Source: mG83m82qhF.exe, 00000000.00000003.1630361476.0000000005275000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000A8A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: mG83m82qhF.exe, 00000000.00000003.1426625628.00000000052B6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: mG83m82qhF.exe, 00000000.00000003.1426625628.00000000052B6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: mG83m82qhF.exe, 00000000.00000003.1630361476.0000000005275000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000A8A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: mG83m82qhF.exe, 00000000.00000003.1630361476.0000000005275000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000A8A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: mG83m82qhF.exe, 00000000.00000002.2008127945.0000000005274000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U |
Source: mG83m82qhF.exe, 00000000.00000002.2008127945.0000000005274000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000A8A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: mG83m82qhF.exe, 00000000.00000003.1426625628.00000000052B6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: mG83m82qhF.exe, 00000000.00000003.1630361476.0000000005275000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000A8A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: mG83m82qhF.exe, 00000000.00000003.1426625628.00000000052B6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: mG83m82qhF.exe, 00000000.00000003.1426625628.00000000052B6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: mG83m82qhF.exe, 00000000.00000003.1630361476.0000000005275000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000A8A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: mG83m82qhF.exe, 00000000.00000003.1630361476.0000000005275000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000A8A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: mG83m82qhF.exe, 00000000.00000003.1426625628.00000000052B6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: mG83m82qhF.exe, 00000000.00000003.1426625628.00000000052B6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: mG83m82qhF.exe, 00000000.00000002.2008684160.0000000005959000.00000002.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1609568689.0000000005279000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1609519898.00000000052B9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: mG83m82qhF.exe, 00000000.00000003.1426625628.00000000052B6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: mG83m82qhF.exe, 00000000.00000003.1630361476.0000000005275000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000A8A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0A |
Source: mG83m82qhF.exe, 00000000.00000003.1630361476.0000000005275000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000A8A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0C |
Source: mG83m82qhF.exe, 00000000.00000003.1630361476.0000000005275000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000A8A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0X |
Source: mG83m82qhF.exe, 00000000.00000002.2008127945.0000000005274000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F |
Source: mG83m82qhF.exe, 00000000.00000002.2008127945.0000000005274000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000A8A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/rootr30; |
Source: mG83m82qhF.exe, 00000000.00000003.1426625628.00000000052B6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: mG83m82qhF.exe, 00000000.00000002.2008127945.0000000005274000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A |
Source: mG83m82qhF.exe, 00000000.00000002.2008127945.0000000005274000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000A8A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06 |
Source: Amcache.hve.5.dr | String found in binary or memory: http://upx.sf.net |
Source: mG83m82qhF.exe, 00000000.00000003.1426625628.00000000052B6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: mG83m82qhF.exe, 00000000.00000003.1426625628.00000000052B6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: mG83m82qhF.exe, 00000000.00000003.1375336734.0000000005248000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1375131190.000000000524B000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1375217920.0000000005248000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: mG83m82qhF.exe, 00000000.00000003.1609775563.00000000052A4000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000AC0000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2008127945.00000000052A6000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1609568689.000000000529F000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://aui-cdn.atlassian.com/ |
Source: mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net |
Source: mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-exp.prod-east.frontend.public.atl-paas.net |
Source: mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net |
Source: mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net |
Source: mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/ |
Source: mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/; |
Source: mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/ |
Source: mG83m82qhF.exe, 00000000.00000003.1630581541.0000000000B1F000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B17000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1630535859.0000000000B17000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005907847.0000000000B20000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/ |
Source: mG83m82qhF.exe, 00000000.00000003.1630535859.0000000000B17000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B0D000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005907847.0000000000B20000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1- |
Source: mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000AC0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com:443YKJ |
Source: mG83m82qhF.exe, 00000000.00000003.1630581541.0000000000B1F000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B17000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1630535859.0000000000B17000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005907847.0000000000B20000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/ |
Source: mG83m82qhF.exe, 00000000.00000003.1630581541.0000000000B1F000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B17000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1630535859.0000000000B17000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005907847.0000000000B20000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/b= |
Source: mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000AC0000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000A93000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe |
Source: mG83m82qhF.exe, 00000000.00000002.2005363639.000000000081B000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe.0.0 |
Source: mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000A93000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe1 |
Source: mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000AC0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org:443/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe |
Source: mG83m82qhF.exe, 00000000.00000003.1428065810.000000000529F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700 |
Source: mG83m82qhF.exe, 00000000.00000003.1428065810.000000000529F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&cta |
Source: mG83m82qhF.exe, 00000000.00000003.1609775563.00000000052A4000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000AC0000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2008127945.00000000052A6000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1609568689.000000000529F000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.cookielaw.org/ |
Source: mG83m82qhF.exe, 00000000.00000003.1375336734.0000000005248000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1375131190.000000000524B000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1375217920.0000000005248000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: mG83m82qhF.exe, 00000000.00000003.1375336734.0000000005248000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1375131190.000000000524B000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1375217920.0000000005248000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: mG83m82qhF.exe, 00000000.00000003.1375336734.0000000005248000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1375131190.000000000524B000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1375217920.0000000005248000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: mG83m82qhF.exe, 00000000.00000003.1428065810.000000000529F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg |
Source: mG83m82qhF.exe, 00000000.00000003.1428065810.000000000529F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: mG83m82qhF.exe, 00000000.00000003.1556861946.0000000000B0B000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1372699843.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1427610130.0000000000B11000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1426240498.0000000000B3A000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1477221056.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1478333037.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz/ |
Source: mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000B11000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1556861946.0000000000B0B000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1630535859.0000000000B10000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz/2=C |
Source: mG83m82qhF.exe, 00000000.00000003.1452173526.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1453035473.0000000000B0F000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1453162697.0000000000B0F000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1453850480.0000000000B0F000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1453566886.0000000000B0F000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1454050433.0000000000B0F000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1452841763.0000000000B0F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz/=I |
Source: mG83m82qhF.exe, 00000000.00000003.1372699843.0000000000A93000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz/DA |
Source: mG83m82qhF.exe, 00000000.00000003.1372699843.0000000000AAB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz/I |
Source: mG83m82qhF.exe, 00000000.00000003.1426197522.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1427610130.0000000000B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz/RD |
Source: mG83m82qhF.exe, 00000000.00000003.1426197522.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1427610130.0000000000B11000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz/Use |
Source: mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000B11000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1556861946.0000000000B0B000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1630535859.0000000000B10000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1495608790.0000000000B00000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz/Win |
Source: mG83m82qhF.exe, 00000000.00000003.1452173526.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1557063908.0000000000B3A000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1556926556.0000000000AC7000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1495608790.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1426197522.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1556861946.0000000000B0B000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1372699843.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1426240498.0000000000B3A000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1477122557.0000000000B22000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1556895579.0000000000B14000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz/api |
Source: mG83m82qhF.exe, 00000000.00000003.1452173526.0000000000B32000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz/apiit |
Source: mG83m82qhF.exe, 00000000.00000003.1477221056.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1478333037.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz/apimI |
Source: mG83m82qhF.exe, 00000000.00000003.1372699843.0000000000AAB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz/apip |
Source: mG83m82qhF.exe, 00000000.00000003.1477122557.0000000000B3D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz/apite |
Source: mG83m82qhF.exe, 00000000.00000003.1452173526.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz/mI |
Source: mG83m82qhF.exe, 00000000.00000003.1452641021.0000000000B3A000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1452173526.0000000000B32000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz/ou |
Source: mG83m82qhF.exe, 00000000.00000003.1452173526.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz/pi5I |
Source: mG83m82qhF.exe, 00000000.00000003.1477221056.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1478333037.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz/piEH |
Source: mG83m82qhF.exe, 00000000.00000003.1495608790.0000000000B00000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1477221056.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1478333037.0000000000AC8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz/s |
Source: mG83m82qhF.exe, 00000000.00000003.1456773192.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1630482824.0000000000B33000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1456317993.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1427610130.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B33000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1454484117.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1455686356.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1495608790.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1454724980.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1452841763.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1454957001.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1455318191.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1454050433.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1426197522.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1455516828.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1556861946.0000000000B0B000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1454264424.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1455783102.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1452173526.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1372699843.0000000000AAB000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1453162697.0000000000B32000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz:443/api |
Source: mG83m82qhF.exe, 00000000.00000003.1556861946.0000000000B0B000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1495608790.0000000000B00000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cuddlyready.xyz:443/apiyr |
Source: mG83m82qhF.exe, 00000000.00000003.1375336734.0000000005248000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1375131190.000000000524B000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1375217920.0000000005248000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: mG83m82qhF.exe, 00000000.00000003.1375336734.0000000005248000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1375131190.000000000524B000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1375217920.0000000005248000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: mG83m82qhF.exe, 00000000.00000003.1375336734.0000000005248000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1375131190.000000000524B000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1375217920.0000000005248000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dz8aopenkvv6s.cloudfront.net |
Source: mG83m82qhF.exe, 00000000.00000003.1428065810.000000000529F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi |
Source: mG83m82qhF.exe, 00000000.00000003.1609775563.00000000052A4000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000AC0000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2008127945.00000000052A6000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1609568689.000000000529F000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.prod-east.frontend.public.atl-paas.net |
Source: mG83m82qhF.exe, 00000000.00000003.1609775563.00000000052A4000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000AC0000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2008127945.00000000052A6000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1609568689.000000000529F000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net |
Source: mG83m82qhF.exe, 00000000.00000003.1427676840.0000000005338000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: mG83m82qhF.exe, 00000000.00000003.1427676840.0000000005338000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000AC0000.00000004.00000020.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1609670228.0000000000B0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website |
Source: mG83m82qhF.exe, 00000000.00000003.1428065810.000000000529F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15e498ec2b39921665a1fbc954bff40a8106629178eadc64 |
Source: mG83m82qhF.exe, 00000000.00000003.1375336734.0000000005248000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1375131190.000000000524B000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1375217920.0000000005248000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: mG83m82qhF.exe, 00000000.00000002.2008127945.0000000005274000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000002.2005523294.0000000000A8A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: mG83m82qhF.exe, 00000000.00000003.1375336734.0000000005248000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1375131190.000000000524B000.00000004.00000800.00020000.00000000.sdmp, mG83m82qhF.exe, 00000000.00000003.1375217920.0000000005248000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: mG83m82qhF.exe, 00000000.00000003.1428065810.000000000529F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.marriott.com/default.mi?utm_source=admarketplace&utm_medium=cpc&utm_campaign=Marriott_Pr |
Source: mG83m82qhF.exe, 00000000.00000003.1427676840.0000000005338000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.d-GHL1OW1fkT |
Source: mG83m82qhF.exe, 00000000.00000003.1427676840.0000000005338000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.sYEKgG4Or0s6 |
Source: mG83m82qhF.exe, 00000000.00000003.1427676840.0000000005338000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: mG83m82qhF.exe, 00000000.00000003.1427676840.0000000005338000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: mG83m82qhF.exe, 00000000.00000003.1427676840.0000000005338000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 468663 second address: 468667 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E4228 second address: 5E4237 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F06687C5EE6h 0x0000000a push edx 0x0000000b pop edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E4237 second address: 5E4242 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jc 00007F0668FAD1F6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E4242 second address: 5E4248 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E4248 second address: 5E425B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 je 00007F0668FAD202h 0x0000000b jnp 00007F0668FAD1F6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E3850 second address: 5E3854 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E73A1 second address: 5E73C2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD207h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E73C2 second address: 5E73C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E73C8 second address: 5E73CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E73CD second address: 5E73D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E73D3 second address: 5E73D7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E75A3 second address: 5E75EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F06687C5EE6h 0x0000000a popad 0x0000000b push ecx 0x0000000c jmp 00007F06687C5EECh 0x00000011 pop ecx 0x00000012 popad 0x00000013 mov dword ptr [esp], eax 0x00000016 mov edi, edx 0x00000018 push 00000000h 0x0000001a mov dword ptr [ebp+122D27A1h], ecx 0x00000020 call 00007F06687C5EE9h 0x00000025 jno 00007F06687C5EF6h 0x0000002b push eax 0x0000002c push ebx 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E75EF second address: 5E75F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E75F3 second address: 5E767D instructions: 0x00000000 rdtsc 0x00000002 jo 00007F06687C5EE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f push eax 0x00000010 jnc 00007F06687C5EE8h 0x00000016 pop eax 0x00000017 mov eax, dword ptr [eax] 0x00000019 pushad 0x0000001a jmp 00007F06687C5EF8h 0x0000001f push esi 0x00000020 pushad 0x00000021 popad 0x00000022 pop esi 0x00000023 popad 0x00000024 mov dword ptr [esp+04h], eax 0x00000028 jmp 00007F06687C5EF7h 0x0000002d pop eax 0x0000002e cld 0x0000002f mov dword ptr [ebp+122D3338h], eax 0x00000035 push 00000003h 0x00000037 push eax 0x00000038 mov edi, dword ptr [ebp+122D2F8Ch] 0x0000003e pop edx 0x0000003f push 00000000h 0x00000041 mov dword ptr [ebp+122D20C5h], eax 0x00000047 mov ecx, 32FC6E57h 0x0000004c push 00000003h 0x0000004e or edi, dword ptr [ebp+122D2ED8h] 0x00000054 call 00007F06687C5EE9h 0x00000059 push eax 0x0000005a push edx 0x0000005b push eax 0x0000005c push edx 0x0000005d push ebx 0x0000005e pop ebx 0x0000005f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E767D second address: 5E7681 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E7681 second address: 5E7687 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E7687 second address: 5E768D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E768D second address: 5E76A5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F06687C5EEDh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E76A5 second address: 5E76BE instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jbe 00007F0668FAD1F6h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jbe 00007F0668FAD1F6h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E76BE second address: 5E76DA instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 mov eax, dword ptr [eax] 0x00000009 push esi 0x0000000a jno 00007F06687C5EE8h 0x00000010 pop esi 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E76DA second address: 5E76E8 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F0668FAD1F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E76E8 second address: 5E76EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E76EC second address: 5E7745 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD208h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pop eax 0x0000000b mov si, 3653h 0x0000000f lea ebx, dword ptr [ebp+12453262h] 0x00000015 push 00000000h 0x00000017 push ebx 0x00000018 call 00007F0668FAD1F8h 0x0000001d pop ebx 0x0000001e mov dword ptr [esp+04h], ebx 0x00000022 add dword ptr [esp+04h], 00000018h 0x0000002a inc ebx 0x0000002b push ebx 0x0000002c ret 0x0000002d pop ebx 0x0000002e ret 0x0000002f adc esi, 58932AFDh 0x00000035 xchg eax, ebx 0x00000036 push eax 0x00000037 push edx 0x00000038 push eax 0x00000039 push edx 0x0000003a jnl 00007F0668FAD1F6h 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E7745 second address: 5E7749 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E7749 second address: 5E774F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5E781A second address: 5E786B instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jns 00007F06687C5EFDh 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 jmp 00007F06687C5EF8h 0x00000017 mov eax, dword ptr [eax] 0x00000019 pushad 0x0000001a push eax 0x0000001b jbe 00007F06687C5EE6h 0x00000021 pop eax 0x00000022 pushad 0x00000023 push edx 0x00000024 pop edx 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5F8EFE second address: 5F8F08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 pushad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 607850 second address: 607876 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push ecx 0x00000006 pushad 0x00000007 popad 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop ecx 0x0000000b jmp 00007F06687C5EF7h 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 605DE3 second address: 605DE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 606790 second address: 60679F instructions: 0x00000000 rdtsc 0x00000002 jno 00007F06687C5EE6h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6068DA second address: 6068E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6068E1 second address: 6068E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6068E7 second address: 6068EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5D47AA second address: 5D47AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 606FB0 second address: 606FBB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007F0668FAD1F6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 60F175 second address: 60F17B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 60F17B second address: 60F181 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 60F181 second address: 60F199 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 jmp 00007F06687C5EF2h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5D2C4B second address: 5D2C6E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F0668FAD1F6h 0x0000000a jmp 00007F0668FAD209h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5D98F6 second address: 5D9946 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EF4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007F06687C5EEFh 0x00000010 push edi 0x00000011 jns 00007F06687C5EE6h 0x00000017 jmp 00007F06687C5EF7h 0x0000001c pop edi 0x0000001d je 00007F06687C5EEEh 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5D9946 second address: 5D9954 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 ja 00007F0668FAD1F6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 613450 second address: 613456 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6135E0 second address: 613602 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD1FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F0668FAD203h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 613743 second address: 61375C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F06687C5EF1h 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 61375C second address: 613767 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 613767 second address: 613784 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F06687C5EF9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 613A6A second address: 613A70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 613A70 second address: 613A76 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 613A76 second address: 613A7B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 613A7B second address: 613A86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 614663 second address: 614667 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 614667 second address: 614671 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 614671 second address: 61467D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6146DC second address: 614716 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop ebx 0x00000006 xor dword ptr [esp], 500E4C00h 0x0000000d mov dword ptr [ebp+122D3C45h], ebx 0x00000013 call 00007F06687C5EE9h 0x00000018 pushad 0x00000019 jmp 00007F06687C5EF2h 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 pop edx 0x00000022 popad 0x00000023 push eax 0x00000024 push eax 0x00000025 push edx 0x00000026 pushad 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 614716 second address: 61471D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 61471D second address: 61473F instructions: 0x00000000 rdtsc 0x00000002 jl 00007F06687C5EECh 0x00000008 jbe 00007F06687C5EE6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 push eax 0x00000015 push edx 0x00000016 jno 00007F06687C5EECh 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 61473F second address: 614755 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F0668FAD1FCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [eax] 0x0000000c push esi 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 614BF3 second address: 614BF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 614CF6 second address: 614CFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 614CFA second address: 614D24 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 je 00007F06687C5EF4h 0x0000000c jmp 00007F06687C5EEEh 0x00000011 popad 0x00000012 push eax 0x00000013 je 00007F06687C5EF2h 0x00000019 jnp 00007F06687C5EECh 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 614E6A second address: 614E74 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F0668FAD1F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6153CE second address: 6153D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6153D2 second address: 6153D8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 615702 second address: 615706 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 615794 second address: 6157A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6157A1 second address: 6157A7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 615865 second address: 61586A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 61586A second address: 615880 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jnp 00007F06687C5EECh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6158F3 second address: 6158F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6158F8 second address: 615928 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F06687C5EF9h 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e mov si, EA74h 0x00000012 push eax 0x00000013 pushad 0x00000014 jbe 00007F06687C5EECh 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 615E34 second address: 615E38 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 615E38 second address: 615E3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 615E3E second address: 615E54 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F0668FAD1FAh 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 615E54 second address: 615E58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 615E58 second address: 615EA2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD200h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b popad 0x0000000c pop eax 0x0000000d popad 0x0000000e nop 0x0000000f mov dword ptr [ebp+122D3338h], ebx 0x00000015 push 00000000h 0x00000017 jmp 00007F0668FAD204h 0x0000001c push 00000000h 0x0000001e pushad 0x0000001f mov si, bx 0x00000022 mov ebx, dword ptr [ebp+122D2EECh] 0x00000028 popad 0x00000029 xchg eax, ebx 0x0000002a push eax 0x0000002b push edx 0x0000002c push eax 0x0000002d push edx 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 615EA2 second address: 615EA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 615EA6 second address: 615EAA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 615EAA second address: 615EB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 615EB0 second address: 615EB5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6167D7 second address: 6167DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6167DD second address: 61685B instructions: 0x00000000 rdtsc 0x00000002 ja 00007F0668FAD1FCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push ebx 0x00000010 call 00007F0668FAD1F8h 0x00000015 pop ebx 0x00000016 mov dword ptr [esp+04h], ebx 0x0000001a add dword ptr [esp+04h], 0000001Dh 0x00000022 inc ebx 0x00000023 push ebx 0x00000024 ret 0x00000025 pop ebx 0x00000026 ret 0x00000027 add dword ptr [ebp+122D361Ch], edx 0x0000002d push 00000000h 0x0000002f mov edi, edx 0x00000031 push 00000000h 0x00000033 push 00000000h 0x00000035 push ecx 0x00000036 call 00007F0668FAD1F8h 0x0000003b pop ecx 0x0000003c mov dword ptr [esp+04h], ecx 0x00000040 add dword ptr [esp+04h], 00000018h 0x00000048 inc ecx 0x00000049 push ecx 0x0000004a ret 0x0000004b pop ecx 0x0000004c ret 0x0000004d xchg eax, ebx 0x0000004e pushad 0x0000004f pushad 0x00000050 pushad 0x00000051 popad 0x00000052 js 00007F0668FAD1F6h 0x00000058 popad 0x00000059 jo 00007F0668FAD1F8h 0x0000005f pushad 0x00000060 popad 0x00000061 popad 0x00000062 push eax 0x00000063 pushad 0x00000064 pushad 0x00000065 push eax 0x00000066 push edx 0x00000067 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 61685B second address: 61686A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F06687C5EE6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6182DE second address: 6182E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 617FBE second address: 617FC2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 618ABF second address: 618AC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 619A31 second address: 619A43 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F06687C5EEEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 619A43 second address: 619A47 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 619A47 second address: 619A5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jg 00007F06687C5EE8h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5CF532 second address: 5CF563 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0668FAD203h 0x00000008 jmp 00007F0668FAD209h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5CF563 second address: 5CF570 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 push ecx 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5CF570 second address: 5CF578 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5CF578 second address: 5CF57E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5CF57E second address: 5CF5A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0668FAD208h 0x00000009 push edi 0x0000000a pop edi 0x0000000b popad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 61BB13 second address: 61BB2C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 je 00007F06687C5EE6h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 js 00007F06687C5EE6h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 61BB2C second address: 61BB32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 61FD2E second address: 61FD34 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 623B4E second address: 623B52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 623B52 second address: 623B65 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F06687C5EE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b push eax 0x0000000c pushad 0x0000000d push edi 0x0000000e pop edi 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5D7E8C second address: 5D7E92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5D7E92 second address: 5D7E96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 624C46 second address: 624C4C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 624C4C second address: 624C51 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 625E16 second address: 625E1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 625E1B second address: 625E21 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 625E21 second address: 625E25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 624F00 second address: 624F05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 624F05 second address: 624F0C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 626F54 second address: 626F5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 626F5A second address: 626F5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 628149 second address: 62816A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 pushad 0x0000000a jmp 00007F06687C5EF5h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6281F1 second address: 6281F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62717D second address: 627187 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 627187 second address: 627216 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a call 00007F0668FAD207h 0x0000000f pop ebx 0x00000010 push dword ptr fs:[00000000h] 0x00000017 push 00000000h 0x00000019 push esi 0x0000001a call 00007F0668FAD1F8h 0x0000001f pop esi 0x00000020 mov dword ptr [esp+04h], esi 0x00000024 add dword ptr [esp+04h], 00000017h 0x0000002c inc esi 0x0000002d push esi 0x0000002e ret 0x0000002f pop esi 0x00000030 ret 0x00000031 mov dword ptr fs:[00000000h], esp 0x00000038 push 00000000h 0x0000003a push ecx 0x0000003b call 00007F0668FAD1F8h 0x00000040 pop ecx 0x00000041 mov dword ptr [esp+04h], ecx 0x00000045 add dword ptr [esp+04h], 00000017h 0x0000004d inc ecx 0x0000004e push ecx 0x0000004f ret 0x00000050 pop ecx 0x00000051 ret 0x00000052 mov eax, dword ptr [ebp+122D02FDh] 0x00000058 mov dword ptr [ebp+122D24D4h], esi 0x0000005e push FFFFFFFFh 0x00000060 mov di, CD25h 0x00000064 push eax 0x00000065 js 00007F0668FAD213h 0x0000006b push eax 0x0000006c push edx 0x0000006d jne 00007F0668FAD1F6h 0x00000073 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6283EA second address: 6283EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62A080 second address: 62A093 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD1FFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6292A1 second address: 6292A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62A093 second address: 62A0F5 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F0668FAD1F8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d or dword ptr [ebp+122D27B4h], edi 0x00000013 je 00007F0668FAD1F9h 0x00000019 mov bx, ax 0x0000001c push 00000000h 0x0000001e mov edi, 72794600h 0x00000023 mov di, B374h 0x00000027 push 00000000h 0x00000029 push 00000000h 0x0000002b push ebx 0x0000002c call 00007F0668FAD1F8h 0x00000031 pop ebx 0x00000032 mov dword ptr [esp+04h], ebx 0x00000036 add dword ptr [esp+04h], 00000019h 0x0000003e inc ebx 0x0000003f push ebx 0x00000040 ret 0x00000041 pop ebx 0x00000042 ret 0x00000043 mov ebx, 6F64E207h 0x00000048 or dword ptr [ebp+122D2444h], edx 0x0000004e push eax 0x0000004f push eax 0x00000050 push edx 0x00000051 push eax 0x00000052 push edx 0x00000053 jns 00007F0668FAD1F6h 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62A0F5 second address: 62A108 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EEFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6292A5 second address: 62930E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 mov dword ptr [esp], eax 0x0000000a mov edi, 234AC757h 0x0000000f cmc 0x00000010 push dword ptr fs:[00000000h] 0x00000017 movsx edi, di 0x0000001a mov dword ptr fs:[00000000h], esp 0x00000021 push 00000000h 0x00000023 push esi 0x00000024 call 00007F0668FAD1F8h 0x00000029 pop esi 0x0000002a mov dword ptr [esp+04h], esi 0x0000002e add dword ptr [esp+04h], 00000018h 0x00000036 inc esi 0x00000037 push esi 0x00000038 ret 0x00000039 pop esi 0x0000003a ret 0x0000003b mov eax, dword ptr [ebp+122D0DBDh] 0x00000041 mov bl, F1h 0x00000043 push FFFFFFFFh 0x00000045 push eax 0x00000046 movsx edi, di 0x00000049 pop ebx 0x0000004a push eax 0x0000004b push eax 0x0000004c push edx 0x0000004d jo 00007F0668FAD206h 0x00000053 jmp 00007F0668FAD200h 0x00000058 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62A2A5 second address: 62A2B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b pop ebx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62A2B1 second address: 62A2B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62C0CA second address: 62C0CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62E1CD second address: 62E1DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jno 00007F0668FAD1F6h 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62E1DA second address: 62E20B instructions: 0x00000000 rdtsc 0x00000002 jng 00007F06687C5EECh 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F06687C5EF0h 0x0000000f jmp 00007F06687C5EF1h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62C321 second address: 62C33A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD1FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62C33A second address: 62C33E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62E7C5 second address: 62E7E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 jc 00007F0668FAD200h 0x0000000e jmp 00007F0668FAD1FAh 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62E7E1 second address: 62E7E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 630708 second address: 6307B5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD1FAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a pushad 0x0000000b popad 0x0000000c pop edi 0x0000000d popad 0x0000000e nop 0x0000000f pushad 0x00000010 mov dword ptr [ebp+122D26EFh], edx 0x00000016 jmp 00007F0668FAD1FBh 0x0000001b popad 0x0000001c push 00000000h 0x0000001e push 00000000h 0x00000020 push ecx 0x00000021 call 00007F0668FAD1F8h 0x00000026 pop ecx 0x00000027 mov dword ptr [esp+04h], ecx 0x0000002b add dword ptr [esp+04h], 0000001Ah 0x00000033 inc ecx 0x00000034 push ecx 0x00000035 ret 0x00000036 pop ecx 0x00000037 ret 0x00000038 jmp 00007F0668FAD209h 0x0000003d push 00000000h 0x0000003f push 00000000h 0x00000041 push edx 0x00000042 call 00007F0668FAD1F8h 0x00000047 pop edx 0x00000048 mov dword ptr [esp+04h], edx 0x0000004c add dword ptr [esp+04h], 0000001Ah 0x00000054 inc edx 0x00000055 push edx 0x00000056 ret 0x00000057 pop edx 0x00000058 ret 0x00000059 jmp 00007F0668FAD1FBh 0x0000005e mov dword ptr [ebp+122D206Dh], esi 0x00000064 xchg eax, esi 0x00000065 push eax 0x00000066 push edx 0x00000067 push ecx 0x00000068 jmp 00007F0668FAD1FFh 0x0000006d pop ecx 0x0000006e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6307B5 second address: 6307E3 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F06687C5EFFh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push esi 0x0000000c pushad 0x0000000d je 00007F06687C5EE6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 631694 second address: 631698 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 631698 second address: 6316AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F06687C5EF0h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62E9DF second address: 62E9E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62E9E5 second address: 62E9E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6317C8 second address: 631801 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F0668FAD209h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F0668FAD207h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 631801 second address: 631805 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 631805 second address: 63180B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 633686 second address: 63368A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 63470F second address: 63476F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop ebx 0x0000000a popad 0x0000000b mov dword ptr [esp], eax 0x0000000e pushad 0x0000000f mov cx, dx 0x00000012 popad 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push edx 0x00000018 call 00007F0668FAD1F8h 0x0000001d pop edx 0x0000001e mov dword ptr [esp+04h], edx 0x00000022 add dword ptr [esp+04h], 00000018h 0x0000002a inc edx 0x0000002b push edx 0x0000002c ret 0x0000002d pop edx 0x0000002e ret 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 push edi 0x00000034 call 00007F0668FAD1F8h 0x00000039 pop edi 0x0000003a mov dword ptr [esp+04h], edi 0x0000003e add dword ptr [esp+04h], 00000017h 0x00000046 inc edi 0x00000047 push edi 0x00000048 ret 0x00000049 pop edi 0x0000004a ret 0x0000004b xchg eax, esi 0x0000004c jl 00007F0668FAD1FEh 0x00000052 push eax 0x00000053 push eax 0x00000054 push edx 0x00000055 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 63476F second address: 63477F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 pushad 0x00000007 pushad 0x00000008 jo 00007F06687C5EE6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 635809 second address: 635824 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD201h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ecx 0x0000000a push eax 0x0000000b pushad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 635824 second address: 635830 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 635830 second address: 63586E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 nop 0x00000007 mov ebx, dword ptr [ebp+122D2910h] 0x0000000d push 00000000h 0x0000000f sub ebx, 52B2748Ah 0x00000015 push 00000000h 0x00000017 push 00000000h 0x00000019 push ebx 0x0000001a call 00007F0668FAD1F8h 0x0000001f pop ebx 0x00000020 mov dword ptr [esp+04h], ebx 0x00000024 add dword ptr [esp+04h], 00000016h 0x0000002c inc ebx 0x0000002d push ebx 0x0000002e ret 0x0000002f pop ebx 0x00000030 ret 0x00000031 xchg eax, esi 0x00000032 push eax 0x00000033 push edx 0x00000034 pushad 0x00000035 push ebx 0x00000036 pop ebx 0x00000037 pushad 0x00000038 popad 0x00000039 popad 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 635ABC second address: 635AC0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 635AC0 second address: 635ADA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F0668FAD202h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 635ADA second address: 635ADE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 63D040 second address: 63D056 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F0668FAD1FEh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 63D056 second address: 63D070 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007F06687C5EF1h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 63C79B second address: 63C7A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 63C7A1 second address: 63C7A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 63C920 second address: 63C92B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push edi 0x00000008 pop edi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64209A second address: 6420D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edi 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a jmp 00007F06687C5EF1h 0x0000000f mov eax, dword ptr [eax] 0x00000011 jmp 00007F06687C5EF5h 0x00000016 mov dword ptr [esp+04h], eax 0x0000001a jp 00007F06687C5EEEh 0x00000020 push edi 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6473DE second address: 6473E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6473E6 second address: 6473F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jp 00007F06687C5EE6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6473F5 second address: 647434 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD208h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 popad 0x00000011 popad 0x00000012 push esi 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F0668FAD201h 0x0000001a jc 00007F0668FAD1F6h 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64780A second address: 64780E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64780E second address: 647821 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 jne 00007F0668FAD219h 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 647821 second address: 647825 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 647986 second address: 6479D5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD208h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edx 0x0000000c push eax 0x0000000d pop eax 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F0668FAD206h 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F0668FAD203h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6479D5 second address: 6479DB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 647B28 second address: 647B30 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 647B30 second address: 647B4F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EF7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 647CDC second address: 647CE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 647CE0 second address: 647CEA instructions: 0x00000000 rdtsc 0x00000002 js 00007F06687C5EE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 647F7A second address: 647FA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a je 00007F0668FAD1F6h 0x00000010 ja 00007F0668FAD1F6h 0x00000016 popad 0x00000017 jno 00007F0668FAD1FEh 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 647FA5 second address: 647FAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop eax 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 647FAC second address: 647FB2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 647FB2 second address: 647FB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64D4F5 second address: 64D510 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0668FAD1FBh 0x00000009 popad 0x0000000a push eax 0x0000000b pushad 0x0000000c popad 0x0000000d pop eax 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64D510 second address: 64D514 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64D514 second address: 64D518 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64D518 second address: 64D520 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64D660 second address: 64D666 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64D666 second address: 64D676 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jnp 00007F06687C5EE6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64DA3A second address: 64DA65 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD200h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jbe 00007F0668FAD1FCh 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64DBBF second address: 64DBD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jnp 00007F06687C5EEAh 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64DBD2 second address: 64DBD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64DBD6 second address: 64DBDA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64DBDA second address: 64DC0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 pushad 0x00000009 jmp 00007F0668FAD1FFh 0x0000000e jmp 00007F0668FAD204h 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64E1BF second address: 64E1C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64E1C3 second address: 64E208 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jbe 00007F0668FAD1FEh 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 jmp 00007F0668FAD204h 0x00000017 pushad 0x00000018 popad 0x00000019 popad 0x0000001a pushad 0x0000001b ja 00007F0668FAD1F6h 0x00000021 jbe 00007F0668FAD1F6h 0x00000027 jng 00007F0668FAD1F6h 0x0000002d popad 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64E208 second address: 64E20E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64E20E second address: 64E21B instructions: 0x00000000 rdtsc 0x00000002 jl 00007F0668FAD1F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64E21B second address: 64E221 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 64E540 second address: 64E544 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 656993 second address: 65699D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 65699D second address: 6569A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 655388 second address: 65538D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 65538D second address: 6553A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007F0668FAD1F6h 0x0000000a jmp 00007F0668FAD1FFh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6553A6 second address: 6553C7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EF8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6553C7 second address: 6553DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F0668FAD1FBh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6553DB second address: 6553E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6553E1 second address: 6553F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0668FAD201h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 65555F second address: 655571 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F06687C5EEEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 655571 second address: 6555A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jno 00007F0668FAD1FEh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 pushad 0x00000012 popad 0x00000013 pop eax 0x00000014 pushad 0x00000015 pushad 0x00000016 popad 0x00000017 push edi 0x00000018 pop edi 0x00000019 jmp 00007F0668FAD205h 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 655744 second address: 65574A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 65574A second address: 65574E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6558B8 second address: 6558BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6558BC second address: 6558E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 jno 00007F0668FAD218h 0x0000000d jmp 00007F0668FAD204h 0x00000012 push ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 655B4F second address: 655B55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 655E1A second address: 655E23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 655E23 second address: 655E2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 655E2B second address: 655E37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 pushad 0x00000007 popad 0x00000008 pop esi 0x00000009 push ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 655FB9 second address: 655FBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 656308 second address: 65630C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 65630C second address: 656312 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6567F0 second address: 656806 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jne 00007F0668FAD1F6h 0x0000000c jo 00007F0668FAD1F6h 0x00000012 popad 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 65EACC second address: 65EAD5 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 65EAD5 second address: 65EADB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 65EADB second address: 65EAE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6206AF second address: 6206CB instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F0668FAD1F8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F0668FAD1FCh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6206CB second address: 62070A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EEDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F06687C5EF3h 0x0000000e popad 0x0000000f nop 0x00000010 mov dword ptr [ebp+122D2481h], esi 0x00000016 lea eax, dword ptr [ebp+1248C471h] 0x0000001c nop 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 push esi 0x00000021 pop esi 0x00000022 jnp 00007F06687C5EE6h 0x00000028 popad 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62070A second address: 62073A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007F0668FAD1F6h 0x00000009 jmp 00007F0668FAD1FDh 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 pushad 0x00000013 push edx 0x00000014 jmp 00007F0668FAD1FFh 0x00000019 pop edx 0x0000001a push eax 0x0000001b push edx 0x0000001c push esi 0x0000001d pop esi 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62073A second address: 62073E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 620827 second address: 62082C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62082C second address: 620832 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 620832 second address: 620836 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 620CAF second address: 620CE8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F06687C5EF8h 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jmp 00007F06687C5EF3h 0x00000015 push ecx 0x00000016 pop ecx 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 620D63 second address: 620D67 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 620D67 second address: 620DBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007F06687C5EF0h 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push edi 0x00000011 jno 00007F06687C5EECh 0x00000017 pop edi 0x00000018 mov eax, dword ptr [eax] 0x0000001a pushad 0x0000001b jmp 00007F06687C5EF3h 0x00000020 js 00007F06687C5EE8h 0x00000026 push edi 0x00000027 pop edi 0x00000028 popad 0x00000029 mov dword ptr [esp+04h], eax 0x0000002d jbe 00007F06687C5EEEh 0x00000033 push ecx 0x00000034 push eax 0x00000035 push edx 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62120F second address: 621278 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD205h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a je 00007F0668FAD202h 0x00000010 ja 00007F0668FAD1FCh 0x00000016 nop 0x00000017 push 00000000h 0x00000019 push ebp 0x0000001a call 00007F0668FAD1F8h 0x0000001f pop ebp 0x00000020 mov dword ptr [esp+04h], ebp 0x00000024 add dword ptr [esp+04h], 00000018h 0x0000002c inc ebp 0x0000002d push ebp 0x0000002e ret 0x0000002f pop ebp 0x00000030 ret 0x00000031 mov cx, ax 0x00000034 movzx edi, cx 0x00000037 push 00000004h 0x00000039 add dword ptr [ebp+122D29BBh], ecx 0x0000003f mov edx, dword ptr [ebp+122D362Eh] 0x00000045 push eax 0x00000046 push eax 0x00000047 push edx 0x00000048 pushad 0x00000049 pushad 0x0000004a popad 0x0000004b push eax 0x0000004c push edx 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 621278 second address: 62127D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62127D second address: 621283 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 621A51 second address: 621A5B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007F06687C5EE6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 65F0EE second address: 65F11A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD202h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e pop ecx 0x0000000f push ebx 0x00000010 push edx 0x00000011 pop edx 0x00000012 jmp 00007F0668FAD1FCh 0x00000017 pop ebx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 65F11A second address: 65F12A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 jnc 00007F06687C5EE6h 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 65F263 second address: 65F267 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 65F7C4 second address: 65F7EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jg 00007F06687C5EECh 0x0000000b jl 00007F06687C5EE6h 0x00000011 pushad 0x00000012 push ecx 0x00000013 jno 00007F06687C5EE6h 0x00000019 pushad 0x0000001a popad 0x0000001b pop ecx 0x0000001c je 00007F06687C5EECh 0x00000022 push eax 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 66513D second address: 665146 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 667FE2 second address: 667FF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 jmp 00007F06687C5EEAh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 667FF4 second address: 668009 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 pushad 0x00000009 push ecx 0x0000000a pushad 0x0000000b popad 0x0000000c pop ecx 0x0000000d jng 00007F0668FAD1FCh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 668009 second address: 66801D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 pop eax 0x00000008 jmp 00007F06687C5EECh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 66801D second address: 668021 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 66818B second address: 6681A5 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 pop eax 0x00000009 pushad 0x0000000a popad 0x0000000b push edi 0x0000000c pop edi 0x0000000d jns 00007F06687C5EE6h 0x00000013 popad 0x00000014 pop esi 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6681A5 second address: 6681AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6681AB second address: 6681AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 668350 second address: 668356 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 668356 second address: 668364 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jnc 00007F06687C5EE6h 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6684A8 second address: 6684AD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6684AD second address: 6684CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F06687C5EF7h 0x00000009 push edi 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5D6389 second address: 5D63A4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD1FEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jl 00007F0668FAD1F6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 5D63A4 second address: 5D63C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 ja 00007F06687C5EF2h 0x0000000d je 00007F06687C5EEEh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 66CAC9 second address: 66CB08 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F0668FAD208h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jng 00007F0668FAD1F6h 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 ja 00007F0668FAD205h 0x0000001d jmp 00007F0668FAD1FFh 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 66CB08 second address: 66CB0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 66CF1D second address: 66CF21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 66CF21 second address: 66CF25 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 66CF25 second address: 66CF42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F0668FAD1F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0668FAD1FFh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 66D3AC second address: 66D3D6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EEDh 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push esi 0x0000000c jmp 00007F06687C5EF0h 0x00000011 pop esi 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 66D3D6 second address: 66D3DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 66D3DC second address: 66D3E0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 66D3E0 second address: 66D3FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F0668FAD1F6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jg 00007F0668FAD1FCh 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 66D3FC second address: 66D400 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 66D400 second address: 66D404 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 672137 second address: 672142 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6722E5 second address: 6722EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62143C second address: 621440 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 621440 second address: 62145E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F0668FAD204h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 62145E second address: 6214F8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EF1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push edi 0x0000000d call 00007F06687C5EE8h 0x00000012 pop edi 0x00000013 mov dword ptr [esp+04h], edi 0x00000017 add dword ptr [esp+04h], 0000001Bh 0x0000001f inc edi 0x00000020 push edi 0x00000021 ret 0x00000022 pop edi 0x00000023 ret 0x00000024 call 00007F06687C5EEAh 0x00000029 sbb cx, DC56h 0x0000002e pop ecx 0x0000002f mov dx, 4D41h 0x00000033 mov ebx, dword ptr [ebp+1248C4B0h] 0x00000039 push 00000000h 0x0000003b push ebp 0x0000003c call 00007F06687C5EE8h 0x00000041 pop ebp 0x00000042 mov dword ptr [esp+04h], ebp 0x00000046 add dword ptr [esp+04h], 0000001Ah 0x0000004e inc ebp 0x0000004f push ebp 0x00000050 ret 0x00000051 pop ebp 0x00000052 ret 0x00000053 sbb ecx, 26F31E33h 0x00000059 jo 00007F06687C5EEBh 0x0000005f add dx, B3B4h 0x00000064 add eax, ebx 0x00000066 push ebx 0x00000067 mov edi, dword ptr [ebp+122D34F4h] 0x0000006d pop edi 0x0000006e nop 0x0000006f pushad 0x00000070 push eax 0x00000071 push edx 0x00000072 jne 00007F06687C5EE6h 0x00000078 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6214F8 second address: 621518 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD209h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 621518 second address: 62158D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push ecx 0x00000009 jmp 00007F06687C5EEDh 0x0000000e pop ecx 0x0000000f jp 00007F06687C5EECh 0x00000015 popad 0x00000016 nop 0x00000017 push 00000000h 0x00000019 push ebp 0x0000001a call 00007F06687C5EE8h 0x0000001f pop ebp 0x00000020 mov dword ptr [esp+04h], ebp 0x00000024 add dword ptr [esp+04h], 0000001Ch 0x0000002c inc ebp 0x0000002d push ebp 0x0000002e ret 0x0000002f pop ebp 0x00000030 ret 0x00000031 push 00000004h 0x00000033 push 00000000h 0x00000035 push ebp 0x00000036 call 00007F06687C5EE8h 0x0000003b pop ebp 0x0000003c mov dword ptr [esp+04h], ebp 0x00000040 add dword ptr [esp+04h], 00000018h 0x00000048 inc ebp 0x00000049 push ebp 0x0000004a ret 0x0000004b pop ebp 0x0000004c ret 0x0000004d sub di, BB10h 0x00000052 nop 0x00000053 push ebx 0x00000054 push edx 0x00000055 push eax 0x00000056 push edx 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 621537 second address: 62158D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 nop 0x00000006 push 00000000h 0x00000008 push ebp 0x00000009 call 00007F0668FAD1F8h 0x0000000e pop ebp 0x0000000f mov dword ptr [esp+04h], ebp 0x00000013 add dword ptr [esp+04h], 0000001Ch 0x0000001b inc ebp 0x0000001c push ebp 0x0000001d ret 0x0000001e pop ebp 0x0000001f ret 0x00000020 push 00000004h 0x00000022 push 00000000h 0x00000024 push ebp 0x00000025 call 00007F0668FAD1F8h 0x0000002a pop ebp 0x0000002b mov dword ptr [esp+04h], ebp 0x0000002f add dword ptr [esp+04h], 00000018h 0x00000037 inc ebp 0x00000038 push ebp 0x00000039 ret 0x0000003a pop ebp 0x0000003b ret 0x0000003c sub di, BB10h 0x00000041 nop 0x00000042 push ebx 0x00000043 push edx 0x00000044 push eax 0x00000045 push edx 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67258D second address: 6725A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F06687C5EECh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6725A2 second address: 6725A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67319A second address: 67319E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67319E second address: 6731B0 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F0668FAD1F6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 pop edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6731B0 second address: 6731CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F06687C5EF9h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6731CF second address: 6731D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6765FD second address: 676601 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 676601 second address: 676626 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F0668FAD208h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6762D5 second address: 6762EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jo 00007F06687C5EE6h 0x0000000c popad 0x0000000d je 00007F06687C5EEEh 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67E34C second address: 67E350 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67E48B second address: 67E51D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EF2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F06687C5EF2h 0x0000000e pushad 0x0000000f jmp 00007F06687C5EF8h 0x00000014 jl 00007F06687C5EE6h 0x0000001a jnc 00007F06687C5EE6h 0x00000020 push edx 0x00000021 pop edx 0x00000022 popad 0x00000023 jmp 00007F06687C5EF6h 0x00000028 popad 0x00000029 pushad 0x0000002a push eax 0x0000002b jmp 00007F06687C5EEFh 0x00000030 pop eax 0x00000031 jmp 00007F06687C5EEBh 0x00000036 push eax 0x00000037 push edx 0x00000038 js 00007F06687C5EE6h 0x0000003e jno 00007F06687C5EE6h 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67E942 second address: 67E968 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0668FAD209h 0x00000009 popad 0x0000000a popad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67E968 second address: 67E9B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007F06687C5EFBh 0x0000000c jnl 00007F06687C5F0Ah 0x00000012 push ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67EF8C second address: 67EF9A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD1FAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67EF9A second address: 67EFA0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67EFA0 second address: 67EFA6 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67EFA6 second address: 67EFC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a jmp 00007F06687C5EF5h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67EFC5 second address: 67EFC9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67F49C second address: 67F4CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F06687C5EF6h 0x00000009 pushad 0x0000000a jmp 00007F06687C5EEDh 0x0000000f jg 00007F06687C5EE6h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67F4CC second address: 67F4E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a js 00007F0668FAD1F6h 0x00000010 jmp 00007F0668FAD1FCh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67F4E8 second address: 67F50A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EECh 0x00000007 jo 00007F06687C5EE6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jnp 00007F06687C5EECh 0x00000015 jng 00007F06687C5EE6h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67F50A second address: 67F50F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67F78D second address: 67F7A2 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F06687C5EEEh 0x00000008 pushad 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67FFCC second address: 67FFD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67FFD0 second address: 67FFEE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F06687C5EF5h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67FFEE second address: 67FFF2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 67FFF2 second address: 680009 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F06687C5EEEh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 684620 second address: 684650 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 jmp 00007F0668FAD206h 0x0000000d push esi 0x0000000e pop esi 0x0000000f pop eax 0x00000010 popad 0x00000011 je 00007F0668FAD21Ah 0x00000017 jl 00007F0668FAD206h 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 684910 second address: 68491A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F06687C5EE6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 68491A second address: 684934 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD206h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 684934 second address: 68493B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 684CFF second address: 684D07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6866F5 second address: 6866F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6866F9 second address: 686708 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 jo 00007F0668FAD1F6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 686708 second address: 686735 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jmp 00007F06687C5EF1h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F06687C5EF4h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 686735 second address: 68673A instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 694E58 second address: 694E5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 694E5E second address: 694E62 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 694E62 second address: 694E78 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jmp 00007F06687C5EEDh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 692FDE second address: 692FE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 692FE5 second address: 693007 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F06687C5EF0h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 693007 second address: 693020 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0668FAD203h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 693020 second address: 693024 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6934CF second address: 6934D5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6934D5 second address: 6934D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6937A2 second address: 6937BC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F0668FAD1FAh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jng 00007F0668FAD1F6h 0x00000012 push esi 0x00000013 pop esi 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 693A5B second address: 693A69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F06687C5EEAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 693A69 second address: 693A6D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 693A6D second address: 693A75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 693A75 second address: 693A91 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F0668FAD1F8h 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F0668FAD1FAh 0x0000000f jno 00007F0668FAD1F6h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 694CE2 second address: 694D0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jno 00007F06687C5EF2h 0x0000000b popad 0x0000000c jl 00007F06687C5F06h 0x00000012 jnp 00007F06687C5EF2h 0x00000018 jng 00007F06687C5EE6h 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 694D0E second address: 694D16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 694D16 second address: 694D1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 692AF0 second address: 692AFE instructions: 0x00000000 rdtsc 0x00000002 js 00007F0668FAD1F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 692AFE second address: 692B02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6A5EEC second address: 6A5F03 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007F0668FAD1FCh 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6A8D09 second address: 6A8D0F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6AD2FC second address: 6AD300 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6ACEC9 second address: 6ACECD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6ACECD second address: 6ACED3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6ACED3 second address: 6ACEDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6BA423 second address: 6BA431 instructions: 0x00000000 rdtsc 0x00000002 je 00007F0668FAD1F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6BA431 second address: 6BA435 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6BA435 second address: 6BA439 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6BA439 second address: 6BA45B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F06687C5EF9h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6C55ED second address: 6C5609 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD202h 0x00000007 js 00007F0668FAD1F6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6C574E second address: 6C5766 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EEAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d js 00007F06687C5EE6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6C5766 second address: 6C576A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6C576A second address: 6C57AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jne 00007F06687C5EFDh 0x00000011 push eax 0x00000012 pop eax 0x00000013 jmp 00007F06687C5EF5h 0x00000018 jmp 00007F06687C5EF8h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6C5A92 second address: 6C5A9C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007F0668FAD1F6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6C647F second address: 6C648A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6C648A second address: 6C6490 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6C807C second address: 6C80AC instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F06687C5EF8h 0x00000008 pushad 0x00000009 jmp 00007F06687C5EF3h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6C80AC second address: 6C80BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 pop eax 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6CB7C4 second address: 6CB7CE instructions: 0x00000000 rdtsc 0x00000002 je 00007F06687C5EE6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6CB7CE second address: 6CB7D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6D4D39 second address: 6D4D5D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F06687C5EF7h 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push esi 0x0000000f pop esi 0x00000010 push eax 0x00000011 pop eax 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6D4D5D second address: 6D4D6C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD1FBh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6DD6C6 second address: 6DD6CC instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6DD6CC second address: 6DD6DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 js 00007F0668FAD1F6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6DD6DB second address: 6DD6E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6D7EF0 second address: 6D7F10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007F0668FAD1F6h 0x0000000a jmp 00007F0668FAD206h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6D7F10 second address: 6D7F14 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6D7F14 second address: 6D7F22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jl 00007F0668FAD1F6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6EA327 second address: 6EA32B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6EA32B second address: 6EA33F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a jc 00007F0668FAD21Dh 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6EA33F second address: 6EA345 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6EA345 second address: 6EA349 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6EC245 second address: 6EC24B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6EC24B second address: 6EC25E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F0668FAD1FAh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6EC25E second address: 6EC262 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6EC262 second address: 6EC266 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6EC3B2 second address: 6EC3B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6EF8CF second address: 6EF904 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edi 0x00000006 pushad 0x00000007 jmp 00007F0668FAD209h 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0668FAD201h 0x00000013 push eax 0x00000014 pop eax 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6EF904 second address: 6EF908 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 6EF908 second address: 6EF912 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 7034D5 second address: 703504 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edx 0x00000008 pop edx 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F06687C5EEBh 0x00000017 jmp 00007F06687C5EF2h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 703504 second address: 703522 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F0668FAD208h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 7023F3 second address: 702406 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F06687C5EEBh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 702406 second address: 702440 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F0668FAD1F6h 0x00000008 jmp 00007F0668FAD208h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jmp 00007F0668FAD1FDh 0x00000014 push ebx 0x00000015 jg 00007F0668FAD1F6h 0x0000001b pop ebx 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 7026C4 second address: 7026E3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EF6h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 7026E3 second address: 7026E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 7026E9 second address: 7026F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 7026F2 second address: 7026F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 702859 second address: 702865 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jnl 00007F06687C5EE6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 702865 second address: 702880 instructions: 0x00000000 rdtsc 0x00000002 je 00007F0668FAD1F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push esi 0x0000000d pop esi 0x0000000e jmp 00007F0668FAD1FDh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 702880 second address: 7028D7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EF8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jp 00007F06687C5EFEh 0x0000000f jmp 00007F06687C5EF8h 0x00000014 popad 0x00000015 ja 00007F06687C5F23h 0x0000001b jmp 00007F06687C5EF2h 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 7028D7 second address: 7028E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F0668FAD1F6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 702E5C second address: 702E6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 jno 00007F06687C5EE6h 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 703104 second address: 703110 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007F0668FAD1F6h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 703110 second address: 703124 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F06687C5EE6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c js 00007F06687C5EFCh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 705E6E second address: 705E74 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 706138 second address: 70613E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 706248 second address: 70624D instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 70624D second address: 706292 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b jno 00007F06687C5EF2h 0x00000011 mov eax, dword ptr [eax] 0x00000013 jl 00007F06687C5EECh 0x00000019 pushad 0x0000001a push edx 0x0000001b pop edx 0x0000001c push edx 0x0000001d pop edx 0x0000001e popad 0x0000001f mov dword ptr [esp+04h], eax 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007F06687C5EF2h 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 706292 second address: 706298 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 706589 second address: 70658F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 70658F second address: 706593 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 7077B7 second address: 7077C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 70957F second address: 7095B0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD204h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push edi 0x0000000f pop edi 0x00000010 jmp 00007F0668FAD1FBh 0x00000015 popad 0x00000016 popad 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 7095B0 second address: 7095B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48C02AA second address: 48C02B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 movzx esi, dx 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48C02B2 second address: 48C035C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ebp 0x0000000b pushad 0x0000000c jmp 00007F06687C5EF2h 0x00000011 pushfd 0x00000012 jmp 00007F06687C5EF2h 0x00000017 sub cx, 02E8h 0x0000001c jmp 00007F06687C5EEBh 0x00000021 popfd 0x00000022 popad 0x00000023 push eax 0x00000024 pushad 0x00000025 mov cl, bh 0x00000027 mov cx, C6D7h 0x0000002b popad 0x0000002c xchg eax, ebp 0x0000002d pushad 0x0000002e pushfd 0x0000002f jmp 00007F06687C5EF8h 0x00000034 jmp 00007F06687C5EF5h 0x00000039 popfd 0x0000003a call 00007F06687C5EF0h 0x0000003f mov ax, 4E31h 0x00000043 pop eax 0x00000044 popad 0x00000045 mov ebp, esp 0x00000047 pushad 0x00000048 popad 0x00000049 mov edx, dword ptr [ebp+0Ch] 0x0000004c push eax 0x0000004d push edx 0x0000004e jmp 00007F06687C5EEEh 0x00000053 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48C0395 second address: 48C0399 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48C0399 second address: 48C039D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48C039D second address: 48C03A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0891 second address: 48E0896 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0896 second address: 48E08A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push esp 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E08A3 second address: 48E08AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov si, di 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E08AB second address: 48E08E7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0668FAD206h 0x00000009 adc esi, 2A89B108h 0x0000000f jmp 00007F0668FAD1FBh 0x00000014 popfd 0x00000015 mov si, EB7Fh 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c mov dword ptr [esp], ebp 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E08E7 second address: 48E08ED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E08ED second address: 48E096F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0668FAD204h 0x00000009 and ecx, 07F56698h 0x0000000f jmp 00007F0668FAD1FBh 0x00000014 popfd 0x00000015 pushfd 0x00000016 jmp 00007F0668FAD208h 0x0000001b adc eax, 0A2810F8h 0x00000021 jmp 00007F0668FAD1FBh 0x00000026 popfd 0x00000027 popad 0x00000028 pop edx 0x00000029 pop eax 0x0000002a mov ebp, esp 0x0000002c pushad 0x0000002d push eax 0x0000002e push edx 0x0000002f pushfd 0x00000030 jmp 00007F0668FAD202h 0x00000035 and ecx, 583F6B58h 0x0000003b jmp 00007F0668FAD1FBh 0x00000040 popfd 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E096F second address: 48E09BE instructions: 0x00000000 rdtsc 0x00000002 mov ecx, 005D280Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov al, 36h 0x0000000b popad 0x0000000c push ebp 0x0000000d jmp 00007F06687C5EECh 0x00000012 mov dword ptr [esp], ecx 0x00000015 jmp 00007F06687C5EF0h 0x0000001a xchg eax, esi 0x0000001b pushad 0x0000001c mov edi, esi 0x0000001e pushad 0x0000001f push eax 0x00000020 pop edi 0x00000021 popad 0x00000022 popad 0x00000023 push eax 0x00000024 jmp 00007F06687C5EF0h 0x00000029 xchg eax, esi 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d mov bl, 3Fh 0x0000002f mov cl, B0h 0x00000031 popad 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E09BE second address: 48E0A22 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, 258Dh 0x00000007 call 00007F0668FAD1FAh 0x0000000c pop eax 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 lea eax, dword ptr [ebp-04h] 0x00000013 jmp 00007F0668FAD201h 0x00000018 nop 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c pushfd 0x0000001d jmp 00007F0668FAD203h 0x00000022 and ch, FFFFFF9Eh 0x00000025 jmp 00007F0668FAD209h 0x0000002a popfd 0x0000002b mov ecx, 076BAF67h 0x00000030 popad 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0A22 second address: 48E0A3E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F06687C5EF8h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0A3E second address: 48E0A42 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0A42 second address: 48E0A5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F06687C5EEDh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0A5A second address: 48E0A69 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ecx 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0A69 second address: 48E0A7A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EEDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0A7A second address: 48E0AA1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD201h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+08h] 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0668FAD1FDh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0AFD second address: 48E0B04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0B90 second address: 48E0BBC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD1FFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, esi 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F0668FAD205h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0BBC second address: 48E0BFA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EF1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a jmp 00007F06687C5EEEh 0x0000000f leave 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F06687C5EF7h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0BFA second address: 48D016D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, 8B8Ah 0x00000007 mov dx, D656h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e retn 0004h 0x00000011 nop 0x00000012 cmp eax, 00000000h 0x00000015 setne al 0x00000018 jmp 00007F0668FAD1F2h 0x0000001a xor ebx, ebx 0x0000001c test al, 01h 0x0000001e jne 00007F0668FAD1F7h 0x00000020 sub esp, 04h 0x00000023 mov dword ptr [esp], 0000000Dh 0x0000002a call 00007F066D43A93Bh 0x0000002f mov edi, edi 0x00000031 pushad 0x00000032 mov ecx, 3FB3092Bh 0x00000037 mov edi, eax 0x00000039 popad 0x0000003a xchg eax, ebp 0x0000003b jmp 00007F0668FAD1FAh 0x00000040 push eax 0x00000041 push eax 0x00000042 push edx 0x00000043 push eax 0x00000044 push edx 0x00000045 push eax 0x00000046 push edx 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D016D second address: 48D0171 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0171 second address: 48D018D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD208h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D018D second address: 48D020E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b pushad 0x0000000c push esi 0x0000000d pop edi 0x0000000e pushfd 0x0000000f jmp 00007F06687C5EEEh 0x00000014 and si, 3178h 0x00000019 jmp 00007F06687C5EEBh 0x0000001e popfd 0x0000001f popad 0x00000020 popad 0x00000021 mov ebp, esp 0x00000023 jmp 00007F06687C5EF5h 0x00000028 sub esp, 2Ch 0x0000002b jmp 00007F06687C5EEEh 0x00000030 xchg eax, ebx 0x00000031 jmp 00007F06687C5EF0h 0x00000036 push eax 0x00000037 push eax 0x00000038 push edx 0x00000039 push eax 0x0000003a push edx 0x0000003b jmp 00007F06687C5EEDh 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D020E second address: 48D0223 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD201h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0223 second address: 48D0246 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, 6299E862h 0x00000008 mov edi, 4B3228AEh 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 xchg eax, ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F06687C5EF0h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0246 second address: 48D024C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D024C second address: 48D0250 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0250 second address: 48D026A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD1FDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, edi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D026A second address: 48D026E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D026E second address: 48D0274 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0274 second address: 48D0298 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F06687C5EF0h 0x00000008 mov ax, 0E21h 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 mov di, ax 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D02EA second address: 48D02F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0668FAD1FAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D02F8 second address: 48D02FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D02FC second address: 48D03D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 inc ebx 0x00000009 jmp 00007F0668FAD207h 0x0000000e test al, al 0x00000010 pushad 0x00000011 call 00007F0668FAD200h 0x00000016 pushfd 0x00000017 jmp 00007F0668FAD202h 0x0000001c jmp 00007F0668FAD205h 0x00000021 popfd 0x00000022 pop esi 0x00000023 popad 0x00000024 je 00007F0668FAD410h 0x0000002a pushad 0x0000002b mov bx, 82E0h 0x0000002f mov dx, ED0Ch 0x00000033 popad 0x00000034 lea ecx, dword ptr [ebp-14h] 0x00000037 pushad 0x00000038 jmp 00007F0668FAD201h 0x0000003d push ecx 0x0000003e pushfd 0x0000003f jmp 00007F0668FAD207h 0x00000044 and ch, 0000006Eh 0x00000047 jmp 00007F0668FAD209h 0x0000004c popfd 0x0000004d pop esi 0x0000004e popad 0x0000004f mov dword ptr [ebp-14h], edi 0x00000052 push eax 0x00000053 push edx 0x00000054 push eax 0x00000055 push edx 0x00000056 jmp 00007F0668FAD209h 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D03D7 second address: 48D03EC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EF1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0407 second address: 48D0449 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD209h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a jmp 00007F0668FAD1FEh 0x0000000f push eax 0x00000010 pushad 0x00000011 jmp 00007F0668FAD1FCh 0x00000016 popad 0x00000017 nop 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0449 second address: 48D044F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0504 second address: 48D051D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, di 0x00000006 mov esi, ebx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b js 00007F0668FAD25Bh 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 mov ebx, 3B80BB06h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D051D second address: 48D05EE instructions: 0x00000000 rdtsc 0x00000002 call 00007F06687C5EF7h 0x00000007 pop esi 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F06687C5EF9h 0x0000000f popad 0x00000010 cmp dword ptr [ebp-14h], edi 0x00000013 jmp 00007F06687C5EEEh 0x00000018 jne 00007F06DAF83E1Dh 0x0000001e jmp 00007F06687C5EF0h 0x00000023 mov ebx, dword ptr [ebp+08h] 0x00000026 pushad 0x00000027 mov ebx, esi 0x00000029 pushad 0x0000002a pushad 0x0000002b popad 0x0000002c pushfd 0x0000002d jmp 00007F06687C5EF6h 0x00000032 sub ecx, 32E4C998h 0x00000038 jmp 00007F06687C5EEBh 0x0000003d popfd 0x0000003e popad 0x0000003f popad 0x00000040 lea eax, dword ptr [ebp-2Ch] 0x00000043 push eax 0x00000044 push edx 0x00000045 pushad 0x00000046 pushfd 0x00000047 jmp 00007F06687C5EEBh 0x0000004c sub cl, 0000005Eh 0x0000004f jmp 00007F06687C5EF9h 0x00000054 popfd 0x00000055 jmp 00007F06687C5EF0h 0x0000005a popad 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D05EE second address: 48D05F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D05F4 second address: 48D0629 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushfd 0x0000000d jmp 00007F06687C5EF2h 0x00000012 jmp 00007F06687C5EF5h 0x00000017 popfd 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0629 second address: 48D0632 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0632 second address: 48D067A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 mov dword ptr [esp], esi 0x00000009 pushad 0x0000000a mov cx, B6FBh 0x0000000e movzx esi, bx 0x00000011 popad 0x00000012 push eax 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 pushfd 0x00000017 jmp 00007F06687C5EF5h 0x0000001c or ax, BCB6h 0x00000021 jmp 00007F06687C5EF1h 0x00000026 popfd 0x00000027 mov cx, C2A7h 0x0000002b popad 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D067A second address: 48D0698 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD1FDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c pushad 0x0000000d mov al, E2h 0x0000000f push eax 0x00000010 push edx 0x00000011 mov ebx, 508356FAh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0698 second address: 48D06B9 instructions: 0x00000000 rdtsc 0x00000002 mov si, di 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F06687C5EF4h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D06B9 second address: 48D06C8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD1FBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D06C8 second address: 48D06CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D06CE second address: 48D06D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D06D2 second address: 48D070E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F06687C5EF8h 0x00000014 or ecx, 2E8F06F8h 0x0000001a jmp 00007F06687C5EEBh 0x0000001f popfd 0x00000020 mov ch, 94h 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D070E second address: 48D0714 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0765 second address: 48D0775 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F06687C5EECh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0775 second address: 48D0779 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0779 second address: 48D07B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esi, eax 0x0000000a jmp 00007F06687C5EF7h 0x0000000f test esi, esi 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F06687C5EF5h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D07B3 second address: 48D005B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 je 00007F06DB76B092h 0x0000000c xor eax, eax 0x0000000e jmp 00007F0668F8692Ah 0x00000013 pop esi 0x00000014 pop edi 0x00000015 pop ebx 0x00000016 leave 0x00000017 retn 0004h 0x0000001a nop 0x0000001b xor ebx, ebx 0x0000001d cmp eax, 00000000h 0x00000020 je 00007F0668FAD353h 0x00000026 call 00007F066D43A67Dh 0x0000002b mov edi, edi 0x0000002d pushad 0x0000002e jmp 00007F0668FAD1FBh 0x00000033 push eax 0x00000034 mov ax, dx 0x00000037 pop edi 0x00000038 popad 0x00000039 xchg eax, ebp 0x0000003a pushad 0x0000003b mov edi, 1C63DD6Eh 0x00000040 popad 0x00000041 push eax 0x00000042 jmp 00007F0668FAD204h 0x00000047 xchg eax, ebp 0x00000048 jmp 00007F0668FAD200h 0x0000004d mov ebp, esp 0x0000004f jmp 00007F0668FAD200h 0x00000054 xchg eax, ecx 0x00000055 push eax 0x00000056 push edx 0x00000057 push eax 0x00000058 push edx 0x00000059 pushad 0x0000005a popad 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D005B second address: 48D005F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D005F second address: 48D0065 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0065 second address: 48D009C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, 95E1h 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c jmp 00007F06687C5EF8h 0x00000011 push eax 0x00000012 push edx 0x00000013 call 00007F06687C5EF0h 0x00000018 pop ecx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D009C second address: 48D00BF instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, ecx 0x00000008 jmp 00007F0668FAD1FDh 0x0000000d mov dword ptr [ebp-04h], 55534552h 0x00000014 pushad 0x00000015 mov ebx, ecx 0x00000017 push eax 0x00000018 push edx 0x00000019 mov cl, AEh 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0105 second address: 48D0115 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F06687C5EECh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0115 second address: 48D0119 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0C52 second address: 48D0CE1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F06687C5EF1h 0x00000009 or cl, FFFFFFA6h 0x0000000c jmp 00007F06687C5EF1h 0x00000011 popfd 0x00000012 pushfd 0x00000013 jmp 00007F06687C5EF0h 0x00000018 adc ecx, 6E1E9148h 0x0000001e jmp 00007F06687C5EEBh 0x00000023 popfd 0x00000024 popad 0x00000025 pop edx 0x00000026 pop eax 0x00000027 xchg eax, ebp 0x00000028 push eax 0x00000029 push edx 0x0000002a pushad 0x0000002b pushfd 0x0000002c jmp 00007F06687C5EEBh 0x00000031 xor cl, FFFFFF8Eh 0x00000034 jmp 00007F06687C5EF9h 0x00000039 popfd 0x0000003a call 00007F06687C5EF0h 0x0000003f pop eax 0x00000040 popad 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0CE1 second address: 48D0CE7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0CE7 second address: 48D0CEB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0CEB second address: 48D0CFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0CFB second address: 48D0D16 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EF7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0D16 second address: 48D0D69 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0668FAD209h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [770E459Ch], 05h 0x00000010 pushad 0x00000011 call 00007F0668FAD1FCh 0x00000016 jmp 00007F0668FAD202h 0x0000001b pop eax 0x0000001c mov esi, ebx 0x0000001e popad 0x0000001f je 00007F06DB75AE98h 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a popad 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0D69 second address: 48D0D6D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0D6D second address: 48D0D73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0E57 second address: 48D0E5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0E5B second address: 48D0E5F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0E5F second address: 48D0E65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48D0E65 second address: 48D0EB1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0668FAD202h 0x00000009 jmp 00007F0668FAD205h 0x0000000e popfd 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 sub esi, esi 0x00000016 jmp 00007F0668FAD1FDh 0x0000001b mov dword ptr [ebp-1Ch], esi 0x0000001e pushad 0x0000001f mov si, ABC3h 0x00000023 push eax 0x00000024 push edx 0x00000025 mov al, 72h 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0C55 second address: 48E0C76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 mov ebp, esp 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F06687C5EF7h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0C76 second address: 48E0C8A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, ebx 0x00000005 movsx edx, cx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c pushad 0x0000000d pushad 0x0000000e mov si, 7575h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0C8A second address: 48E0C94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 mov bx, ax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0C94 second address: 48E0CB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F0668FAD205h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0CB1 second address: 48E0D78 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, edx 0x00000005 pushfd 0x00000006 jmp 00007F06687C5EF3h 0x0000000b or esi, 5774E5BEh 0x00000011 jmp 00007F06687C5EF9h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a xchg eax, esi 0x0000001b jmp 00007F06687C5EEEh 0x00000020 mov esi, dword ptr [ebp+0Ch] 0x00000023 pushad 0x00000024 push eax 0x00000025 call 00007F06687C5EEDh 0x0000002a pop ecx 0x0000002b pop ebx 0x0000002c mov ecx, 0CC7AF3Dh 0x00000031 popad 0x00000032 test esi, esi 0x00000034 jmp 00007F06687C5EF8h 0x00000039 je 00007F06DAF6356Dh 0x0000003f pushad 0x00000040 mov edi, esi 0x00000042 mov edx, ecx 0x00000044 popad 0x00000045 cmp dword ptr [770E459Ch], 05h 0x0000004c pushad 0x0000004d pushad 0x0000004e push eax 0x0000004f pop ebx 0x00000050 mov bx, cx 0x00000053 popad 0x00000054 jmp 00007F06687C5EF8h 0x00000059 popad 0x0000005a je 00007F06DAF7B619h 0x00000060 push eax 0x00000061 push edx 0x00000062 push eax 0x00000063 push edx 0x00000064 jmp 00007F06687C5EEAh 0x00000069 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0D78 second address: 48E0D7E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0D7E second address: 48E0D84 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0D84 second address: 48E0D88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0D88 second address: 48E0DB5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F06687C5EF8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F06687C5EEAh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0DB5 second address: 48E0DBB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0DBB second address: 48E0DE8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F06687C5EECh 0x00000009 sub ax, F1C8h 0x0000000e jmp 00007F06687C5EEBh 0x00000013 popfd 0x00000014 mov ch, EBh 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 push eax 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0DE8 second address: 48E0DEC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\mG83m82qhF.exe | RDTSC instruction interceptor: First address: 48E0DEC second address: 48E0DF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |