e ret 0x0000001f pop ebp 0x00000020 ret 0x00000021 mov bh, ah 0x00000023 push 00000000h 0x00000025 push 00000000h 0x00000027 push esi 0x00000028 call 00007FC1D4F13868h 0x0000002d pop esi 0x0000002e mov dword ptr [esp+04h], esi 0x00000032 add dword ptr [esp+04h], 00000018h 0x0000003a inc esi 0x0000003b push esi 0x0000003c ret 0x0000003d pop esi 0x0000003e ret 0x0000003f push 00000000h 0x00000041 pushad 0x00000042 mov dword ptr [ebp+12BD00ABh], edx 0x00000048 mov edx, dword ptr [ebp+12A22A3Bh] 0x0000004e popad 0x0000004f jmp 00007FC1D4F13879h 0x00000054 push eax 0x00000055 pushad 0x00000056 jnl 00007FC1D4F1387Dh 0x0000005c pushad 0x0000005d pushad 0x0000005e popad 0x0000005f push eax 0x00000060 push edx 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E23618 second address: E2361C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E246DB second address: E246DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E2361C second address: E23622 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E256E0 second address: E256E9 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E256E9 second address: E25732 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 mov dword ptr [esp], eax 0x0000000b mov bx, 4400h 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push ebp 0x00000014 call 00007FC1D4CF3C28h 0x00000019 pop ebp 0x0000001a mov dword ptr [esp+04h], ebp 0x0000001e add dword ptr [esp+04h], 00000016h 0x00000026 inc ebp 0x00000027 push ebp 0x00000028 ret 0x00000029 pop ebp 0x0000002a ret 0x0000002b push 00000000h 0x0000002d jnp 00007FC1D4CF3C29h 0x00000033 mov bx, di 0x00000036 jmp 00007FC1D4CF3C2Ah 0x0000003b push eax 0x0000003c push esi 0x0000003d pushad 0x0000003e push eax 0x0000003f push edx 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E26654 second address: E2665A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E2665A second address: E26666 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ecx 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E26666 second address: E2666A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E2666A second address: E2668D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C2Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FC1D4CF3C2Eh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E275ED second address: E275F2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E275F2 second address: E275F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E28606 second address: E2860A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E2860A second address: E28639 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C30h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FC1D4CF3C34h 0x0000000e popad 0x0000000f push eax 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 push edx 0x00000014 pop edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E29699 second address: E296A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop esi 0x00000008 push eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E296A6 second address: E29754 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jnl 00007FC1D4CF3C2Ch 0x0000000b popad 0x0000000c nop 0x0000000d mov edi, ebx 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push ebx 0x00000014 call 00007FC1D4CF3C28h 0x00000019 pop ebx 0x0000001a mov dword ptr [esp+04h], ebx 0x0000001e add dword ptr [esp+04h], 0000001Dh 0x00000026 inc ebx 0x00000027 push ebx 0x00000028 ret 0x00000029 pop ebx 0x0000002a ret 0x0000002b push ebx 0x0000002c jng 00007FC1D4CF3C2Ch 0x00000032 sub dword ptr [ebp+12BCBF86h], eax 0x00000038 pop edi 0x00000039 push 00000000h 0x0000003b push 00000000h 0x0000003d push edx 0x0000003e call 00007FC1D4CF3C28h 0x00000043 pop edx 0x00000044 mov dword ptr [esp+04h], edx 0x00000048 add dword ptr [esp+04h], 0000001Bh 0x00000050 inc edx 0x00000051 push edx 0x00000052 ret 0x00000053 pop edx 0x00000054 ret 0x00000055 jmp 00007FC1D4CF3C30h 0x0000005a xor ebx, dword ptr [ebp+12A22A27h] 0x00000060 xchg eax, esi 0x00000061 jmp 00007FC1D4CF3C2Fh 0x00000066 push eax 0x00000067 jns 00007FC1D4CF3C4Bh 0x0000006d push eax 0x0000006e push edx 0x0000006f jmp 00007FC1D4CF3C30h 0x00000074 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E2B804 second address: E2B823 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FC1D4F13876h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E298E6 second address: E298EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E299A0 second address: E299AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E299AC second address: E299B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E299B0 second address: E299B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E299B4 second address: E299BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E299BA second address: E299C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E299C0 second address: E299C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E2F966 second address: E2F972 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E2FB25 second address: E2FB33 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C2Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E341A1 second address: E341C0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F1386Fh 0x00000007 je 00007FC1D4F13872h 0x0000000d jnc 00007FC1D4F13866h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E3B5F8 second address: E3B604 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FC1D4CF3C26h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E3B604 second address: E3B609 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E3B609 second address: E3B60F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E3B60F second address: E3B615 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E3B615 second address: E3B619 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E3AF49 second address: E3AF50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E3AF50 second address: E3AF60 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC1D4CF3C2Bh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E3B0F6 second address: E3B102 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FC1D4F13866h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E3B23D second address: E3B24E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b jbe 00007FC1D4CF3C26h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E40AD8 second address: E40AEA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FC1D4F1386Ah 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E40C93 second address: E40C99 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E40C99 second address: E40CAE instructions: 0x00000000 rdtsc 0x00000002 jc 00007FC1D4F13868h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E40CAE second address: E40CB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E4598E second address: E45993 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E44690 second address: E44695 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E44695 second address: E4469B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E44E17 second address: E44E1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E45227 second address: E4522D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E4539D second address: E453B5 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007FC1D4CF3C2Dh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E453B5 second address: E453D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FC1D4F13866h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FC1D4F13873h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E453D5 second address: E4540F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C34h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pushad 0x0000000b jbe 00007FC1D4CF3C2Ch 0x00000011 jmp 00007FC1D4CF3C2Ch 0x00000016 push eax 0x00000017 push edx 0x00000018 jl 00007FC1D4CF3C26h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E45586 second address: E4558A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E4558A second address: E4558E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E4558E second address: E4559A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E4B1E7 second address: E4B1FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC1D4CF3C30h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E4B1FB second address: E4B1FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E4B1FF second address: E4B21E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC1D4CF3C39h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DD33C4 second address: DD33D7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F1386Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E49E45 second address: E49E52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 pop edi 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E49E52 second address: E49E58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E49E58 second address: E49E5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E4A540 second address: E4A544 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E4A544 second address: E4A55B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 jmp 00007FC1D4CF3C2Eh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E4A55B second address: E4A563 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E4A975 second address: E4A979 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E4A979 second address: E4A98F instructions: 0x00000000 rdtsc 0x00000002 jng 00007FC1D4F13866h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FC1D4F1386Ch 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E4AB51 second address: E4AB57 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E51B68 second address: E51B87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 jmp 00007FC1D4F13878h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DD6B6C second address: DD6B70 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DD6B70 second address: DD6B88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC1D4F1386Ch 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e pop edi 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DD6B88 second address: DD6B8C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E50F63 second address: E50F8C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F1386Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d jmp 00007FC1D4F13874h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E50F8C second address: E50F90 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E50F90 second address: E50F96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E50F96 second address: E50FA8 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jng 00007FC1D4CF3C26h 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c je 00007FC1D4CF3C26h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E50FA8 second address: E50FCA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13870h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jc 00007FC1D4F13866h 0x00000014 push eax 0x00000015 pop eax 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E512F8 second address: E512FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E51448 second address: E5144C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E5144C second address: E5146B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC1D4CF3C39h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E5146B second address: E5148B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push edx 0x00000006 pop edx 0x00000007 popad 0x00000008 jmp 00007FC1D4F13870h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E5148B second address: E5148F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E5148F second address: E51493 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E51493 second address: E5149B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E51608 second address: E5160E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DC8F54 second address: DC8F5F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jc 00007FC1D4CF3C26h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DC8F5F second address: DC8F6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FC1D4F13866h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DC8F6E second address: DC8F72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DC8F72 second address: DC8F8E instructions: 0x00000000 rdtsc 0x00000002 jng 00007FC1D4F13866h 0x00000008 js 00007FC1D4F13866h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jc 00007FC1D4F1386Eh 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DC8F8E second address: DC8F94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E57BA1 second address: E57BA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E57BA7 second address: E57BB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E0F85E second address: E0F87E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13878h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push esi 0x0000000c pop esi 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E0F990 second address: E0FA4C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C35h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], ebx 0x0000000c mov dh, 0Eh 0x0000000e push dword ptr fs:[00000000h] 0x00000015 push 00000000h 0x00000017 push edx 0x00000018 call 00007FC1D4CF3C28h 0x0000001d pop edx 0x0000001e mov dword ptr [esp+04h], edx 0x00000022 add dword ptr [esp+04h], 00000018h 0x0000002a inc edx 0x0000002b push edx 0x0000002c ret 0x0000002d pop edx 0x0000002e ret 0x0000002f mov di, 660Ah 0x00000033 mov dword ptr fs:[00000000h], esp 0x0000003a push 00000000h 0x0000003c push edx 0x0000003d call 00007FC1D4CF3C28h 0x00000042 pop edx 0x00000043 mov dword ptr [esp+04h], edx 0x00000047 add dword ptr [esp+04h], 00000015h 0x0000004f inc edx 0x00000050 push edx 0x00000051 ret 0x00000052 pop edx 0x00000053 ret 0x00000054 mov dword ptr [ebp+12A235FEh], eax 0x0000005a mov dword ptr [ebp+12BD7664h], esp 0x00000060 mov ecx, dword ptr [ebp+12A22AB7h] 0x00000066 cmp dword ptr [ebp+12A22B5Bh], 00000000h 0x0000006d jne 00007FC1D4CF3D08h 0x00000073 or dword ptr [ebp+12A2357Ah], eax 0x00000079 mov dword ptr [ebp+12A239EFh], esi 0x0000007f mov byte ptr [ebp+12A21A91h], 00000047h 0x00000086 mov edx, edi 0x00000088 mov eax, D49AA7D2h 0x0000008d sbb dx, 7510h 0x00000092 nop 0x00000093 push eax 0x00000094 push edx 0x00000095 push edi 0x00000096 jmp 00007FC1D4CF3C2Ch 0x0000009b pop edi 0x0000009c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E0FA4C second address: E0FA52 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E0FE9C second address: E0FEA1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E0FEA1 second address: E0FEA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E0FEA7 second address: E0FED2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push ecx 0x00000009 jmp 00007FC1D4CF3C37h 0x0000000e pop ecx 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 push edx 0x00000018 pop edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E0FED2 second address: E0FEDC instructions: 0x00000000 rdtsc 0x00000002 je 00007FC1D4F13866h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E0FEDC second address: E0FEE2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E10381 second address: E10385 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E10385 second address: E10392 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E10392 second address: E10412 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13878h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a nop 0x0000000b and ecx, 3FBB1695h 0x00000011 push 00000004h 0x00000013 push 00000000h 0x00000015 push esi 0x00000016 call 00007FC1D4F13868h 0x0000001b pop esi 0x0000001c mov dword ptr [esp+04h], esi 0x00000020 add dword ptr [esp+04h], 00000014h 0x00000028 inc esi 0x00000029 push esi 0x0000002a ret 0x0000002b pop esi 0x0000002c ret 0x0000002d movsx edx, si 0x00000030 push eax 0x00000031 pushad 0x00000032 jo 00007FC1D4F1387Dh 0x00000038 jmp 00007FC1D4F13877h 0x0000003d pushad 0x0000003e jmp 00007FC1D4F13879h 0x00000043 push eax 0x00000044 push edx 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E10ACA second address: E10AD8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C2Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E10C3D second address: E10C41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E10C41 second address: E10C94 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FC1D4CF3C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b call 00007FC1D4CF3C32h 0x00000010 jmp 00007FC1D4CF3C35h 0x00000015 pop edi 0x00000016 lea eax, dword ptr [ebp+12BD760Ch] 0x0000001c mov dword ptr [ebp+12A235FEh], edx 0x00000022 nop 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007FC1D4CF3C2Fh 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E10C94 second address: E10C98 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E10C98 second address: E10C9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E10C9E second address: E10CD6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007FC1D4F13866h 0x00000009 jmp 00007FC1D4F13872h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FC1D4F13876h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E10CD6 second address: E10CDA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E10CDA second address: E10CE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E5C657 second address: E5C65D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E5C65D second address: E5C663 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E5C925 second address: E5C92B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E5C92B second address: E5C930 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E5CAE3 second address: E5CAE7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E5CC23 second address: E5CC27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E5CC27 second address: E5CC2B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E5CC2B second address: E5CC4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC1D4F13874h 0x0000000b pushad 0x0000000c push eax 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E5CDCD second address: E5CDEC instructions: 0x00000000 rdtsc 0x00000002 jne 00007FC1D4CF3C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007FC1D4CF3C30h 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E5CDEC second address: E5CE0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop ebx 0x00000008 pushad 0x00000009 jno 00007FC1D4F1386Ch 0x0000000f push edi 0x00000010 ja 00007FC1D4F13866h 0x00000016 pop edi 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E5FC1C second address: E5FC20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E5FD83 second address: E5FD87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E5FD87 second address: E5FD8D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E5FEC2 second address: E5FECE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FC1D4F13866h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E62827 second address: E6282D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6282D second address: E62874 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FC1D4F13866h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnl 00007FC1D4F13882h 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FC1D4F13873h 0x00000017 jnp 00007FC1D4F13866h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6254A second address: E62550 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E62550 second address: E62559 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E62559 second address: E6255F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6255F second address: E62563 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E62563 second address: E62591 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jp 00007FC1D4CF3C2Ah 0x0000000c js 00007FC1D4CF3C28h 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FC1D4CF3C33h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E662A7 second address: E662D4 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jno 00007FC1D4F13866h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop esi 0x0000000d pushad 0x0000000e push esi 0x0000000f jmp 00007FC1D4F13875h 0x00000014 push eax 0x00000015 pop eax 0x00000016 pop esi 0x00000017 push eax 0x00000018 push edx 0x00000019 push edi 0x0000001a pop edi 0x0000001b push ecx 0x0000001c pop ecx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6AA24 second address: E6AA4B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC1D4CF3C37h 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jne 00007FC1D4CF3C26h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6AB67 second address: E6AB6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6AD1D second address: E6AD4B instructions: 0x00000000 rdtsc 0x00000002 js 00007FC1D4CF3C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FC1D4CF3C33h 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FC1D4CF3C2Fh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6AD4B second address: E6AD56 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push esi 0x00000008 push edi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6AECA second address: E6AECE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6B136 second address: E6B151 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC1D4F13872h 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6B151 second address: E6B16B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC1D4CF3C2Dh 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c je 00007FC1D4CF3C26h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E10680 second address: E1068A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FC1D4F13866h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E1068A second address: E106B2 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FC1D4CF3C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f mov dword ptr [ebp+12A234CEh], ecx 0x00000015 push 00000004h 0x00000017 adc edi, 7A7A5EA4h 0x0000001d add edx, 77A26738h 0x00000023 nop 0x00000024 push ebx 0x00000025 pushad 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6B32F second address: E6B337 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6BDEB second address: E6BDF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6BDF3 second address: E6BE0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007FC1D4F13873h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E700DB second address: E700DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E700DF second address: E700FC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13879h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6F6BF second address: E6F6E5 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jne 00007FC1D4CF3C26h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007FC1D4CF3C37h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6F6E5 second address: E6F6EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6F6EA second address: E6F6FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FC1D4CF3C2Bh 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6F869 second address: E6F86D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6F86D second address: E6F87A instructions: 0x00000000 rdtsc 0x00000002 ja 00007FC1D4CF3C26h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6F87A second address: E6F88D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC1D4F1386Eh 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6F88D second address: E6F897 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FC1D4CF3C26h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6F9F0 second address: E6F9F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6F9F6 second address: E6F9FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6F9FC second address: E6FA06 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FC1D4F1386Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6FA06 second address: E6FA1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FC1D4CF3C2Fh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6FB6E second address: E6FB74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E6FD06 second address: E6FD19 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 popad 0x0000000a pushad 0x0000000b jo 00007FC1D4CF3C26h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E726B7 second address: E726BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E726BB second address: E726CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c pushad 0x0000000d popad 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E79D28 second address: E79D44 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC1D4F13878h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E79D44 second address: E79D4A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E79D4A second address: E79D72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC1D4F1386Eh 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push esi 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FC1D4F1386Dh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E79D72 second address: E79D76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E77FF3 second address: E77FFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E77FFC second address: E78025 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jmp 00007FC1D4CF3C33h 0x0000000b popad 0x0000000c push edx 0x0000000d jmp 00007FC1D4CF3C2Ah 0x00000012 pop edx 0x00000013 push edi 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E782BE second address: E782C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E782C4 second address: E782C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E782C9 second address: E7831E instructions: 0x00000000 rdtsc 0x00000002 jo 00007FC1D4F13891h 0x00000008 jmp 00007FC1D4F13876h 0x0000000d jmp 00007FC1D4F13875h 0x00000012 push ecx 0x00000013 jmp 00007FC1D4F13870h 0x00000018 pop ecx 0x00000019 pop edx 0x0000001a pop eax 0x0000001b pushad 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FC1D4F1386Bh 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E7831E second address: E78358 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a pushad 0x0000000b popad 0x0000000c push edx 0x0000000d pop edx 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 jmp 00007FC1D4CF3C33h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E788D0 second address: E788D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E7912F second address: E79139 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FC1D4CF3C26h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E79139 second address: E7913D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E830D5 second address: E830EA instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FC1D4CF3C2Bh 0x0000000d push edi 0x0000000e pop edi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E830EA second address: E830EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E82441 second address: E82449 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E82719 second address: E8271F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E8271F second address: E82741 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 jmp 00007FC1D4CF3C38h 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E847B4 second address: E847B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E847B8 second address: E847CA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jmp 00007FC1D4CF3C2Ch 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E847CA second address: E847D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E847D0 second address: E847E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC1D4CF3C2Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E847E1 second address: E847FD instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push edx 0x0000000a jmp 00007FC1D4F13870h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E8C43F second address: E8C443 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E8C443 second address: E8C447 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E8C447 second address: E8C459 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC1D4CF3C2Ch 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E8C459 second address: E8C48F instructions: 0x00000000 rdtsc 0x00000002 js 00007FC1D4F13872h 0x00000008 jne 00007FC1D4F13866h 0x0000000e jc 00007FC1D4F13866h 0x00000014 pop edx 0x00000015 pop eax 0x00000016 pushad 0x00000017 jmp 00007FC1D4F13870h 0x0000001c jp 00007FC1D4F1386Ch 0x00000022 jne 00007FC1D4F13866h 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E8A769 second address: E8A789 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FC1D4CF3C26h 0x0000000a popad 0x0000000b jmp 00007FC1D4CF3C32h 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E8AD14 second address: E8AD1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FC1D4F13866h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E8AD1F second address: E8AD25 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E8AD25 second address: E8AD29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E8AD29 second address: E8AD35 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E8AEB1 second address: E8AEBB instructions: 0x00000000 rdtsc 0x00000002 jc 00007FC1D4F13872h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E8AEBB second address: E8AEC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E8AFFC second address: E8B006 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E8B1AE second address: E8B1BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 ja 00007FC1D4CF3C26h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E8BB85 second address: E8BBA2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnl 00007FC1D4F13866h 0x00000009 jmp 00007FC1D4F13870h 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E8BBA2 second address: E8BBAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E8A1FA second address: E8A215 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jmp 00007FC1D4F13874h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E8A215 second address: E8A229 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FC1D4CF3C2Dh 0x00000008 pop eax 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E937CC second address: E937D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FC1D4F13866h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E937D6 second address: E937DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E93925 second address: E93929 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E93929 second address: E9392F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E9392F second address: E93946 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FC1D4F1386Eh 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E95488 second address: E954A2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C36h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E954A2 second address: E954AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E954AE second address: E954B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E954B2 second address: E954B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E954B6 second address: E954C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FC1D4CF3C26h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E954C2 second address: E954C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E954C7 second address: E954CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E954CF second address: E954DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 js 00007FC1D4F1386Ch 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: E954DF second address: E954F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FC1D4CF3C28h 0x0000000a push ecx 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: EA59F5 second address: EA5A3E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13874h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pushad 0x0000000b jmp 00007FC1D4F1386Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FC1D4F1386Eh 0x00000017 jmp 00007FC1D4F13873h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: EA55CD second address: EA5603 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FC1D4CF3C26h 0x0000000a jmp 00007FC1D4CF3C34h 0x0000000f popad 0x00000010 jmp 00007FC1D4CF3C37h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: EAE844 second address: EAE84E instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FC1D4F13866h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: EB4D98 second address: EB4D9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: EB4D9E second address: EB4DA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: EB8B4E second address: EB8B52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DDA182 second address: DDA196 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FC1D4F13868h 0x00000008 push edx 0x00000009 push eax 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: DDA196 second address: DDA19C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: EC2982 second address: EC2992 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 js 00007FC1D4F1386Ch 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: EC118B second address: EC1190 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: EC1190 second address: EC1196 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: EC1196 second address: EC123E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC1D4CF3C32h 0x00000009 popad 0x0000000a jmp 00007FC1D4CF3C2Fh 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pushad 0x00000012 jbe 00007FC1D4CF3C32h 0x00000018 jmp 00007FC1D4CF3C2Ch 0x0000001d pushad 0x0000001e jmp 00007FC1D4CF3C36h 0x00000023 jmp 00007FC1D4CF3C39h 0x00000028 push ecx 0x00000029 pop ecx 0x0000002a popad 0x0000002b pushad 0x0000002c jmp 00007FC1D4CF3C38h 0x00000031 pushad 0x00000032 popad 0x00000033 push esi 0x00000034 pop esi 0x00000035 popad 0x00000036 push eax 0x00000037 push edx 0x00000038 jo 00007FC1D4CF3C26h 0x0000003e jmp 00007FC1D4CF3C34h 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: EC14F4 second address: EC14FA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: EC1AA0 second address: EC1ABE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FC1D4CF3C26h 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 jmp 00007FC1D4CF3C2Ch 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: EC1ABE second address: EC1AC4 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: EC1AC4 second address: EC1ACA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: EC1C3F second address: EC1C51 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC1D4F1386Ch 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: EFDAAA second address: EFDAB0 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: F124ED second address: F124F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: F124F1 second address: F1254D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C2Ch 0x00000007 jmp 00007FC1D4CF3C2Ah 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push esi 0x0000000f jmp 00007FC1D4CF3C2Fh 0x00000014 ja 00007FC1D4CF3C26h 0x0000001a pop esi 0x0000001b push eax 0x0000001c push edx 0x0000001d jnc 00007FC1D4CF3C2Ch 0x00000023 jno 00007FC1D4CF3C3Dh 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: F1234F second address: F12366 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC1D4F13873h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: F12366 second address: F1236A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: F14082 second address: F140A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC1D4F13879h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e push edi 0x0000000f pop edi 0x00000010 pop edi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: F140A7 second address: F140AC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: F140AC second address: F140C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jp 00007FC1D4F13866h 0x0000000c jns 00007FC1D4F13866h 0x00000012 popad 0x00000013 push eax 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: F167ED second address: F167F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: F167F4 second address: F167FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FD86F9 second address: FD8728 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C38h 0x00000007 jmp 00007FC1D4CF3C2Fh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FD8728 second address: FD872C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FDC000 second address: FDC00A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FC1D4CF3C26h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FDC00A second address: FDC00E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FDC2FD second address: FDC324 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C2Dh 0x00000007 jng 00007FC1D4CF3C2Ch 0x0000000d jg 00007FC1D4CF3C26h 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push esi 0x00000016 pushad 0x00000017 jp 00007FC1D4CF3C26h 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FDC8A2 second address: FDC8A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FDC8A7 second address: FDC8B9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push esi 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FDCCBF second address: FDCCCC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jc 00007FC1D4F13866h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FDCE54 second address: FDCE60 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jng 00007FC1D4CF3C26h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FDCE60 second address: FDCEAE instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007FC1D4F13874h 0x00000008 pop esi 0x00000009 js 00007FC1D4F13877h 0x0000000f jmp 00007FC1D4F13871h 0x00000014 pop edx 0x00000015 pop eax 0x00000016 pushad 0x00000017 pushad 0x00000018 jmp 00007FC1D4F1386Bh 0x0000001d push eax 0x0000001e pop eax 0x0000001f pushad 0x00000020 popad 0x00000021 popad 0x00000022 pushad 0x00000023 push ebx 0x00000024 pop ebx 0x00000025 jne 00007FC1D4F13866h 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FE1105 second address: FE1109 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FE1109 second address: FE110F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FE118D second address: FE1193 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FE1193 second address: FE1199 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FE1199 second address: FE119D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FE1344 second address: FE134B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FE134B second address: FE1351 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FE1351 second address: FE13A4 instructions: 0x00000000 rdtsc 0x00000002 js 00007FC1D4F13866h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d pushad 0x0000000e call 00007FC1D4F1386Ch 0x00000013 mov dword ptr [ebp+12A21BC1h], ecx 0x00000019 pop eax 0x0000001a call 00007FC1D4F13877h 0x0000001f mov esi, eax 0x00000021 pop eax 0x00000022 popad 0x00000023 push 00000004h 0x00000025 mov dword ptr [ebp+12A238F0h], edi 0x0000002b push 52876480h 0x00000030 push eax 0x00000031 push edx 0x00000032 push eax 0x00000033 push edx 0x00000034 js 00007FC1D4F13866h 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FE13A4 second address: FE13B2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C2Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FE13B2 second address: FE13B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FE15E1 second address: FE1601 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C2Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FC1D4CF3C2Dh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FE1601 second address: FE1646 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F1386Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a mov dx, C493h 0x0000000e push dword ptr [ebp+12BB9EB8h] 0x00000014 pushad 0x00000015 mov ecx, dword ptr [ebp+12A233C8h] 0x0000001b mov dword ptr [ebp+12BA7768h], ebx 0x00000021 popad 0x00000022 call 00007FC1D4F13869h 0x00000027 jne 00007FC1D4F1386Ch 0x0000002d pushad 0x0000002e pushad 0x0000002f popad 0x00000030 push esi 0x00000031 pop esi 0x00000032 popad 0x00000033 push eax 0x00000034 push eax 0x00000035 push edx 0x00000036 push ecx 0x00000037 pushad 0x00000038 popad 0x00000039 pop ecx 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FE1646 second address: FE1664 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FC1D4CF3C2Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e pushad 0x0000000f pushad 0x00000010 jl 00007FC1D4CF3C26h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: FE4A6B second address: FE4A6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170039 second address: 71700B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], ebp 0x0000000c jmp 00007FC1D4CF3C2Eh 0x00000011 mov ebp, esp 0x00000013 jmp 00007FC1D4CF3C30h 0x00000018 mov eax, dword ptr fs:[00000030h] 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 pushad 0x00000022 popad 0x00000023 pushfd 0x00000024 jmp 00007FC1D4CF3C33h 0x00000029 or esi, 1C285D5Eh 0x0000002f jmp 00007FC1D4CF3C39h 0x00000034 popfd 0x00000035 popad 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71700B9 second address: 71700BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71700BF second address: 71700C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71700C3 second address: 7170159 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13873h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b sub esp, 18h 0x0000000e jmp 00007FC1D4F13876h 0x00000013 xchg eax, ebx 0x00000014 pushad 0x00000015 mov ebx, esi 0x00000017 popad 0x00000018 push eax 0x00000019 pushad 0x0000001a pushfd 0x0000001b jmp 00007FC1D4F13874h 0x00000020 jmp 00007FC1D4F13875h 0x00000025 popfd 0x00000026 movzx ecx, bx 0x00000029 popad 0x0000002a xchg eax, ebx 0x0000002b push eax 0x0000002c push edx 0x0000002d pushad 0x0000002e pushfd 0x0000002f jmp 00007FC1D4F13874h 0x00000034 sbb eax, 0EA4DFA8h 0x0000003a jmp 00007FC1D4F1386Bh 0x0000003f popfd 0x00000040 push ecx 0x00000041 pop edx 0x00000042 popad 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170159 second address: 717015F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717015F second address: 7170163 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170163 second address: 7170167 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170167 second address: 71701C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebx, dword ptr [eax+10h] 0x0000000b jmp 00007FC1D4F13873h 0x00000010 xchg eax, esi 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov edi, 2DA07276h 0x00000019 pushfd 0x0000001a jmp 00007FC1D4F13877h 0x0000001f adc cx, F2FEh 0x00000024 jmp 00007FC1D4F13879h 0x00000029 popfd 0x0000002a popad 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71701C6 second address: 71701CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71701CC second address: 71701EE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13873h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov ch, 06h 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71701EE second address: 717022A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, eax 0x00000005 pushfd 0x00000006 jmp 00007FC1D4CF3C34h 0x0000000b sub eax, 5501FB88h 0x00000011 jmp 00007FC1D4CF3C2Bh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a xchg eax, esi 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e mov ebx, 35A157F6h 0x00000023 movsx edx, si 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717022A second address: 7170230 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170230 second address: 7170234 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170234 second address: 7170238 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170238 second address: 7170252 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esi, dword ptr [74E806ECh] 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FC1D4CF3C2Ah 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170252 second address: 7170258 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170258 second address: 717025C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717025C second address: 7170260 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170260 second address: 7170280 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test esi, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FC1D4CF3C34h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170280 second address: 71702A6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F1386Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007FC1D4F1477Ah 0x0000000f pushad 0x00000010 pushad 0x00000011 mov di, cx 0x00000014 popad 0x00000015 mov ax, dx 0x00000018 popad 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d mov ecx, edx 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71702A6 second address: 71702BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC1D4CF3C34h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71702BE second address: 71702D8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F1386Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], edi 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71702D8 second address: 71702DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71702DC second address: 71702F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13877h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71702F7 second address: 7170325 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 call dword ptr [74E50B60h] 0x0000000f mov eax, 750BE5E0h 0x00000014 ret 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 mov ax, bx 0x0000001b mov di, 3F1Ah 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170325 second address: 71703EB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13870h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push 00000044h 0x0000000b jmp 00007FC1D4F13870h 0x00000010 pop edi 0x00000011 jmp 00007FC1D4F13870h 0x00000016 xchg eax, edi 0x00000017 jmp 00007FC1D4F13870h 0x0000001c push eax 0x0000001d pushad 0x0000001e pushfd 0x0000001f jmp 00007FC1D4F1386Dh 0x00000024 and ah, 00000056h 0x00000027 jmp 00007FC1D4F13871h 0x0000002c popfd 0x0000002d popad 0x0000002e xchg eax, edi 0x0000002f pushad 0x00000030 jmp 00007FC1D4F1386Ch 0x00000035 pushfd 0x00000036 jmp 00007FC1D4F13872h 0x0000003b xor ecx, 687E85A8h 0x00000041 jmp 00007FC1D4F1386Bh 0x00000046 popfd 0x00000047 popad 0x00000048 push dword ptr [eax] 0x0000004a jmp 00007FC1D4F13876h 0x0000004f mov eax, dword ptr fs:[00000030h] 0x00000055 push eax 0x00000056 push edx 0x00000057 push eax 0x00000058 push edx 0x00000059 push eax 0x0000005a push edx 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71703EB second address: 71703EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71703EF second address: 71703F5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170451 second address: 7170457 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170538 second address: 7170566 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushfd 0x00000007 jmp 00007FC1D4F1386Eh 0x0000000c adc cl, FFFFFF98h 0x0000000f jmp 00007FC1D4F1386Bh 0x00000014 popfd 0x00000015 popad 0x00000016 mov dword ptr [esi+10h], eax 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170566 second address: 717056A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717056A second address: 7170585 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13877h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170585 second address: 717059D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC1D4CF3C34h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717059D second address: 71705BE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [ebx+50h] 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FC1D4F13873h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71705BE second address: 717061C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 call 00007FC1D4CF3C36h 0x0000000b pushfd 0x0000000c jmp 00007FC1D4CF3C32h 0x00000011 add ecx, 20D84A18h 0x00000017 jmp 00007FC1D4CF3C2Bh 0x0000001c popfd 0x0000001d pop esi 0x0000001e popad 0x0000001f mov dword ptr [esi+14h], eax 0x00000022 jmp 00007FC1D4CF3C2Fh 0x00000027 mov eax, dword ptr [ebx+54h] 0x0000002a push eax 0x0000002b push edx 0x0000002c push eax 0x0000002d push edx 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717061C second address: 7170620 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170620 second address: 717063B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C37h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717063B second address: 71706A3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13879h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+18h], eax 0x0000000c jmp 00007FC1D4F1386Eh 0x00000011 mov eax, dword ptr [ebx+58h] 0x00000014 pushad 0x00000015 jmp 00007FC1D4F1386Eh 0x0000001a mov edi, esi 0x0000001c popad 0x0000001d mov dword ptr [esi+1Ch], eax 0x00000020 jmp 00007FC1D4F1386Ch 0x00000025 mov eax, dword ptr [ebx+5Ch] 0x00000028 pushad 0x00000029 mov edx, eax 0x0000002b mov di, si 0x0000002e popad 0x0000002f mov dword ptr [esi+20h], eax 0x00000032 push eax 0x00000033 push edx 0x00000034 pushad 0x00000035 mov dh, 13h 0x00000037 mov di, ax 0x0000003a popad 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71706A3 second address: 71706C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dl, 3Dh 0x00000005 call 00007FC1D4CF3C2Eh 0x0000000a pop eax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov eax, dword ptr [ebx+60h] 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov cx, 1879h 0x00000018 push ecx 0x00000019 pop ebx 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71706C7 second address: 71706DD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC1D4F13871h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71706DD second address: 717070F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esi+24h], eax 0x0000000a jmp 00007FC1D4CF3C2Ch 0x0000000f mov eax, dword ptr [ebx+64h] 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FC1D4CF3C37h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717070F second address: 717074E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC1D4F1386Fh 0x00000008 call 00007FC1D4F13878h 0x0000000d pop esi 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 mov dword ptr [esi+28h], eax 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FC1D4F1386Ch 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717074E second address: 7170753 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170753 second address: 71707D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007FC1D4F13877h 0x0000000a add cl, FFFFFFEEh 0x0000000d jmp 00007FC1D4F13879h 0x00000012 popfd 0x00000013 popad 0x00000014 pop edx 0x00000015 pop eax 0x00000016 mov eax, dword ptr [ebx+68h] 0x00000019 pushad 0x0000001a movzx esi, dx 0x0000001d pushfd 0x0000001e jmp 00007FC1D4F13879h 0x00000023 adc esi, 5EC1DAD6h 0x00000029 jmp 00007FC1D4F13871h 0x0000002e popfd 0x0000002f popad 0x00000030 mov dword ptr [esi+2Ch], eax 0x00000033 push eax 0x00000034 push edx 0x00000035 pushad 0x00000036 mov ax, di 0x00000039 mov bl, 93h 0x0000003b popad 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71707D5 second address: 71707E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov bl, 47h 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov ax, word ptr [ebx+6Ch] 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71707E9 second address: 71707FA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F1386Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71707FA second address: 717088A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, ebx 0x00000005 pushfd 0x00000006 jmp 00007FC1D4CF3C33h 0x0000000b and eax, 19C81A1Eh 0x00000011 jmp 00007FC1D4CF3C39h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a mov word ptr [esi+30h], ax 0x0000001e pushad 0x0000001f pushad 0x00000020 mov edi, 07D0AD2Ch 0x00000025 mov ax, di 0x00000028 popad 0x00000029 popad 0x0000002a mov ax, word ptr [ebx+00000088h] 0x00000031 jmp 00007FC1D4CF3C37h 0x00000036 mov word ptr [esi+32h], ax 0x0000003a jmp 00007FC1D4CF3C36h 0x0000003f mov eax, dword ptr [ebx+0000008Ch] 0x00000045 push eax 0x00000046 push edx 0x00000047 push eax 0x00000048 push edx 0x00000049 push eax 0x0000004a push edx 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717088A second address: 717088E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717088E second address: 7170892 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170892 second address: 7170898 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170898 second address: 71708C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C34h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esi+34h], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FC1D4CF3C2Ah 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71708C1 second address: 71708C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71708C5 second address: 71708CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71708CB second address: 71708D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71708D1 second address: 71708D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71708D5 second address: 7170950 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [ebx+18h] 0x0000000b jmp 00007FC1D4F13874h 0x00000010 mov dword ptr [esi+38h], eax 0x00000013 pushad 0x00000014 movzx esi, di 0x00000017 push edi 0x00000018 pushfd 0x00000019 jmp 00007FC1D4F13876h 0x0000001e xor esi, 3D9B63F8h 0x00000024 jmp 00007FC1D4F1386Bh 0x00000029 popfd 0x0000002a pop ecx 0x0000002b popad 0x0000002c mov eax, dword ptr [ebx+1Ch] 0x0000002f jmp 00007FC1D4F1386Fh 0x00000034 mov dword ptr [esi+3Ch], eax 0x00000037 push eax 0x00000038 push edx 0x00000039 push eax 0x0000003a push edx 0x0000003b jmp 00007FC1D4F13870h 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170950 second address: 7170954 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170954 second address: 717095A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717095A second address: 717099B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C2Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [ebx+20h] 0x0000000c jmp 00007FC1D4CF3C30h 0x00000011 mov dword ptr [esi+40h], eax 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FC1D4CF3C37h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717099B second address: 71709D4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, ebx 0x00000005 call 00007FC1D4F1386Bh 0x0000000a pop esi 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e lea eax, dword ptr [ebx+00000080h] 0x00000014 pushad 0x00000015 mov eax, edi 0x00000017 movsx ebx, si 0x0000001a popad 0x0000001b push 00000001h 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007FC1D4F13872h 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71709D4 second address: 71709D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71709D8 second address: 71709DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71709DE second address: 7170A0A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C2Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FC1D4CF3C37h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170A0A second address: 7170A10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170A10 second address: 7170AA1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d call 00007FC1D4CF3C2Fh 0x00000012 pushfd 0x00000013 jmp 00007FC1D4CF3C38h 0x00000018 and ecx, 316576F8h 0x0000001e jmp 00007FC1D4CF3C2Bh 0x00000023 popfd 0x00000024 pop esi 0x00000025 pushfd 0x00000026 jmp 00007FC1D4CF3C39h 0x0000002b add ecx, 6FCFE396h 0x00000031 jmp 00007FC1D4CF3C31h 0x00000036 popfd 0x00000037 popad 0x00000038 nop 0x00000039 push eax 0x0000003a push edx 0x0000003b jmp 00007FC1D4CF3C2Dh 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170AA1 second address: 7170AA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170AA7 second address: 7170AAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170AAB second address: 7170AAF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170AAF second address: 7170B17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 lea eax, dword ptr [ebp-10h] 0x0000000b jmp 00007FC1D4CF3C2Fh 0x00000010 nop 0x00000011 pushad 0x00000012 mov dl, ch 0x00000014 jmp 00007FC1D4CF3C31h 0x00000019 popad 0x0000001a push eax 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e movzx eax, dx 0x00000021 pushfd 0x00000022 jmp 00007FC1D4CF3C2Fh 0x00000027 xor esi, 1D39C78Eh 0x0000002d jmp 00007FC1D4CF3C39h 0x00000032 popfd 0x00000033 popad 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170B17 second address: 7170B36 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FC1D4F1386Dh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov cx, bx 0x00000014 mov ah, bh 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170B8C second address: 7170BA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC1D4CF3C37h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170BA7 second address: 7170BAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170BAB second address: 7170BF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 js 00007FC242982736h 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007FC1D4CF3C2Eh 0x00000017 add eax, 3327EEB8h 0x0000001d jmp 00007FC1D4CF3C2Bh 0x00000022 popfd 0x00000023 call 00007FC1D4CF3C38h 0x00000028 pop esi 0x00000029 popad 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170BF7 second address: 7170BFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170BFD second address: 7170C01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170C01 second address: 7170C3D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [ebp-0Ch] 0x0000000b jmp 00007FC1D4F13876h 0x00000010 mov dword ptr [esi+04h], eax 0x00000013 jmp 00007FC1D4F13870h 0x00000018 lea eax, dword ptr [ebx+78h] 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170C3D second address: 7170C47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov edx, 453E1B3Eh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170C47 second address: 7170C67 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13874h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push 00000001h 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170C67 second address: 7170C84 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C39h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170C84 second address: 7170C94 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC1D4F1386Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170C94 second address: 7170CA3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170CA3 second address: 7170CA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170CA7 second address: 7170CC0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C35h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170CC0 second address: 7170CD0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC1D4F1386Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170CD0 second address: 7170D03 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e jmp 00007FC1D4CF3C36h 0x00000013 lea eax, dword ptr [ebp-08h] 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170D03 second address: 7170D07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170D07 second address: 7170D0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170D0B second address: 7170D11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170D11 second address: 7170D30 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C34h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170D30 second address: 7170D4D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13879h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170D4D second address: 7170D53 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170D53 second address: 7170D57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170D57 second address: 7170D5B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170D5B second address: 7170D74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a mov bx, ax 0x0000000d mov ax, 7AB7h 0x00000011 popad 0x00000012 nop 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170D74 second address: 7170D78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170D78 second address: 7170D7C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170D7C second address: 7170D82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170DF3 second address: 7170EDD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13879h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test edi, edi 0x0000000b jmp 00007FC1D4F1386Eh 0x00000010 js 00007FC242BA20FFh 0x00000016 pushad 0x00000017 push esi 0x00000018 pushfd 0x00000019 jmp 00007FC1D4F1386Dh 0x0000001e or eax, 791C7F46h 0x00000024 jmp 00007FC1D4F13871h 0x00000029 popfd 0x0000002a pop ecx 0x0000002b movsx ebx, ax 0x0000002e popad 0x0000002f mov eax, dword ptr [ebp-04h] 0x00000032 jmp 00007FC1D4F13878h 0x00000037 mov dword ptr [esi+08h], eax 0x0000003a pushad 0x0000003b pushad 0x0000003c jmp 00007FC1D4F13878h 0x00000041 popad 0x00000042 mov dl, cl 0x00000044 popad 0x00000045 lea eax, dword ptr [ebx+70h] 0x00000048 jmp 00007FC1D4F1386Dh 0x0000004d push 00000001h 0x0000004f pushad 0x00000050 pushad 0x00000051 jmp 00007FC1D4F1386Ah 0x00000056 pushfd 0x00000057 jmp 00007FC1D4F13872h 0x0000005c sbb eax, 0E74E308h 0x00000062 jmp 00007FC1D4F1386Bh 0x00000067 popfd 0x00000068 popad 0x00000069 mov ebx, eax 0x0000006b popad 0x0000006c nop 0x0000006d push eax 0x0000006e push edx 0x0000006f push eax 0x00000070 push edx 0x00000071 pushad 0x00000072 popad 0x00000073 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170EDD second address: 7170EF4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C33h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170EF4 second address: 7170F81 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a mov ecx, ebx 0x0000000c pushfd 0x0000000d jmp 00007FC1D4F13873h 0x00000012 adc al, 0000005Eh 0x00000015 jmp 00007FC1D4F13879h 0x0000001a popfd 0x0000001b popad 0x0000001c nop 0x0000001d jmp 00007FC1D4F1386Eh 0x00000022 lea eax, dword ptr [ebp-18h] 0x00000025 jmp 00007FC1D4F13870h 0x0000002a nop 0x0000002b push eax 0x0000002c push edx 0x0000002d pushad 0x0000002e pushfd 0x0000002f jmp 00007FC1D4F1386Dh 0x00000034 sbb si, 10F6h 0x00000039 jmp 00007FC1D4F13871h 0x0000003e popfd 0x0000003f mov di, si 0x00000042 popad 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170FC4 second address: 7170FCA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170FCA second address: 7170FD0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170FD0 second address: 7170FD4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170FD4 second address: 7170FF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test edi, edi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FC1D4F13874h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7170FF6 second address: 7171005 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C2Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7171005 second address: 717100B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717100B second address: 717100F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717100F second address: 71710CC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F1386Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b js 00007FC242BA1EF5h 0x00000011 pushad 0x00000012 jmp 00007FC1D4F13874h 0x00000017 pushfd 0x00000018 jmp 00007FC1D4F13872h 0x0000001d and esi, 2DEBD5F8h 0x00000023 jmp 00007FC1D4F1386Bh 0x00000028 popfd 0x00000029 popad 0x0000002a mov eax, dword ptr [ebp-14h] 0x0000002d jmp 00007FC1D4F13876h 0x00000032 mov ecx, esi 0x00000034 jmp 00007FC1D4F13870h 0x00000039 mov dword ptr [esi+0Ch], eax 0x0000003c jmp 00007FC1D4F13870h 0x00000041 mov edx, 74E806ECh 0x00000046 pushad 0x00000047 mov dx, cx 0x0000004a mov ebx, eax 0x0000004c popad 0x0000004d sub eax, eax 0x0000004f jmp 00007FC1D4F13875h 0x00000054 lock cmpxchg dword ptr [edx], ecx 0x00000058 push eax 0x00000059 push edx 0x0000005a push eax 0x0000005b push edx 0x0000005c pushad 0x0000005d popad 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71710CC second address: 71710DF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C2Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71710DF second address: 7171119 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13879h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FC1D4F13878h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7171119 second address: 717111F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717111F second address: 7171125 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7171125 second address: 7171165 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C38h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b test eax, eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push edi 0x00000011 pop ecx 0x00000012 call 00007FC1D4CF3C39h 0x00000017 pop ecx 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7171165 second address: 717116B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717116B second address: 717116F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717116F second address: 7171173 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7171173 second address: 71711B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jne 00007FC242982187h 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007FC1D4CF3C32h 0x00000015 and cl, 00000028h 0x00000018 jmp 00007FC1D4CF3C2Bh 0x0000001d popfd 0x0000001e pushad 0x0000001f push eax 0x00000020 pop edx 0x00000021 popad 0x00000022 popad 0x00000023 mov edx, dword ptr [ebp+08h] 0x00000026 push eax 0x00000027 push edx 0x00000028 pushad 0x00000029 mov cx, bx 0x0000002c mov ebx, 44183288h 0x00000031 popad 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71711B8 second address: 71711BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71711BE second address: 7171227 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4CF3C38h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esi] 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007FC1D4CF3C2Eh 0x00000014 jmp 00007FC1D4CF3C35h 0x00000019 popfd 0x0000001a mov ecx, 3B6E4DC7h 0x0000001f popad 0x00000020 mov dword ptr [edx], eax 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007FC1D4CF3C39h 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7171227 second address: 7171266 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 7C95F8F2h 0x00000008 call 00007FC1D4F13873h 0x0000000d pop eax 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 mov eax, dword ptr [esi+04h] 0x00000014 jmp 00007FC1D4F1386Fh 0x00000019 mov dword ptr [edx+04h], eax 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f push ebx 0x00000020 pop esi 0x00000021 mov edx, 4DF7FA02h 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7171266 second address: 717126C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717126C second address: 71712A7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13872h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esi+08h] 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 push ebx 0x00000012 pop esi 0x00000013 call 00007FC1D4F13879h 0x00000018 pop eax 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71712A7 second address: 71712D6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC1D4CF3C2Ch 0x00000008 mov ecx, 3BE3C841h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov dword ptr [edx+08h], eax 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FC1D4CF3C33h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717141C second address: 7171454 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC1D4F13878h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [edx+14h], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FC1D4F13877h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7171454 second address: 717155F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop eax 0x00000005 push edi 0x00000006 pop ecx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esi+18h] 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007FC1D4CF3C33h 0x00000014 xor ax, 42DEh 0x00000019 jmp 00007FC1D4CF3C39h 0x0000001e popfd 0x0000001f movzx ecx, di 0x00000022 popad 0x00000023 mov dword ptr [edx+18h], eax 0x00000026 jmp 00007FC1D4CF3C33h 0x0000002b mov eax, dword ptr [esi+1Ch] 0x0000002e jmp 00007FC1D4CF3C36h 0x00000033 mov dword ptr [edx+1Ch], eax 0x00000036 jmp 00007FC1D4CF3C30h 0x0000003b mov eax, dword ptr [esi+20h] 0x0000003e pushad 0x0000003f push ecx 0x00000040 pushfd 0x00000041 jmp 00007FC1D4CF3C2Dh 0x00000046 adc eax, 4C2F13D6h 0x0000004c jmp 00007FC1D4CF3C31h 0x00000051 popfd 0x00000052 pop ecx 0x00000053 pushfd 0x00000054 jmp 00007FC1D4CF3C31h 0x00000059 xor ch, 00000036h 0x0000005c jmp 00007FC1D4CF3C31h 0x00000061 popfd 0x00000062 popad 0x00000063 mov dword ptr [edx+20h], eax 0x00000066 pushad 0x00000067 mov edi, eax 0x00000069 push eax 0x0000006a push edx 0x0000006b pushfd 0x0000006c jmp 00007FC1D4CF3C36h 0x00000071 add si, 2B88h 0x00000076 jmp 00007FC1D4CF3C2Bh 0x0000007b popfd 0x0000007c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717155F second address: 71715E6 instructions: 0x00000000 rdtsc 0x00000002 movzx eax, di 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 mov eax, dword ptr [esi+24h] 0x0000000b pushad 0x0000000c mov esi, edi 0x0000000e mov edi, 26C174D0h 0x00000013 popad 0x00000014 mov dword ptr [edx+24h], eax 0x00000017 pushad 0x00000018 mov cx, bx 0x0000001b movsx edi, cx 0x0000001e popad 0x0000001f mov eax, dword ptr [esi+28h] 0x00000022 jmp 00007FC1D4F13878h 0x00000027 mov dword ptr [edx+28h], eax 0x0000002a jmp 00007FC1D4F13870h 0x0000002f mov ecx, dword ptr [esi+2Ch] 0x00000032 push eax 0x00000033 push edx 0x00000034 pushad 0x00000035 pushfd 0x00000036 jmp 00007FC1D4F1386Dh 0x0000003b and ch, 00000066h 0x0000003e jmp 00007FC1D4F13871h 0x00000043 popfd 0x00000044 jmp 00007FC1D4F13870h 0x00000049 popad 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71715E6 second address: 717164A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FC1D4CF3C31h 0x00000009 sub esi, 5211ED76h 0x0000000f jmp 00007FC1D4CF3C31h 0x00000014 popfd 0x00000015 movzx esi, dx 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b mov dword ptr [edx+2Ch], ecx 0x0000001e jmp 00007FC1D4CF3C33h 0x00000023 mov ax, word ptr [esi+30h] 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007FC1D4CF3C35h 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717164A second address: 7171686 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FC1D4F13877h 0x00000009 add ax, 68BEh 0x0000000e jmp 00007FC1D4F13879h 0x00000013 popfd 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7171686 second address: 71716C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov word ptr [edx+30h], ax 0x0000000b jmp 00007FC1D4CF3C2Ch 0x00000010 mov ax, word ptr [esi+32h] 0x00000014 jmp 00007FC1D4CF3C30h 0x00000019 mov word ptr [edx+32h], ax 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007FC1D4CF3C2Ah 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71716C3 second address: 71716C9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71716C9 second address: 717173A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FC1D4CF3C2Ch 0x00000009 add esi, 7F74F348h 0x0000000f jmp 00007FC1D4CF3C2Bh 0x00000014 popfd 0x00000015 pushfd 0x00000016 jmp 00007FC1D4CF3C38h 0x0000001b xor eax, 100BB5A8h 0x00000021 jmp 00007FC1D4CF3C2Bh 0x00000026 popfd 0x00000027 popad 0x00000028 pop edx 0x00000029 pop eax 0x0000002a mov eax, dword ptr [esi+34h] 0x0000002d jmp 00007FC1D4CF3C36h 0x00000032 mov dword ptr [edx+34h], eax 0x00000035 push eax 0x00000036 push edx 0x00000037 pushad 0x00000038 push eax 0x00000039 push edx 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 717173A second address: 7171743 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov di, D39Eh 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7171743 second address: 7171752 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC1D4CF3C2Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7171752 second address: 7171756 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7171756 second address: 71717CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test ecx, 00000700h 0x0000000e jmp 00007FC1D4CF3C35h 0x00000013 jne 00007FC242981BC4h 0x00000019 pushad 0x0000001a mov cx, 3EF3h 0x0000001e mov ebx, ecx 0x00000020 popad 0x00000021 or dword ptr [edx+38h], FFFFFFFFh 0x00000025 jmp 00007FC1D4CF3C32h 0x0000002a or dword ptr [edx+3Ch], FFFFFFFFh 0x0000002e jmp 00007FC1D4CF3C30h 0x00000033 or dword ptr [edx+40h], FFFFFFFFh 0x00000037 push eax 0x00000038 push edx 0x00000039 jmp 00007FC1D4CF3C37h 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71C0BC3 second address: 71C0C22 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FC1D4F13872h 0x00000009 sbb cx, DBE8h 0x0000000e jmp 00007FC1D4F1386Bh 0x00000013 popfd 0x00000014 mov dx, ax 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a xchg eax, ebp 0x0000001b jmp 00007FC1D4F13872h 0x00000020 push eax 0x00000021 jmp 00007FC1D4F1386Bh 0x00000026 xchg eax, ebp 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a jmp 00007FC1D4F1386Bh 0x0000002f mov bx, ax 0x00000032 popad 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71C0C22 second address: 71C0C28 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71C0C28 second address: 71C0C2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71C0C2C second address: 71C0C4E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FC1D4CF3C36h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7100093 second address: 7100099 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7100099 second address: 710009D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71006C0 second address: 71006C6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71006C6 second address: 71006CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 71006CC second address: 710070B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 jmp 00007FC1D4F13872h 0x0000000e push eax 0x0000000f jmp 00007FC1D4F1386Bh 0x00000014 xchg eax, ebp 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FC1D4F13875h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 710070B second address: 710074F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 3F840652h 0x00000008 movsx edi, ax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov ebp, esp 0x00000010 pushad 0x00000011 pushad 0x00000012 mov ax, C54Dh 0x00000016 mov si, 6949h 0x0000001a popad 0x0000001b mov ebx, eax 0x0000001d popad 0x0000001e pop ebp 0x0000001f pushad 0x00000020 pushfd 0x00000021 jmp 00007FC1D4CF3C2Eh 0x00000026 xor ecx, 092A6F98h 0x0000002c jmp 00007FC1D4CF3C2Bh 0x00000031 popfd 0x00000032 push eax 0x00000033 push eax 0x00000034 push edx 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7100A88 second address: 7100AAE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esp 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 call 00007FC1D4F13879h 0x0000000e pop ecx 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7100AAE second address: 7100AFD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FC1D4CF3C2Ah 0x00000008 pop esi 0x00000009 movsx edi, cx 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov dword ptr [esp], ebp 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007FC1D4CF3C38h 0x00000019 and cx, D2F8h 0x0000001e jmp 00007FC1D4CF3C2Bh 0x00000023 popfd 0x00000024 mov ecx, 27B0502Fh 0x00000029 popad 0x0000002a mov ebp, esp 0x0000002c push eax 0x0000002d push edx 0x0000002e pushad 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7100AFD second address: 7100B02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7100B02 second address: 7100B63 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FC1D4CF3C2Fh 0x00000009 sbb cx, 0B6Eh 0x0000000e jmp 00007FC1D4CF3C39h 0x00000013 popfd 0x00000014 pushfd 0x00000015 jmp 00007FC1D4CF3C30h 0x0000001a adc eax, 0609FEE8h 0x00000020 jmp 00007FC1D4CF3C2Bh 0x00000025 popfd 0x00000026 popad 0x00000027 pop edx 0x00000028 pop eax 0x00000029 pop ebp 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d mov ch, bl 0x0000002f mov al, E5h 0x00000031 popad 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\4JpRlHS5uF.exe | RDTSC instruction interceptor: First address: 7100B63 second address: 7100B69 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |