Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1160754 second address: 116075A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 116075A second address: 1160762 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1160762 second address: 1160788 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F5D692C6EEEh 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F5D692C6EEFh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11717EE second address: 117181F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F5D68C8C008h 0x0000000b pop eax 0x0000000c pushad 0x0000000d jo 00007F5D68C8BFFEh 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 jng 00007F5D68C8BFF6h 0x0000001b push esi 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 117181F second address: 1171827 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1171D65 second address: 1171D6F instructions: 0x00000000 rdtsc 0x00000002 jo 00007F5D68C8BFF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1171D6F second address: 1171D80 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F5D692C6EEDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1174FC6 second address: 1175040 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jc 00007F5D68C8BFFAh 0x0000000e push eax 0x0000000f push edi 0x00000010 pop edi 0x00000011 pop eax 0x00000012 nop 0x00000013 push 00000000h 0x00000015 push edi 0x00000016 call 00007F5D68C8BFF8h 0x0000001b pop edi 0x0000001c mov dword ptr [esp+04h], edi 0x00000020 add dword ptr [esp+04h], 00000019h 0x00000028 inc edi 0x00000029 push edi 0x0000002a ret 0x0000002b pop edi 0x0000002c ret 0x0000002d mov dword ptr [ebp+122D2321h], eax 0x00000033 mov di, F893h 0x00000037 push 00000000h 0x00000039 push 00000000h 0x0000003b push eax 0x0000003c call 00007F5D68C8BFF8h 0x00000041 pop eax 0x00000042 mov dword ptr [esp+04h], eax 0x00000046 add dword ptr [esp+04h], 00000018h 0x0000004e inc eax 0x0000004f push eax 0x00000050 ret 0x00000051 pop eax 0x00000052 ret 0x00000053 mov dl, 38h 0x00000055 push 0FF15F2Bh 0x0000005a push eax 0x0000005b push edx 0x0000005c push ecx 0x0000005d jmp 00007F5D68C8BFFFh 0x00000062 pop ecx 0x00000063 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1175040 second address: 11750DC instructions: 0x00000000 rdtsc 0x00000002 jne 00007F5D692C6EE8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xor dword ptr [esp], 0FF15FABh 0x00000011 push 00000000h 0x00000013 push ebp 0x00000014 call 00007F5D692C6EE8h 0x00000019 pop ebp 0x0000001a mov dword ptr [esp+04h], ebp 0x0000001e add dword ptr [esp+04h], 00000019h 0x00000026 inc ebp 0x00000027 push ebp 0x00000028 ret 0x00000029 pop ebp 0x0000002a ret 0x0000002b cld 0x0000002c push 00000003h 0x0000002e call 00007F5D692C6EF0h 0x00000033 pushad 0x00000034 sub dword ptr [ebp+122D1D2Eh], edx 0x0000003a call 00007F5D692C6EEEh 0x0000003f pop edi 0x00000040 popad 0x00000041 pop ecx 0x00000042 or dword ptr [ebp+122D2F3Dh], ebx 0x00000048 push 00000000h 0x0000004a mov dword ptr [ebp+122D354Bh], edi 0x00000050 call 00007F5D692C6EEEh 0x00000055 add dword ptr [ebp+122D31CDh], edx 0x0000005b pop ecx 0x0000005c push 00000003h 0x0000005e mov cx, bx 0x00000061 sbb edi, 3081CC4Ch 0x00000067 push B2C4D33Ch 0x0000006c push eax 0x0000006d push edx 0x0000006e je 00007F5D692C6EE8h 0x00000074 pushad 0x00000075 popad 0x00000076 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11751E7 second address: 1175261 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8C005h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor dword ptr [esp], 59B14E28h 0x00000010 mov ecx, dword ptr [ebp+122D2D22h] 0x00000016 push 00000003h 0x00000018 or edx, dword ptr [ebp+122D2DC6h] 0x0000001e push 00000000h 0x00000020 sub ecx, 20489BD2h 0x00000026 push 00000003h 0x00000028 mov edi, 4DDF7B56h 0x0000002d push F3109140h 0x00000032 jmp 00007F5D68C8C002h 0x00000037 xor dword ptr [esp], 33109140h 0x0000003e mov cx, si 0x00000041 lea ebx, dword ptr [ebp+12450DB3h] 0x00000047 pushad 0x00000048 pushad 0x00000049 pushad 0x0000004a popad 0x0000004b mov dword ptr [ebp+122D338Eh], ebx 0x00000051 popad 0x00000052 and di, D27Eh 0x00000057 popad 0x00000058 push eax 0x00000059 pushad 0x0000005a push eax 0x0000005b push eax 0x0000005c push edx 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11752DE second address: 117534E instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F5D692C6EFAh 0x00000008 jmp 00007F5D692C6EF4h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov dword ptr [esp], eax 0x00000012 push 00000000h 0x00000014 push edi 0x00000015 call 00007F5D692C6EE8h 0x0000001a pop edi 0x0000001b mov dword ptr [esp+04h], edi 0x0000001f add dword ptr [esp+04h], 00000015h 0x00000027 inc edi 0x00000028 push edi 0x00000029 ret 0x0000002a pop edi 0x0000002b ret 0x0000002c push 00000000h 0x0000002e jmp 00007F5D692C6EF1h 0x00000033 mov edi, 6A2EE3B2h 0x00000038 push 87DC838Ah 0x0000003d push ebx 0x0000003e push eax 0x0000003f push edx 0x00000040 jmp 00007F5D692C6EF2h 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 117534E second address: 11753A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 add dword ptr [esp], 78237CF6h 0x0000000e movzx ecx, si 0x00000011 push 00000003h 0x00000013 mov si, cx 0x00000016 push 00000000h 0x00000018 mov edi, dword ptr [ebp+122D1CD7h] 0x0000001e push 00000003h 0x00000020 push 00000000h 0x00000022 push ebp 0x00000023 call 00007F5D68C8BFF8h 0x00000028 pop ebp 0x00000029 mov dword ptr [esp+04h], ebp 0x0000002d add dword ptr [esp+04h], 00000014h 0x00000035 inc ebp 0x00000036 push ebp 0x00000037 ret 0x00000038 pop ebp 0x00000039 ret 0x0000003a js 00007F5D68C8BFF8h 0x00000040 mov ecx, edx 0x00000042 push DF052E33h 0x00000047 push eax 0x00000048 push edx 0x00000049 jbe 00007F5D68C8BFF8h 0x0000004f push esi 0x00000050 pop esi 0x00000051 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11753A1 second address: 11753B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F5D692C6EF0h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1195DA9 second address: 1195DE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jo 00007F5D68C8BFF6h 0x0000000c jne 00007F5D68C8BFF6h 0x00000012 popad 0x00000013 pop eax 0x00000014 pushad 0x00000015 pushad 0x00000016 jnp 00007F5D68C8BFF6h 0x0000001c pushad 0x0000001d popad 0x0000001e js 00007F5D68C8BFF6h 0x00000024 popad 0x00000025 jmp 00007F5D68C8C000h 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d popad 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1193B93 second address: 1193BDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 jmp 00007F5D692C6EF9h 0x0000000c jno 00007F5D692C6EF9h 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 push edi 0x00000016 jg 00007F5D692C6EE6h 0x0000001c pushad 0x0000001d popad 0x0000001e pop edi 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1193BDC second address: 1193BE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1194336 second address: 119434C instructions: 0x00000000 rdtsc 0x00000002 js 00007F5D692C6EE6h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jbe 00007F5D692C6EE6h 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 119434C second address: 1194350 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1194350 second address: 1194356 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1194356 second address: 1194365 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F5D68C8BFFBh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1194365 second address: 1194369 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1194369 second address: 1194394 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F5D68C8BFFAh 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F5D68C8C003h 0x00000016 push esi 0x00000017 pop esi 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1194394 second address: 11943A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D692C6EEBh 0x00000007 jl 00007F5D692C6EE6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11944FC second address: 1194500 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1194880 second address: 1194899 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 jmp 00007F5D692C6EEBh 0x0000000c jc 00007F5D692C6EE6h 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1194899 second address: 11948B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F5D68C8C006h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11949F9 second address: 1194A03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push edi 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1194A03 second address: 1194A26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop esi 0x00000006 push edi 0x00000007 jmp 00007F5D68C8C008h 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1194A26 second address: 1194A2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1194B72 second address: 1194B78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1194B78 second address: 1194B7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1194B7C second address: 1194B86 instructions: 0x00000000 rdtsc 0x00000002 je 00007F5D68C8BFF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1194CF4 second address: 1194CF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1194CF8 second address: 1194D2A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8C004h 0x00000007 jmp 00007F5D68C8BFFAh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F5D68C8BFFEh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1194D2A second address: 1194D36 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b pop edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 118A457 second address: 118A45C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 116A951 second address: 116A955 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 119557A second address: 119557E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 119557E second address: 1195584 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1195584 second address: 119558D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11956E3 second address: 11956E8 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1195804 second address: 119580C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 119580C second address: 1195814 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1195814 second address: 119581A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 119581A second address: 119581F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 119581F second address: 1195835 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F5D68C8C001h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1195835 second address: 1195853 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jno 00007F5D692C6EF2h 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1195853 second address: 1195857 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1195857 second address: 119585B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 119B474 second address: 119B47A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 119B47A second address: 119B48B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jc 00007F5D692C6EE6h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 119B48B second address: 119B491 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1167239 second address: 116725C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007F5D692C6EF9h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A2102 second address: 11A2123 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F5D68C8C007h 0x00000009 jc 00007F5D68C8BFF6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A2123 second address: 11A2144 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D692C6EF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A22B5 second address: 11A22B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A22B9 second address: 11A22BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A22BF second address: 11A22C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A22C5 second address: 11A22CA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A2A8C second address: 11A2A91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A2A91 second address: 11A2A9C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 pushad 0x00000006 popad 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A333D second address: 11A3341 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A3493 second address: 11A3499 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A37D0 second address: 11A37D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A37D5 second address: 11A37DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F5D692C6EE6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A3B17 second address: 11A3B21 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F5D68C8BFFCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A4046 second address: 11A404A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A40FA second address: 11A411D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F5D68C8C008h 0x00000009 popad 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A411D second address: 11A4121 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A4121 second address: 11A412F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jns 00007F5D68C8BFF6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A44CB second address: 11A44D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push esi 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A461F second address: 11A462D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8BFFAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A4C64 second address: 11A4C85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 jmp 00007F5D692C6EF9h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A565B second address: 11A5660 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A659F second address: 11A6619 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push ecx 0x0000000c call 00007F5D692C6EE8h 0x00000011 pop ecx 0x00000012 mov dword ptr [esp+04h], ecx 0x00000016 add dword ptr [esp+04h], 0000001Bh 0x0000001e inc ecx 0x0000001f push ecx 0x00000020 ret 0x00000021 pop ecx 0x00000022 ret 0x00000023 add edi, 5EBF4176h 0x00000029 xor esi, dword ptr [ebp+122D2CE6h] 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 push ebx 0x00000034 call 00007F5D692C6EE8h 0x00000039 pop ebx 0x0000003a mov dword ptr [esp+04h], ebx 0x0000003e add dword ptr [esp+04h], 00000015h 0x00000046 inc ebx 0x00000047 push ebx 0x00000048 ret 0x00000049 pop ebx 0x0000004a ret 0x0000004b mov si, 4B00h 0x0000004f push 00000000h 0x00000051 sub dword ptr [ebp+122D3A57h], eax 0x00000057 mov edi, dword ptr [ebp+122D2D2Eh] 0x0000005d push eax 0x0000005e push eax 0x0000005f push edx 0x00000060 pushad 0x00000061 js 00007F5D692C6EE6h 0x00000067 jc 00007F5D692C6EE6h 0x0000006d popad 0x0000006e rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A6F66 second address: 11A6F6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A6F6C second address: 11A6F70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A9D0B second address: 11A9D0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11AD4E8 second address: 11AD4EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11AF600 second address: 11AF606 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11AF606 second address: 11AF65D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 xor edi, 14059895h 0x0000000f push 00000000h 0x00000011 xor edi, 6FEF6B76h 0x00000017 push 00000000h 0x00000019 push 00000000h 0x0000001b push esi 0x0000001c call 00007F5D692C6EE8h 0x00000021 pop esi 0x00000022 mov dword ptr [esp+04h], esi 0x00000026 add dword ptr [esp+04h], 0000001Ah 0x0000002e inc esi 0x0000002f push esi 0x00000030 ret 0x00000031 pop esi 0x00000032 ret 0x00000033 add edi, dword ptr [ebp+122D2185h] 0x00000039 sbb di, 8538h 0x0000003e push eax 0x0000003f pushad 0x00000040 push ecx 0x00000041 jmp 00007F5D692C6EEAh 0x00000046 pop ecx 0x00000047 push edi 0x00000048 push eax 0x00000049 push edx 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A8F56 second address: 11A8F5C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B05F9 second address: 11B05FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B05FD second address: 11B0656 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 call 00007F5D68C8BFFAh 0x0000000e mov di, EE27h 0x00000012 pop ebx 0x00000013 push 00000000h 0x00000015 jmp 00007F5D68C8BFFFh 0x0000001a push 00000000h 0x0000001c push 00000000h 0x0000001e push esi 0x0000001f call 00007F5D68C8BFF8h 0x00000024 pop esi 0x00000025 mov dword ptr [esp+04h], esi 0x00000029 add dword ptr [esp+04h], 00000016h 0x00000031 inc esi 0x00000032 push esi 0x00000033 ret 0x00000034 pop esi 0x00000035 ret 0x00000036 mov ebx, 01CE7400h 0x0000003b xchg eax, esi 0x0000003c push eax 0x0000003d push edx 0x0000003e push ecx 0x0000003f jnl 00007F5D68C8BFF6h 0x00000045 pop ecx 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B0656 second address: 11B065C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B065C second address: 11B0660 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B24F6 second address: 11B251A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 pushad 0x00000007 jmp 00007F5D692C6EEFh 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F5D692C6EECh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B251A second address: 11B253C instructions: 0x00000000 rdtsc 0x00000002 je 00007F5D68C8BFF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c mov edi, eax 0x0000000e push 00000000h 0x00000010 mov ebx, 1F4A9CB9h 0x00000015 mov edi, eax 0x00000017 push 00000000h 0x00000019 mov bx, di 0x0000001c push eax 0x0000001d push edi 0x0000001e push eax 0x0000001f push edx 0x00000020 push ebx 0x00000021 pop ebx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11AE593 second address: 11AE597 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B0796 second address: 11B079C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B1700 second address: 11B1733 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D692C6EF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jo 00007F5D692C6EECh 0x00000011 jns 00007F5D692C6EE6h 0x00000017 push eax 0x00000018 push edx 0x00000019 je 00007F5D692C6EE6h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B079C second address: 11B07A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B1733 second address: 11B17CC instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ecx 0x0000000b call 00007F5D692C6EE8h 0x00000010 pop ecx 0x00000011 mov dword ptr [esp+04h], ecx 0x00000015 add dword ptr [esp+04h], 00000018h 0x0000001d inc ecx 0x0000001e push ecx 0x0000001f ret 0x00000020 pop ecx 0x00000021 ret 0x00000022 sub dword ptr [ebp+122D33A4h], ebx 0x00000028 mov edi, eax 0x0000002a push dword ptr fs:[00000000h] 0x00000031 push 00000000h 0x00000033 push edi 0x00000034 call 00007F5D692C6EE8h 0x00000039 pop edi 0x0000003a mov dword ptr [esp+04h], edi 0x0000003e add dword ptr [esp+04h], 00000018h 0x00000046 inc edi 0x00000047 push edi 0x00000048 ret 0x00000049 pop edi 0x0000004a ret 0x0000004b push ecx 0x0000004c add ebx, dword ptr [ebp+122D2286h] 0x00000052 pop edi 0x00000053 add edi, 6C6A63EAh 0x00000059 mov dword ptr fs:[00000000h], esp 0x00000060 jmp 00007F5D692C6EF3h 0x00000065 mov eax, dword ptr [ebp+122D00C5h] 0x0000006b or edi, 5194547Ch 0x00000071 push FFFFFFFFh 0x00000073 or edi, 462CDCC7h 0x00000079 push eax 0x0000007a pushad 0x0000007b push eax 0x0000007c push edx 0x0000007d pushad 0x0000007e popad 0x0000007f rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B2784 second address: 11B2789 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11AE6C2 second address: 11AE6D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F5D692C6EEEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B4513 second address: 11B4517 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B17CC second address: 11B17DA instructions: 0x00000000 rdtsc 0x00000002 jc 00007F5D692C6EE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11AE6D4 second address: 11AE6D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B0892 second address: 11B0896 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B4517 second address: 11B4532 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8C003h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B17DA second address: 11B17DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B0896 second address: 11B089C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B6BB0 second address: 11B6C43 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F5D692C6EE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b js 00007F5D692C6EE6h 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 popad 0x00000015 mov dword ptr [esp], eax 0x00000018 push 00000000h 0x0000001a push ebx 0x0000001b call 00007F5D692C6EE8h 0x00000020 pop ebx 0x00000021 mov dword ptr [esp+04h], ebx 0x00000025 add dword ptr [esp+04h], 00000019h 0x0000002d inc ebx 0x0000002e push ebx 0x0000002f ret 0x00000030 pop ebx 0x00000031 ret 0x00000032 pushad 0x00000033 sub dword ptr [ebp+122D3373h], edx 0x00000039 popad 0x0000003a push 00000000h 0x0000003c mov ebx, 336A36BCh 0x00000041 push 00000000h 0x00000043 add di, FC2Ah 0x00000048 call 00007F5D692C6EF6h 0x0000004d jmp 00007F5D692C6EF8h 0x00000052 pop ebx 0x00000053 xchg eax, esi 0x00000054 push eax 0x00000055 push edx 0x00000056 jmp 00007F5D692C6EF2h 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11BE24C second address: 11BE2E3 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F5D68C8BFFCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push edi 0x0000000e call 00007F5D68C8BFF8h 0x00000013 pop edi 0x00000014 mov dword ptr [esp+04h], edi 0x00000018 add dword ptr [esp+04h], 00000019h 0x00000020 inc edi 0x00000021 push edi 0x00000022 ret 0x00000023 pop edi 0x00000024 ret 0x00000025 mov dword ptr [ebp+122D1DEFh], ebx 0x0000002b push 00000000h 0x0000002d push 00000000h 0x0000002f push ebp 0x00000030 call 00007F5D68C8BFF8h 0x00000035 pop ebp 0x00000036 mov dword ptr [esp+04h], ebp 0x0000003a add dword ptr [esp+04h], 0000001Ch 0x00000042 inc ebp 0x00000043 push ebp 0x00000044 ret 0x00000045 pop ebp 0x00000046 ret 0x00000047 call 00007F5D68C8C005h 0x0000004c mov edi, 2656864Eh 0x00000051 pop ebx 0x00000052 push 00000000h 0x00000054 mov bl, ch 0x00000056 xchg eax, esi 0x00000057 push edx 0x00000058 jne 00007F5D68C8BFF8h 0x0000005e pop edx 0x0000005f push eax 0x00000060 push eax 0x00000061 push edx 0x00000062 jmp 00007F5D68C8BFFCh 0x00000067 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11B7D0B second address: 11B7D8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 mov edi, 00C1ED62h 0x0000000e push dword ptr fs:[00000000h] 0x00000015 xor edi, 0C4B9E18h 0x0000001b mov ebx, dword ptr [ebp+122D1E1Fh] 0x00000021 mov dword ptr fs:[00000000h], esp 0x00000028 push 00000000h 0x0000002a push eax 0x0000002b call 00007F5D692C6EE8h 0x00000030 pop eax 0x00000031 mov dword ptr [esp+04h], eax 0x00000035 add dword ptr [esp+04h], 00000017h 0x0000003d inc eax 0x0000003e push eax 0x0000003f ret 0x00000040 pop eax 0x00000041 ret 0x00000042 mov edi, dword ptr [ebp+122D2B16h] 0x00000048 mov eax, dword ptr [ebp+122D12D5h] 0x0000004e mov bx, 1EC1h 0x00000052 push FFFFFFFFh 0x00000054 mov ebx, dword ptr [ebp+122D2B5Ah] 0x0000005a nop 0x0000005b push edx 0x0000005c pushad 0x0000005d push ecx 0x0000005e pop ecx 0x0000005f jmp 00007F5D692C6EF4h 0x00000064 popad 0x00000065 pop edx 0x00000066 push eax 0x00000067 push eax 0x00000068 push eax 0x00000069 push eax 0x0000006a push edx 0x0000006b rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11BE2E3 second address: 11BE2E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11C9C83 second address: 11C9C9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 jmp 00007F5D692C6EF1h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11C9C9E second address: 11C9CA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11C9CA3 second address: 11C9CB3 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 jng 00007F5D692C6EE6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11C9CB3 second address: 11C9CB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11C952C second address: 11C9537 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11C9537 second address: 11C9540 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11C97D4 second address: 11C97FF instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 js 00007F5D692C6EE6h 0x00000009 jmp 00007F5D692C6EF5h 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F5D692C6EEAh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11CDEF3 second address: 11CDF00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jbe 00007F5D68C8BFF6h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11CDF00 second address: 11CDF1C instructions: 0x00000000 rdtsc 0x00000002 ja 00007F5D692C6EE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov eax, dword ptr [eax] 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F5D692C6EEDh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11CDF1C second address: 11CDF21 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11CDF21 second address: 11CDF37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 jp 00007F5D692C6EE6h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11CDF37 second address: 11CDF3B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11CDF3B second address: 11CDF45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11CDF45 second address: 11CDF49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D3BC5 second address: 11D3BDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 push edx 0x00000007 pop edx 0x00000008 jmp 00007F5D692C6EEFh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D3BDE second address: 11D3C0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F5D68C8C004h 0x0000000e push edi 0x0000000f pop edi 0x00000010 popad 0x00000011 pushad 0x00000012 jnl 00007F5D68C8BFF6h 0x00000018 je 00007F5D68C8BFF6h 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D3119 second address: 11D3134 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007F5D692C6EEEh 0x0000000c popad 0x0000000d pushad 0x0000000e push eax 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D3134 second address: 11D3143 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jno 00007F5D68C8BFF6h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D3143 second address: 11D3155 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F5D692C6EE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jp 00007F5D692C6EE6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D328F second address: 11D3293 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D3293 second address: 11D3299 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D3299 second address: 11D32A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D32A5 second address: 11D32AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D32AB second address: 11D32B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D33EF second address: 11D33FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push esi 0x00000006 pop esi 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D3874 second address: 11D3879 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D3879 second address: 11D38C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F5D692C6EF8h 0x00000008 jo 00007F5D692C6EE6h 0x0000000e jmp 00007F5D692C6EF9h 0x00000013 popad 0x00000014 pop edx 0x00000015 pop eax 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F5D692C6EEDh 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D38C7 second address: 11D38E3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8BFFEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d jc 00007F5D68C8BFF6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D38E3 second address: 11D38E7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D38E7 second address: 11D38ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D9512 second address: 11D9537 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F5D692C6EE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jmp 00007F5D692C6EF8h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D9537 second address: 11D954D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F5D68C8BFFDh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D8053 second address: 11D806A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D692C6EEDh 0x00000007 jbe 00007F5D692C6EE6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D806A second address: 11D8070 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D8070 second address: 11D807F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F5D692C6EEBh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D8333 second address: 11D8345 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F5D68C8BFF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jo 00007F5D68C8BFF6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D8D4D second address: 11D8D53 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D8D53 second address: 11D8D61 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jp 00007F5D68C8BFF6h 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D8D61 second address: 11D8D65 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D8EB2 second address: 11D8ED8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jc 00007F5D68C8BFF6h 0x00000009 jmp 00007F5D68C8C001h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pushad 0x00000012 js 00007F5D68C8C009h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D8ED8 second address: 11D8F0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F5D692C6EEDh 0x00000009 jmp 00007F5D692C6EF1h 0x0000000e jmp 00007F5D692C6EEDh 0x00000013 push eax 0x00000014 push edx 0x00000015 push esi 0x00000016 pop esi 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D8F0B second address: 11D8F0F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 118AEF5 second address: 118AF08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edi 0x00000007 pop edi 0x00000008 popad 0x00000009 popad 0x0000000a jne 00007F5D692C6F05h 0x00000010 push ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D9313 second address: 11D933B instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F5D68C8C008h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e ja 00007F5D68C8BFF6h 0x00000014 push edi 0x00000015 pop edi 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D933B second address: 11D933F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D933F second address: 11D9345 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D9345 second address: 11D934F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D934F second address: 11D9353 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11D9353 second address: 11D9359 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E1219 second address: 11E121D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E121D second address: 11E1223 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E1385 second address: 11E138D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E138D second address: 11E1392 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E1392 second address: 11E139E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push edx 0x00000006 pop edx 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a push esi 0x0000000b pop esi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E139E second address: 11E13A8 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F5D692C6EE6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E1B96 second address: 11E1BA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E1BA1 second address: 11E1BAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F5D692C6EEAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E1BAF second address: 11E1BCE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8BFFAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jbe 00007F5D68C8BFFEh 0x0000000f push edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E1D3B second address: 11E1D3F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E5863 second address: 11E5867 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E5867 second address: 11E5871 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E5871 second address: 11E5875 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11AB4C1 second address: 11AB4C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11AB4C5 second address: 11AB4CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11AB790 second address: 11AB7C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 mov eax, dword ptr [esp+04h] 0x00000009 jmp 00007F5D692C6EEEh 0x0000000e mov eax, dword ptr [eax] 0x00000010 jmp 00007F5D692C6EF0h 0x00000015 mov dword ptr [esp+04h], eax 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c pushad 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11AB7C4 second address: 11AB7C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11AB7C9 second address: 11AB7CE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11AB892 second address: 11AB898 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11AB9E1 second address: 11AB9E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11AC177 second address: 11AC191 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8C000h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11AC191 second address: 11AC195 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11AC195 second address: 11AC199 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11AC29B second address: 11AC2B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F5D692C6EF3h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E5C6F second address: 11E5C75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E5C75 second address: 11E5C7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E5C7F second address: 11E5C87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E5DDA second address: 11E5DE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jc 00007F5D692C6EEAh 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E5F3D second address: 11E5F45 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E6123 second address: 11E6129 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E641C second address: 11E643C instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F5D68C8C00Ah 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b pop edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11E643C second address: 11E645C instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c jmp 00007F5D692C6EEAh 0x00000011 pushad 0x00000012 popad 0x00000013 jnl 00007F5D692C6EE6h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 116C4FD second address: 116C503 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11ECB5A second address: 11ECB62 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11ECB62 second address: 11ECB7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jmp 00007F5D68C8C001h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11F163B second address: 11F163F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11F163F second address: 11F1663 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007F5D68C8BFFEh 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jo 00007F5D68C8BFF6h 0x00000015 jne 00007F5D68C8BFF6h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11F17A0 second address: 11F17A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11F17A6 second address: 11F17B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8BFFFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11F7C5E second address: 11F7C8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F5D692C6EF5h 0x00000009 jc 00007F5D692C6EE6h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F5D692C6EEBh 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11ABC71 second address: 11ABCB3 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F5D68C8C001h 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push ecx 0x0000000f call 00007F5D68C8BFF8h 0x00000014 pop ecx 0x00000015 mov dword ptr [esp+04h], ecx 0x00000019 add dword ptr [esp+04h], 00000014h 0x00000021 inc ecx 0x00000022 push ecx 0x00000023 ret 0x00000024 pop ecx 0x00000025 ret 0x00000026 push 00000004h 0x00000028 mov ch, F4h 0x0000002a nop 0x0000002b pushad 0x0000002c jbe 00007F5D68C8BFFCh 0x00000032 push eax 0x00000033 push edx 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11ABCB3 second address: 11ABCDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d jmp 00007F5D692C6EEEh 0x00000012 pushad 0x00000013 jmp 00007F5D692C6EEBh 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11F82E1 second address: 11F82E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11F82E7 second address: 11F8304 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jl 00007F5D692C6EF8h 0x0000000b je 00007F5D692C6EE6h 0x00000011 jmp 00007F5D692C6EECh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11F8304 second address: 11F8318 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F5D68C8BFFAh 0x00000009 jnp 00007F5D68C8BFF6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11F8318 second address: 11F832C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jno 00007F5D692C6EE6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push ecx 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11F832C second address: 11F834D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F5D68C8C004h 0x00000010 push eax 0x00000011 pop eax 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11F834D second address: 11F8353 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11F8C8B second address: 11F8CC1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push edi 0x00000006 pop edi 0x00000007 popad 0x00000008 push esi 0x00000009 pushad 0x0000000a popad 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d pop esi 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 jmp 00007F5D68C8C007h 0x00000016 je 00007F5D68C8BFF8h 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f popad 0x00000020 push edx 0x00000021 pop edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11FE4C6 second address: 11FE4CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11FD832 second address: 11FD859 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F5D68C8C009h 0x0000000d jns 00007F5D68C8BFF6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11FD859 second address: 11FD85D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11FD85D second address: 11FD868 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11FD9AB second address: 11FD9B5 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F5D692C6EE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11FD9B5 second address: 11FD9BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push edx 0x00000007 pop edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11FD9BD second address: 11FD9C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11FDCAE second address: 11FDCBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jg 00007F5D68C8BFF6h 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11FDCBB second address: 11FDD28 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F5D692C6F09h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push ecx 0x0000000c jmp 00007F5D692C6EF7h 0x00000011 pushad 0x00000012 popad 0x00000013 pop ecx 0x00000014 push esi 0x00000015 jmp 00007F5D692C6EF7h 0x0000001a push ecx 0x0000001b pop ecx 0x0000001c pop esi 0x0000001d push ebx 0x0000001e jno 00007F5D692C6EE6h 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11FDE97 second address: 11FDEA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F5D68C8BFFEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11FDEA9 second address: 11FDEAD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11FDEAD second address: 11FDEB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11FDEB7 second address: 11FDEBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11FDEBB second address: 11FDEE3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8C000h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jng 00007F5D68C8BFFAh 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 pop eax 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 push edi 0x00000018 pop edi 0x00000019 push ecx 0x0000001a pop ecx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11FDEE3 second address: 11FDEE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1200B2A second address: 1200B2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1200B2E second address: 1200B32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1200B32 second address: 1200B4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F5D68C8C003h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1200B4B second address: 1200B50 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1200B50 second address: 1200B6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jg 00007F5D68C8C00Eh 0x0000000b jmp 00007F5D68C8C002h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1200CDF second address: 1200CFB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D692C6EF8h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1200CFB second address: 1200D01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1200D01 second address: 1200D08 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1200D08 second address: 1200D26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F5D68C8BFF6h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push esi 0x0000000e jmp 00007F5D68C8BFFEh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1200E5F second address: 1200E89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 pop ecx 0x00000009 jl 00007F5D692C6EFBh 0x0000000f pushad 0x00000010 popad 0x00000011 jmp 00007F5D692C6EF3h 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1200E89 second address: 1200E98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jp 00007F5D68C8BFF6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1200E98 second address: 1200E9E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1200E9E second address: 1200EAB instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 ja 00007F5D68C8BFF6h 0x00000009 pop ebx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1201155 second address: 120115B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 120AAF9 second address: 120AB12 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8C005h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 120AB12 second address: 120AB32 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 js 00007F5D692C6EE6h 0x00000009 jmp 00007F5D692C6EF5h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1208E03 second address: 1208E21 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8C004h 0x00000007 push eax 0x00000008 push edx 0x00000009 jnl 00007F5D68C8BFF6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1208E21 second address: 1208E25 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1209114 second address: 120911A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1209F6A second address: 1209F70 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1209F70 second address: 1209F92 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F5D68C8C002h 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 pushad 0x00000011 popad 0x00000012 pushad 0x00000013 popad 0x00000014 pop edi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 120A529 second address: 120A52F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 120A52F second address: 120A563 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F5D68C8C00Bh 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d jns 00007F5D68C8BFF6h 0x00000013 popad 0x00000014 pop edx 0x00000015 pop eax 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 je 00007F5D68C8BFF6h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 120A563 second address: 120A585 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D692C6EF7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a pushad 0x0000000b popad 0x0000000c pop ecx 0x0000000d push ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 120E527 second address: 120E544 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F5D68C8BFFEh 0x00000008 jns 00007F5D68C8BFF6h 0x0000000e push edi 0x0000000f pop edi 0x00000010 pop edx 0x00000011 pop eax 0x00000012 pushad 0x00000013 push edi 0x00000014 pushad 0x00000015 popad 0x00000016 push ebx 0x00000017 pop ebx 0x00000018 pop edi 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 120E683 second address: 120E68A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1219B32 second address: 1219B68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push esi 0x00000007 pop esi 0x00000008 popad 0x00000009 pop esi 0x0000000a push eax 0x0000000b push edi 0x0000000c jmp 00007F5D68C8C003h 0x00000011 push esi 0x00000012 pop esi 0x00000013 pop edi 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F5D68C8C000h 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1219B68 second address: 1219B6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1219F5D second address: 1219F61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1219F61 second address: 1219F65 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 121A447 second address: 121A44B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 121AEC1 second address: 121AEF6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F5D692C6EF5h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F5D692C6EF1h 0x00000013 jne 00007F5D692C6EE6h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 121AEF6 second address: 121AEFA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 121959C second address: 12195A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 122355F second address: 1223591 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8C008h 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F5D68C8C006h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1223591 second address: 122359B instructions: 0x00000000 rdtsc 0x00000002 ja 00007F5D692C6EE6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 122329F second address: 12232A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 12232A3 second address: 12232D9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D692C6EEBh 0x00000007 jmp 00007F5D692C6EEFh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F5D692C6EF6h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1230EEB second address: 1230EFF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F5D68C8BFFEh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1230EFF second address: 1230F03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1230F03 second address: 1230F07 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1230F07 second address: 1230F0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1230F0D second address: 1230F1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007F5D68C8BFFCh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1231083 second address: 1231093 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F5D692C6EE6h 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1231093 second address: 12310A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jnl 00007F5D68C8BFF6h 0x0000000c popad 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 123379C second address: 12337A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 12337A0 second address: 12337A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 12382A5 second address: 12382B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 12382B1 second address: 12382BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F5D68C8BFF6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 12382BC second address: 12382C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jo 00007F5D692C6EE6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 12382C8 second address: 123830D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F5D68C8C008h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jl 00007F5D68C8C00Ah 0x00000011 jmp 00007F5D68C8C002h 0x00000016 push esi 0x00000017 pop esi 0x00000018 pop edx 0x00000019 pop eax 0x0000001a jo 00007F5D68C8C008h 0x00000020 pushad 0x00000021 pushad 0x00000022 popad 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 123830D second address: 1238313 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1238462 second address: 12384A6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8C001h 0x00000007 js 00007F5D68C8BFF6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F5D68C8C006h 0x00000016 jmp 00007F5D68C8C001h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 12384A6 second address: 12384E3 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F5D692C6EE6h 0x00000008 ja 00007F5D692C6EE6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jg 00007F5D692C6EEEh 0x00000016 jmp 00007F5D692C6EF9h 0x0000001b popad 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 12384E3 second address: 12384E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 12384E9 second address: 12384ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 124722E second address: 1247232 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1247232 second address: 1247236 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1247236 second address: 124723C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 124712A second address: 124712F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 124712F second address: 1247139 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 124FA78 second address: 124FA7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 124FA7C second address: 124FA80 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 124FA80 second address: 124FA94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F5D692C6EE6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edi 0x0000000d push edi 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 124FA94 second address: 124FA98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 124FBE1 second address: 124FBE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 124FBE5 second address: 124FBEB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 124FD37 second address: 124FD41 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F5D692C6EE6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 124FD41 second address: 124FD47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 124FD47 second address: 124FD4E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 124FD4E second address: 124FD7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 jmp 00007F5D68C8C000h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 jmp 00007F5D68C8BFFEh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 124FD7B second address: 124FD81 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 124FD81 second address: 124FD9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007F5D68C8BFFCh 0x0000000c jo 00007F5D68C8BFF6h 0x00000012 pop eax 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 124FD9B second address: 124FDA0 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1254BF3 second address: 1254BFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jno 00007F5D68C8BFF6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1254BFF second address: 1254C03 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1254C03 second address: 1254C09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1254C09 second address: 1254C19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 js 00007F5D692C6EFEh 0x0000000d push esi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1254C19 second address: 1254C1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1254D97 second address: 1254D9D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1254D9D second address: 1254DA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1262414 second address: 1262420 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jo 00007F5D692C6EE6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 125FA4B second address: 125FA7D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8C008h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F5D68C8BFFEh 0x0000000f push eax 0x00000010 push edx 0x00000011 jnp 00007F5D68C8BFF6h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 125FA7D second address: 125FA92 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jc 00007F5D692C6EE6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ebx 0x0000000d jg 00007F5D692C6EE6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1168D92 second address: 1168D96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1168D96 second address: 1168D9A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 12720E9 second address: 12720F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 12750AB second address: 12750AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1274BDE second address: 1274BFA instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F5D68C8C005h 0x00000008 pop ebx 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1274D80 second address: 1274DA2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F5D692C6EF3h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c ja 00007F5D692C6EE6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1274DA2 second address: 1274DB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F5D68C8BFFBh 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1274DB7 second address: 1274DBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1274DBD second address: 1274DC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1276816 second address: 1276829 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F5D692C6EEEh 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a jnl 00007F5D692C6EE6h 0x00000010 push ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1276829 second address: 1276835 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a push esi 0x0000000b pop esi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 128AF78 second address: 128AF7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1289D6A second address: 1289D7B instructions: 0x00000000 rdtsc 0x00000002 jc 00007F5D68C8BFFAh 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d push eax 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 128A1D2 second address: 128A203 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F5D692C6EF8h 0x00000009 jng 00007F5D692C6EE6h 0x0000000f popad 0x00000010 jmp 00007F5D692C6EEAh 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 128A203 second address: 128A207 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 128A32A second address: 128A347 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F5D692C6EF9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 128A347 second address: 128A34B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 128A669 second address: 128A673 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push esi 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 128A673 second address: 128A6A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007F5D68C8C009h 0x0000000a push ecx 0x0000000b jmp 00007F5D68C8BFFCh 0x00000010 pop ecx 0x00000011 popad 0x00000012 push edx 0x00000013 jp 00007F5D68C8BFFCh 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 128A6A9 second address: 128A6BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jns 00007F5D692C6EE6h 0x0000000c js 00007F5D692C6EE6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 128A80F second address: 128A815 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 128A815 second address: 128A81B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 128A81B second address: 128A821 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 128A821 second address: 128A826 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 128A826 second address: 128A82C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 128A980 second address: 128A9A3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F5D692C6EF7h 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e push eax 0x0000000f pop eax 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 128A9A3 second address: 128A9A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 128A9A8 second address: 128A9B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F5D692C6EEBh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 129075D second address: 129076A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jl 00007F5D68C8BFFCh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1290C6D second address: 1290C7B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F5D692C6EEAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1290C7B second address: 1290D39 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F5D68C8BFF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d js 00007F5D68C8C001h 0x00000013 jmp 00007F5D68C8BFFBh 0x00000018 nop 0x00000019 push 00000000h 0x0000001b push eax 0x0000001c call 00007F5D68C8BFF8h 0x00000021 pop eax 0x00000022 mov dword ptr [esp+04h], eax 0x00000026 add dword ptr [esp+04h], 00000014h 0x0000002e inc eax 0x0000002f push eax 0x00000030 ret 0x00000031 pop eax 0x00000032 ret 0x00000033 jmp 00007F5D68C8C003h 0x00000038 mov dword ptr [ebp+122D1E51h], edi 0x0000003e push dword ptr [ebp+122D3889h] 0x00000044 push 00000000h 0x00000046 push ebp 0x00000047 call 00007F5D68C8BFF8h 0x0000004c pop ebp 0x0000004d mov dword ptr [esp+04h], ebp 0x00000051 add dword ptr [esp+04h], 00000016h 0x00000059 inc ebp 0x0000005a push ebp 0x0000005b ret 0x0000005c pop ebp 0x0000005d ret 0x0000005e jmp 00007F5D68C8C007h 0x00000063 or dh, FFFFFF94h 0x00000066 call 00007F5D68C8BFF9h 0x0000006b jmp 00007F5D68C8BFFDh 0x00000070 push eax 0x00000071 jmp 00007F5D68C8BFFBh 0x00000076 mov eax, dword ptr [esp+04h] 0x0000007a push eax 0x0000007b push edx 0x0000007c push eax 0x0000007d push edx 0x0000007e pushad 0x0000007f popad 0x00000080 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1290D39 second address: 1290D43 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F5D692C6EE6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1290D43 second address: 1290D76 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F5D68C8C009h 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov eax, dword ptr [eax] 0x0000000d jmp 00007F5D68C8BFFAh 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 push ebx 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 12926D0 second address: 12926E4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jnl 00007F5D692C6EE6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jns 00007F5D692C6EE8h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 12926E4 second address: 12926EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F5D68C8BFF6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 12926EE second address: 12926F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 1294183 second address: 1294189 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 11A6066 second address: 11A606B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56A026E second address: 56A030C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F5D68C8BFFFh 0x00000009 adc ax, 78DEh 0x0000000e jmp 00007F5D68C8C009h 0x00000013 popfd 0x00000014 pushfd 0x00000015 jmp 00007F5D68C8C000h 0x0000001a xor si, 38D8h 0x0000001f jmp 00007F5D68C8BFFBh 0x00000024 popfd 0x00000025 popad 0x00000026 pop edx 0x00000027 pop eax 0x00000028 xchg eax, ebp 0x00000029 pushad 0x0000002a pushfd 0x0000002b jmp 00007F5D68C8C004h 0x00000030 adc cl, 00000038h 0x00000033 jmp 00007F5D68C8BFFBh 0x00000038 popfd 0x00000039 pushad 0x0000003a mov eax, 2C9A6705h 0x0000003f jmp 00007F5D68C8C002h 0x00000044 popad 0x00000045 popad 0x00000046 push eax 0x00000047 push eax 0x00000048 push edx 0x00000049 push eax 0x0000004a push edx 0x0000004b pushad 0x0000004c popad 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56A030C second address: 56A0310 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56A0310 second address: 56A0316 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56A0316 second address: 56A033B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop esi 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F5D692C6EF8h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56A033B second address: 56A0388 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8BFFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c mov cx, DB3Bh 0x00000010 call 00007F5D68C8C000h 0x00000015 mov dx, cx 0x00000018 pop ecx 0x00000019 popad 0x0000001a mov edx, dword ptr [ebp+0Ch] 0x0000001d jmp 00007F5D68C8BFFDh 0x00000022 mov ecx, dword ptr [ebp+08h] 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007F5D68C8BFFDh 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C0698 second address: 56C069D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C069D second address: 56C06D8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8BFFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b mov ebx, ecx 0x0000000d mov bl, ch 0x0000000f popad 0x00000010 push eax 0x00000011 jmp 00007F5D68C8BFFAh 0x00000016 xchg eax, ebp 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007F5D68C8C007h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C06D8 second address: 56C06F0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F5D692C6EF4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C06F0 second address: 56C06F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C06F4 second address: 56C071F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a jmp 00007F5D692C6EF7h 0x0000000f xchg eax, ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 mov dh, 60h 0x00000015 mov bx, si 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C071F second address: 56C0725 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C0725 second address: 56C0729 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C0729 second address: 56C072D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C072D second address: 56C07D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F5D692C6EEEh 0x0000000e xchg eax, ecx 0x0000000f pushad 0x00000010 call 00007F5D692C6EEEh 0x00000015 mov dl, cl 0x00000017 pop edx 0x00000018 popad 0x00000019 push ecx 0x0000001a pushad 0x0000001b mov dx, si 0x0000001e pushfd 0x0000001f jmp 00007F5D692C6EF0h 0x00000024 sbb eax, 4DA63278h 0x0000002a jmp 00007F5D692C6EEBh 0x0000002f popfd 0x00000030 popad 0x00000031 mov dword ptr [esp], esi 0x00000034 jmp 00007F5D692C6EF6h 0x00000039 lea eax, dword ptr [ebp-04h] 0x0000003c pushad 0x0000003d mov dx, cx 0x00000040 mov di, ax 0x00000043 popad 0x00000044 nop 0x00000045 jmp 00007F5D692C6EF4h 0x0000004a push eax 0x0000004b pushad 0x0000004c jmp 00007F5D692C6EF1h 0x00000051 push esi 0x00000052 push eax 0x00000053 push edx 0x00000054 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C07D0 second address: 56C0808 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 nop 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007F5D68C8C005h 0x00000010 xor al, FFFFFF86h 0x00000013 jmp 00007F5D68C8C001h 0x00000018 popfd 0x00000019 push ecx 0x0000001a pop ebx 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C0808 second address: 56C0841 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F5D692C6EF3h 0x00000009 xor esi, 58B667BEh 0x0000000f jmp 00007F5D692C6EF9h 0x00000014 popfd 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C0841 second address: 56C0851 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push dword ptr [ebp+08h] 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d mov dx, ax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C0899 second address: 56C089D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C089D second address: 56C08A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C0903 second address: 56C095E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F5D692C6EF7h 0x00000008 pop eax 0x00000009 mov ax, dx 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov eax, esi 0x00000011 pushad 0x00000012 push ebx 0x00000013 mov eax, 653FADE3h 0x00000018 pop eax 0x00000019 call 00007F5D692C6EF9h 0x0000001e jmp 00007F5D692C6EF0h 0x00000023 pop ecx 0x00000024 popad 0x00000025 pop esi 0x00000026 pushad 0x00000027 pushad 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0215 second address: 56B021B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B021B second address: 56B021F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B02D1 second address: 56B02FC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8C009h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub ebx, ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F5D68C8BFFAh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B02FC second address: 56B0321 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D692C6EEBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub edi, edi 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F5D692C6EF2h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0321 second address: 56B0327 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0327 second address: 56B032B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B032B second address: 56B0345 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8BFFDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b inc ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0345 second address: 56B0349 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0349 second address: 56B034D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B034D second address: 56B0353 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0353 second address: 56B0404 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8C002h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test al, al 0x0000000b pushad 0x0000000c mov cl, 74h 0x0000000e pushfd 0x0000000f jmp 00007F5D68C8C003h 0x00000014 jmp 00007F5D68C8C003h 0x00000019 popfd 0x0000001a popad 0x0000001b je 00007F5D68C8C18Ah 0x00000021 pushad 0x00000022 pushfd 0x00000023 jmp 00007F5D68C8C004h 0x00000028 xor ax, FA38h 0x0000002d jmp 00007F5D68C8BFFBh 0x00000032 popfd 0x00000033 pushfd 0x00000034 jmp 00007F5D68C8C008h 0x00000039 sub ax, F498h 0x0000003e jmp 00007F5D68C8BFFBh 0x00000043 popfd 0x00000044 popad 0x00000045 lea ecx, dword ptr [ebp-14h] 0x00000048 pushad 0x00000049 mov eax, 0D922C6Bh 0x0000004e mov edi, eax 0x00000050 popad 0x00000051 mov dword ptr [ebp-14h], edi 0x00000054 pushad 0x00000055 pushad 0x00000056 pushad 0x00000057 popad 0x00000058 push eax 0x00000059 push edx 0x0000005a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0451 second address: 56B0457 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0457 second address: 56B045D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B045D second address: 56B0461 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B048C second address: 56B0490 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0490 second address: 56B0496 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0496 second address: 56B04D8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8BFFAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test eax, eax 0x0000000b jmp 00007F5D68C8C000h 0x00000010 jg 00007F5DD9079FCCh 0x00000016 pushad 0x00000017 mov edx, eax 0x00000019 mov eax, 4FB0C389h 0x0000001e popad 0x0000001f js 00007F5D68C8C05Ch 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007F5D68C8BFFBh 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B04D8 second address: 56B056B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D692C6EF9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [ebp-14h], edi 0x0000000c pushad 0x0000000d mov edx, eax 0x0000000f pushfd 0x00000010 jmp 00007F5D692C6EF8h 0x00000015 sbb cx, 3468h 0x0000001a jmp 00007F5D692C6EEBh 0x0000001f popfd 0x00000020 popad 0x00000021 jne 00007F5DD96B4E5Bh 0x00000027 pushad 0x00000028 movzx esi, di 0x0000002b popad 0x0000002c mov ebx, dword ptr [ebp+08h] 0x0000002f jmp 00007F5D692C6EEAh 0x00000034 lea eax, dword ptr [ebp-2Ch] 0x00000037 jmp 00007F5D692C6EF0h 0x0000003c xchg eax, esi 0x0000003d push eax 0x0000003e push edx 0x0000003f jmp 00007F5D692C6EF7h 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B056B second address: 56B05E7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edx, ax 0x00000006 pushfd 0x00000007 jmp 00007F5D68C8C000h 0x0000000c adc esi, 5120BB88h 0x00000012 jmp 00007F5D68C8BFFBh 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b push eax 0x0000001c pushad 0x0000001d pushfd 0x0000001e jmp 00007F5D68C8BFFFh 0x00000023 or cx, 2FCEh 0x00000028 jmp 00007F5D68C8C009h 0x0000002d popfd 0x0000002e mov edi, ecx 0x00000030 popad 0x00000031 xchg eax, esi 0x00000032 pushad 0x00000033 call 00007F5D68C8C008h 0x00000038 push eax 0x00000039 push edx 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B05E7 second address: 56B0604 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007F5D692C6EF1h 0x0000000a popad 0x0000000b nop 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0604 second address: 56B0648 instructions: 0x00000000 rdtsc 0x00000002 movzx esi, bx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushfd 0x00000008 jmp 00007F5D68C8C005h 0x0000000d add si, 56C6h 0x00000012 jmp 00007F5D68C8C001h 0x00000017 popfd 0x00000018 popad 0x00000019 push eax 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F5D68C8BFFCh 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0648 second address: 56B064E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B064E second address: 56B0652 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0652 second address: 56B066E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D692C6EEDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 mov dh, 5Bh 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B066E second address: 56B06BE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F5D68C8C001h 0x00000009 sub ax, 1036h 0x0000000e jmp 00007F5D68C8C001h 0x00000013 popfd 0x00000014 mov eax, 36A8B027h 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c xchg eax, ebx 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007F5D68C8C009h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0725 second address: 56B072B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B072B second address: 56B072F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B072F second address: 56B0733 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0118 second address: 56B0127 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8BFFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0BB2 second address: 56B0BB6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0BB6 second address: 56B0BBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0BBC second address: 56B0BDF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D692C6EEEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F5D692C6EECh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0BDF second address: 56B0BE3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0BE3 second address: 56B0C10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov cx, C8D7h 0x0000000a popad 0x0000000b cmp dword ptr [75AF459Ch], 05h 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F5D692C6EF9h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56B0C9F second address: 56B0CD4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D68C8C001h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 add dword ptr [esp], 4FEB1C4Eh 0x00000010 jmp 00007F5D68C8BFFEh 0x00000015 call 00007F5DD9070E9Fh 0x0000001a push 75A92B70h 0x0000001f push dword ptr fs:[00000000h] 0x00000026 mov eax, dword ptr [esp+10h] 0x0000002a mov dword ptr [esp+10h], ebp 0x0000002e lea ebp, dword ptr [esp+10h] 0x00000032 sub esp, eax 0x00000034 push ebx 0x00000035 push esi 0x00000036 push edi 0x00000037 mov eax, dword ptr [75AF4538h] 0x0000003c xor dword ptr [ebp-04h], eax 0x0000003f xor eax, ebp 0x00000041 push eax 0x00000042 mov dword ptr [ebp-18h], esp 0x00000045 push dword ptr [ebp-08h] 0x00000048 mov eax, dword ptr [ebp-04h] 0x0000004b mov dword ptr [ebp-04h], FFFFFFFEh 0x00000052 mov dword ptr [ebp-08h], eax 0x00000055 lea eax, dword ptr [ebp-10h] 0x00000058 mov dword ptr fs:[00000000h], eax 0x0000005e ret 0x0000005f push eax 0x00000060 push edx 0x00000061 pushad 0x00000062 mov eax, edx 0x00000064 popad 0x00000065 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C0982 second address: 56C09D5 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F5D692C6EF8h 0x00000008 or si, EE18h 0x0000000d jmp 00007F5D692C6EEBh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 xchg eax, ebp 0x00000017 jmp 00007F5D692C6EF2h 0x0000001c push eax 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007F5D692C6EEEh 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C09D5 second address: 56C09DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C09DB second address: 56C09DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C09DF second address: 56C09E3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C09E3 second address: 56C0A02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F5D692C6EF4h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C0B3B second address: 56C0B3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C0B3F second address: 56C0B4F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F5D692C6EECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C0B94 second address: 56C0B9A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C0B9A second address: 56C0B9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C0B9E second address: 56C0BA2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C0BA2 second address: 56C0BBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F5D692C6EEDh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C0BBA second address: 56C0BCA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F5D68C8BFFCh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C0BCA second address: 56C0BCE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | RDTSC instruction interceptor: First address: 56C0BCE second address: 56C0BE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c push eax 0x0000000d pop ebx 0x0000000e mov esi, 4D972A2Bh 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.db | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnf | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpak | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddfffla | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifd | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.json | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.db | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf | Jump to behavior |
Source: C:\Users\user\Desktop\FjFeChttqA.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao | Jump to behavior |