Source: fr2Mul3G6m.exe, 00000005.00000002.2037623366.0000000000B47000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exe |
Source: fr2Mul3G6m.exe, 00000005.00000002.2037623366.0000000000B47000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exentS |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614571501.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614236994.0000000000BD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: fr2Mul3G6m.exe, 00000005.00000003.1400681191.000000000536E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: fr2Mul3G6m.exe, 00000005.00000003.1400681191.000000000536E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614236994.0000000000BD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614571501.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614236994.0000000000BD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614286324.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614800650.0000000000BC8000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000002.2037949478.0000000000BC9000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614352780.0000000000BBC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614571501.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614236994.0000000000BD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: fr2Mul3G6m.exe, 00000005.00000003.1452299566.0000000000B55000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1509909217.0000000000B9E000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1431528606.0000000000B55000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1343341041.0000000000B91000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1456632127.0000000000B55000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1432099705.0000000000B55000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.micro |
Source: fr2Mul3G6m.exe, 00000005.00000003.1400681191.000000000536E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614571501.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614236994.0000000000BD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: fr2Mul3G6m.exe, 00000005.00000003.1400681191.000000000536E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: fr2Mul3G6m.exe, 00000005.00000003.1400681191.000000000536E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614571501.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614236994.0000000000BD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: fr2Mul3G6m.exe, 00000005.00000003.1400681191.000000000536E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: fr2Mul3G6m.exe, 00000005.00000003.1400681191.000000000536E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: fr2Mul3G6m.exe, 00000005.00000002.2040229853.00000000058E9000.00000002.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614183822.0000000005333000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614005778.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614066380.0000000005361000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: fr2Mul3G6m.exe, 00000005.00000003.1400681191.000000000536E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614571501.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614236994.0000000000BD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0A |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614571501.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614236994.0000000000BD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0C |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614236994.0000000000BD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0X |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614286324.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614800650.0000000000BC8000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000002.2037949478.0000000000BC9000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614352780.0000000000BBC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614571501.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614236994.0000000000BD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/rootr30; |
Source: fr2Mul3G6m.exe, 00000005.00000003.1400681191.000000000536E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614286324.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614800650.0000000000BC8000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000002.2037949478.0000000000BC9000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614352780.0000000000BBC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614571501.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614236994.0000000000BD2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06 |
Source: Amcache.hve.10.dr | String found in binary or memory: http://upx.sf.net |
Source: fr2Mul3G6m.exe, 00000005.00000003.1400681191.000000000536E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: fr2Mul3G6m.exe, 00000005.00000003.1400681191.000000000536E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: fr2Mul3G6m.exe, 00000005.00000003.1347753650.0000000005369000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1347846205.0000000005369000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1347693011.000000000536C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614493196.0000000000BA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://aui-cdn.atlassian.com/ |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614493196.0000000000BA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614493196.0000000000BA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-exp.prod-east.frontend.public.atl-paas.net |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614493196.0000000000BA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614493196.0000000000BA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614493196.0000000000BA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/ |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614493196.0000000000BA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/; |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614493196.0000000000BA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/ |
Source: fr2Mul3G6m.exe, 00000005.00000002.2037623366.0000000000B47000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/ |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614352780.0000000000BBC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1- |
Source: fr2Mul3G6m.exe, fr2Mul3G6m.exe, 00000005.00000003.1614286324.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614413727.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000002.2037907014.0000000000BB1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/ |
Source: fr2Mul3G6m.exe, 00000005.00000002.2037623366.0000000000B55000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000002.2037949478.0000000000BC9000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614352780.0000000000BBC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe |
Source: fr2Mul3G6m.exe, 00000005.00000002.2037494463.00000000008FA000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe.0.0 |
Source: fr2Mul3G6m.exe, 00000005.00000002.2037623366.0000000000B55000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exeF |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614286324.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614413727.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000002.2037907014.0000000000BB1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/n |
Source: fr2Mul3G6m.exe, 00000005.00000003.1403621758.0000000005334000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700 |
Source: fr2Mul3G6m.exe, 00000005.00000003.1403621758.0000000005334000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700002.1&cta |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614493196.0000000000BA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.cookielaw.org/ |
Source: fr2Mul3G6m.exe, 00000005.00000003.1347753650.0000000005369000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1347846205.0000000005369000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1347693011.000000000536C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: fr2Mul3G6m.exe, 00000005.00000003.1347753650.0000000005369000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1347846205.0000000005369000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1347693011.000000000536C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: fr2Mul3G6m.exe, 00000005.00000003.1347753650.0000000005369000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1347846205.0000000005369000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1347693011.000000000536C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: fr2Mul3G6m.exe, 00000005.00000003.1403621758.0000000005334000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg |
Source: fr2Mul3G6m.exe, 00000005.00000003.1403621758.0000000005334000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: fr2Mul3G6m.exe, 00000005.00000003.1347753650.0000000005369000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1347846205.0000000005369000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1347693011.000000000536C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: fr2Mul3G6m.exe, 00000005.00000003.1347753650.0000000005369000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1347846205.0000000005369000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1347693011.000000000536C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: fr2Mul3G6m.exe, 00000005.00000003.1347753650.0000000005369000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1347846205.0000000005369000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1347693011.000000000536C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614711892.0000000005347000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000002.2039826381.0000000005348000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614183822.0000000005333000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://dz8aopenkvv6s.cloudfront.net |
Source: fr2Mul3G6m.exe, 00000005.00000003.1403621758.0000000005334000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi |
Source: fr2Mul3G6m.exe, fr2Mul3G6m.exe, 00000005.00000003.1452213019.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1452413726.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1343341041.0000000000B55000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614286324.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1346689010.0000000000B3E000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1346689010.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1343341041.0000000000B49000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1456874953.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1401425520.0000000000BC8000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1428862536.0000000000BCA000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1510232310.0000000000B32000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1457495731.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1399750303.0000000000BC8000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1429087929.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000002.2037927496.0000000000BBD000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614352780.0000000000BBC000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1431626589.0000000000B32000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/ |
Source: fr2Mul3G6m.exe, 00000005.00000003.1428862536.0000000000BCA000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/F |
Source: fr2Mul3G6m.exe, 00000005.00000003.1343341041.0000000000B55000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/U |
Source: fr2Mul3G6m.exe, fr2Mul3G6m.exe, 00000005.00000003.1452213019.0000000000BAE000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1456874953.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1343341041.0000000000B55000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614286324.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1509909217.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1343341041.0000000000B49000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614800650.0000000000BC8000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1346689010.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1429087929.0000000000BA2000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1510232310.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1510091812.0000000000B55000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000002.2037949478.0000000000BC9000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1431626589.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1374607576.0000000000BCA000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1510348815.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1452413726.0000000000B2C000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614352780.0000000000BBC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/api |
Source: fr2Mul3G6m.exe, 00000005.00000003.1452213019.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apial |
Source: fr2Mul3G6m.exe, 00000005.00000003.1429087929.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apiit |
Source: fr2Mul3G6m.exe, 00000005.00000003.1429087929.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/d |
Source: fr2Mul3G6m.exe, 00000005.00000003.1429087929.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/ero |
Source: fr2Mul3G6m.exe, 00000005.00000003.1452213019.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1456551411.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1457495731.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/es |
Source: fr2Mul3G6m.exe, 00000005.00000003.1457495731.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/pi |
Source: fr2Mul3G6m.exe, 00000005.00000003.1452213019.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1509909217.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1456551411.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1457495731.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1510348815.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/r7 |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614286324.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1509909217.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1510348815.0000000000BC1000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000002.2037927496.0000000000BBD000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614352780.0000000000BBC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/x |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614286324.0000000000B9E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.prod-east.frontend.public.atl-paas.net |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614286324.0000000000B9E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net |
Source: fr2Mul3G6m.exe, 00000005.00000003.1402887479.000000000545A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: fr2Mul3G6m.exe, 00000005.00000003.1402887479.000000000545A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614711892.0000000005347000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000002.2039826381.0000000005348000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614183822.0000000005333000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614286324.0000000000B9E000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614493196.0000000000BA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614286324.0000000000B9E000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614493196.0000000000BA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-websiteX-Frame-OptionsSAMEORIGINX- |
Source: fr2Mul3G6m.exe, 00000005.00000003.1403621758.0000000005334000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_15e498ec2b39921665a1fbc954bff40a8106629178eadc64 |
Source: fr2Mul3G6m.exe, 00000005.00000003.1347753650.0000000005369000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1347846205.0000000005369000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1347693011.000000000536C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: fr2Mul3G6m.exe, 00000005.00000003.1614286324.0000000000BAD000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614571501.0000000000B93000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614800650.0000000000BC8000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614236994.0000000000BD2000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000002.2037949478.0000000000BC9000.00000004.00000020.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1614352780.0000000000BBC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: fr2Mul3G6m.exe, 00000005.00000003.1347753650.0000000005369000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1347846205.0000000005369000.00000004.00000800.00020000.00000000.sdmp, fr2Mul3G6m.exe, 00000005.00000003.1347693011.000000000536C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: fr2Mul3G6m.exe, 00000005.00000003.1403621758.0000000005334000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.marriott.com/default.mi?utm_source=admarketplace&utm_medium=cpc&utm_campaign=Marriott_Pr |
Source: fr2Mul3G6m.exe, 00000005.00000003.1402887479.000000000545A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.d-GHL1OW1fkT |
Source: fr2Mul3G6m.exe, 00000005.00000003.1402887479.000000000545A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.sYEKgG4Or0s6 |
Source: fr2Mul3G6m.exe, 00000005.00000003.1402887479.000000000545A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: fr2Mul3G6m.exe, 00000005.00000003.1402887479.000000000545A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: fr2Mul3G6m.exe, 00000005.00000003.1402887479.000000000545A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4100D1 second address: 4100D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 40F176 second address: 40F19A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632EAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FBF093632F6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 40F31C second address: 40F360 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FBF0920B216h 0x0000000a push edi 0x0000000b push edx 0x0000000c pop edx 0x0000000d pop edi 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 jne 00007FBF0920B21Bh 0x00000017 pushad 0x00000018 popad 0x00000019 jmp 00007FBF0920B213h 0x0000001e pushad 0x0000001f push eax 0x00000020 pop eax 0x00000021 push ecx 0x00000022 pop ecx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 40F360 second address: 40F36B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FBF093632E6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 412460 second address: 4124F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF0920B213h 0x00000009 popad 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 popad 0x00000011 push eax 0x00000012 pushad 0x00000013 pushad 0x00000014 jmp 00007FBF0920B212h 0x00000019 push ebx 0x0000001a pop ebx 0x0000001b popad 0x0000001c jmp 00007FBF0920B214h 0x00000021 popad 0x00000022 nop 0x00000023 push ecx 0x00000024 sub ecx, dword ptr [ebp+122D2B0Eh] 0x0000002a pop ecx 0x0000002b jnl 00007FBF0920B20Ch 0x00000031 push 00000000h 0x00000033 push 00000000h 0x00000035 push ecx 0x00000036 call 00007FBF0920B208h 0x0000003b pop ecx 0x0000003c mov dword ptr [esp+04h], ecx 0x00000040 add dword ptr [esp+04h], 00000016h 0x00000048 inc ecx 0x00000049 push ecx 0x0000004a ret 0x0000004b pop ecx 0x0000004c ret 0x0000004d mov ch, 36h 0x0000004f push 8BBCAD47h 0x00000054 pushad 0x00000055 push eax 0x00000056 push edx 0x00000057 jnl 00007FBF0920B206h 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 41261B second address: 41261F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 412683 second address: 4126DF instructions: 0x00000000 rdtsc 0x00000002 jng 00007FBF0920B212h 0x00000008 jmp 00007FBF0920B20Ch 0x0000000d pop edx 0x0000000e pop eax 0x0000000f xor dword ptr [esp], 4EE2D78Ah 0x00000016 add edx, dword ptr [ebp+122D2B5Eh] 0x0000001c push 00000003h 0x0000001e mov ecx, edx 0x00000020 push 00000000h 0x00000022 push 00000000h 0x00000024 push ebp 0x00000025 call 00007FBF0920B208h 0x0000002a pop ebp 0x0000002b mov dword ptr [esp+04h], ebp 0x0000002f add dword ptr [esp+04h], 00000018h 0x00000037 inc ebp 0x00000038 push ebp 0x00000039 ret 0x0000003a pop ebp 0x0000003b ret 0x0000003c push 00000003h 0x0000003e mov cx, ax 0x00000041 call 00007FBF0920B209h 0x00000046 push edi 0x00000047 push eax 0x00000048 push edx 0x00000049 pushad 0x0000004a popad 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4126DF second address: 4126F1 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FBF093632E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edi 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4126F1 second address: 4126F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4126F5 second address: 4126FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4126FB second address: 412713 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FBF0920B20Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e pushad 0x0000000f push ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 412713 second address: 412733 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 ja 00007FBF093632ECh 0x0000000b popad 0x0000000c mov eax, dword ptr [eax] 0x0000000e pushad 0x0000000f jnp 00007FBF093632E8h 0x00000015 push edi 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 412733 second address: 412742 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 412742 second address: 412746 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 412746 second address: 41274A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 41274A second address: 41279F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007FBF093632E8h 0x0000000c popad 0x0000000d pop eax 0x0000000e cld 0x0000000f lea ebx, dword ptr [ebp+1244E1C7h] 0x00000015 push 00000000h 0x00000017 push esi 0x00000018 call 00007FBF093632E8h 0x0000001d pop esi 0x0000001e mov dword ptr [esp+04h], esi 0x00000022 add dword ptr [esp+04h], 00000017h 0x0000002a inc esi 0x0000002b push esi 0x0000002c ret 0x0000002d pop esi 0x0000002e ret 0x0000002f jmp 00007FBF093632F8h 0x00000034 push eax 0x00000035 push eax 0x00000036 push edx 0x00000037 push eax 0x00000038 push edx 0x00000039 pushad 0x0000003a popad 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 41279F second address: 4127A9 instructions: 0x00000000 rdtsc 0x00000002 js 00007FBF0920B206h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 432C3B second address: 432C3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 432C3F second address: 432C49 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 432C49 second address: 432C4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 432C4D second address: 432C6D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jmp 00007FBF0920B20Fh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e jne 00007FBF0920B206h 0x00000014 push ecx 0x00000015 pop ecx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 432C6D second address: 432C9E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FBF093632F2h 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 430BAD second address: 430BB1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 430BB1 second address: 430BBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 430BBA second address: 430BC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 430BC0 second address: 430BF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF093632EFh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FBF093632EDh 0x00000011 jmp 00007FBF093632F0h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 430BF3 second address: 430C03 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FBF0920B206h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 430C03 second address: 430C09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 430C09 second address: 430C20 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FBF0920B206h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push ecx 0x00000010 jnp 00007FBF0920B206h 0x00000016 pop ecx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 430C20 second address: 430C27 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 430C27 second address: 430C2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 430F01 second address: 430F06 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 431870 second address: 431878 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 431878 second address: 43187E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43187E second address: 4318B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FBF0920B206h 0x0000000a jns 00007FBF0920B206h 0x00000010 popad 0x00000011 pop esi 0x00000012 push esi 0x00000013 jmp 00007FBF0920B212h 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c jmp 00007FBF0920B20Ch 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 431B40 second address: 431B46 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 431B46 second address: 431B4C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 431B4C second address: 431B50 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 431B50 second address: 431B56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 431CAE second address: 431CB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 431CB2 second address: 431CBC instructions: 0x00000000 rdtsc 0x00000002 jno 00007FBF0920B206h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 429BF1 second address: 429BF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 429BF7 second address: 429C33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push edi 0x0000000c pop edi 0x0000000d jmp 00007FBF0920B218h 0x00000012 jmp 00007FBF0920B216h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 429C33 second address: 429C3A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 431E20 second address: 431E28 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 431E28 second address: 431E2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43269F second address: 4326B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FBF0920B206h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jl 00007FBF0920B206h 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43926F second address: 43928C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4398F1 second address: 4398F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4398F5 second address: 43992E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 mov eax, dword ptr [eax] 0x00000009 push ebx 0x0000000a jmp 00007FBF093632F4h 0x0000000f pop ebx 0x00000010 mov dword ptr [esp+04h], eax 0x00000014 pushad 0x00000015 je 00007FBF093632E8h 0x0000001b pushad 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007FBF093632EBh 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 439AB0 second address: 439ABA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007FBF0920B206h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43CF21 second address: 43CF32 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632ECh 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43D0A5 second address: 43D0A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43D0A9 second address: 43D0AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43D0AD second address: 43D0CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF0920B218h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43D787 second address: 43D78F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43D78F second address: 43D794 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 440BE2 second address: 440BE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 440C4F second address: 440C53 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 440C53 second address: 440C68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FBF093632EDh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 440C68 second address: 440C6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 441B04 second address: 441B0A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 441B0A second address: 441B0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 441F1B second address: 441F34 instructions: 0x00000000 rdtsc 0x00000002 je 00007FBF093632E8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e jg 00007FBF093632E8h 0x00000014 push ecx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 441FC7 second address: 441FCD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 441FCD second address: 442022 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push ecx 0x0000000d call 00007FBF093632E8h 0x00000012 pop ecx 0x00000013 mov dword ptr [esp+04h], ecx 0x00000017 add dword ptr [esp+04h], 00000016h 0x0000001f inc ecx 0x00000020 push ecx 0x00000021 ret 0x00000022 pop ecx 0x00000023 ret 0x00000024 mov edi, dword ptr [ebp+1246065Ch] 0x0000002a mov si, A193h 0x0000002e xchg eax, ebx 0x0000002f jmp 00007FBF093632ECh 0x00000034 push eax 0x00000035 push eax 0x00000036 push edx 0x00000037 push eax 0x00000038 push edx 0x00000039 push ecx 0x0000003a pop ecx 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 442022 second address: 442028 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4424CA second address: 4424CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4424CE second address: 44254B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push ebp 0x0000000c call 00007FBF0920B208h 0x00000011 pop ebp 0x00000012 mov dword ptr [esp+04h], ebp 0x00000016 add dword ptr [esp+04h], 00000015h 0x0000001e inc ebp 0x0000001f push ebp 0x00000020 ret 0x00000021 pop ebp 0x00000022 ret 0x00000023 movsx esi, ax 0x00000026 push 00000000h 0x00000028 pushad 0x00000029 call 00007FBF0920B219h 0x0000002e xor ebx, dword ptr [ebp+122D2D62h] 0x00000034 pop ecx 0x00000035 sub dword ptr [ebp+122D1E1Eh], ebx 0x0000003b popad 0x0000003c mov esi, dword ptr [ebp+122D2D0Eh] 0x00000042 push 00000000h 0x00000044 push 00000000h 0x00000046 push ebp 0x00000047 call 00007FBF0920B208h 0x0000004c pop ebp 0x0000004d mov dword ptr [esp+04h], ebp 0x00000051 add dword ptr [esp+04h], 00000015h 0x00000059 inc ebp 0x0000005a push ebp 0x0000005b ret 0x0000005c pop ebp 0x0000005d ret 0x0000005e xchg eax, ebx 0x0000005f push ebx 0x00000060 push eax 0x00000061 push eax 0x00000062 push edx 0x00000063 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44254B second address: 442564 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop ebx 0x00000006 push eax 0x00000007 pushad 0x00000008 jnp 00007FBF093632ECh 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 442D5F second address: 442D63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 443F0F second address: 443F14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 444A01 second address: 444A10 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBF0920B20Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 444A10 second address: 444A8B instructions: 0x00000000 rdtsc 0x00000002 jo 00007FBF093632E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jmp 00007FBF093632F2h 0x00000012 nop 0x00000013 push 00000000h 0x00000015 push ebp 0x00000016 call 00007FBF093632E8h 0x0000001b pop ebp 0x0000001c mov dword ptr [esp+04h], ebp 0x00000020 add dword ptr [esp+04h], 00000018h 0x00000028 inc ebp 0x00000029 push ebp 0x0000002a ret 0x0000002b pop ebp 0x0000002c ret 0x0000002d mov si, CDDDh 0x00000031 push 00000000h 0x00000033 je 00007FBF093632FCh 0x00000039 jmp 00007FBF093632F6h 0x0000003e push 00000000h 0x00000040 jc 00007FBF093632ECh 0x00000046 mov dword ptr [ebp+1245A5FFh], edx 0x0000004c xchg eax, ebx 0x0000004d push eax 0x0000004e push edx 0x0000004f jc 00007FBF093632ECh 0x00000055 push eax 0x00000056 push edx 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 444A8B second address: 444A8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 444A8F second address: 444AB5 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FBF093632FBh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c pushad 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44531C second address: 445320 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44605F second address: 44609F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jo 00007FBF093632E6h 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e popad 0x0000000f mov dword ptr [esp], eax 0x00000012 mov dword ptr [ebp+122D1E06h], ecx 0x00000018 push 00000000h 0x0000001a push 00000000h 0x0000001c push ebp 0x0000001d call 00007FBF093632E8h 0x00000022 pop ebp 0x00000023 mov dword ptr [esp+04h], ebp 0x00000027 add dword ptr [esp+04h], 00000014h 0x0000002f inc ebp 0x00000030 push ebp 0x00000031 ret 0x00000032 pop ebp 0x00000033 ret 0x00000034 push 00000000h 0x00000036 movzx esi, bx 0x00000039 push eax 0x0000003a pushad 0x0000003b push edx 0x0000003c push eax 0x0000003d push edx 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 447333 second address: 447337 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 447337 second address: 44733D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4495C4 second address: 4495DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FBF0920B206h 0x0000000a pop ebx 0x0000000b pop edi 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f push esi 0x00000010 pop esi 0x00000011 jmp 00007FBF0920B20Ah 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44733D second address: 447343 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44B18E second address: 44B1DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FBF0920B208h 0x0000000a push edi 0x0000000b pop edi 0x0000000c jg 00007FBF0920B22Ch 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FBF0920B213h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44C36A second address: 44C37A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jbe 00007FBF093632E8h 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44E457 second address: 44E45C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44E45C second address: 44E489 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007FBF093632EDh 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FBF093632F5h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44E489 second address: 44E48D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44E48D second address: 44E493 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44E493 second address: 44E4E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B211h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a mov di, 74FBh 0x0000000e push 00000000h 0x00000010 push 00000000h 0x00000012 push ebx 0x00000013 call 00007FBF0920B208h 0x00000018 pop ebx 0x00000019 mov dword ptr [esp+04h], ebx 0x0000001d add dword ptr [esp+04h], 00000016h 0x00000025 inc ebx 0x00000026 push ebx 0x00000027 ret 0x00000028 pop ebx 0x00000029 ret 0x0000002a mov ebx, dword ptr [ebp+1246065Ch] 0x00000030 push 00000000h 0x00000032 mov dword ptr [ebp+122DB6CFh], eax 0x00000038 push eax 0x00000039 push ecx 0x0000003a push eax 0x0000003b push edx 0x0000003c ja 00007FBF0920B206h 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44E606 second address: 44E60B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44E60B second address: 44E67D instructions: 0x00000000 rdtsc 0x00000002 jg 00007FBF0920B20Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push ecx 0x00000010 call 00007FBF0920B208h 0x00000015 pop ecx 0x00000016 mov dword ptr [esp+04h], ecx 0x0000001a add dword ptr [esp+04h], 00000018h 0x00000022 inc ecx 0x00000023 push ecx 0x00000024 ret 0x00000025 pop ecx 0x00000026 ret 0x00000027 mov edi, dword ptr [ebp+122D1DA3h] 0x0000002d or dword ptr [ebp+122DB710h], eax 0x00000033 push dword ptr fs:[00000000h] 0x0000003a mov edi, dword ptr [ebp+122D2D62h] 0x00000040 mov dword ptr fs:[00000000h], esp 0x00000047 add edi, dword ptr [ebp+122D2B62h] 0x0000004d mov eax, dword ptr [ebp+122D1109h] 0x00000053 mov edi, 7ABF50FFh 0x00000058 push FFFFFFFFh 0x0000005a mov dword ptr [ebp+122D2ECAh], edx 0x00000060 push eax 0x00000061 pushad 0x00000062 push eax 0x00000063 push edx 0x00000064 push ecx 0x00000065 pop ecx 0x00000066 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44F6D3 second address: 44F6D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4503EB second address: 4503F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007FBF0920B206h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44F6D7 second address: 44F6DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4503F5 second address: 450478 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push 00000000h 0x0000000d push edi 0x0000000e call 00007FBF0920B208h 0x00000013 pop edi 0x00000014 mov dword ptr [esp+04h], edi 0x00000018 add dword ptr [esp+04h], 0000001Bh 0x00000020 inc edi 0x00000021 push edi 0x00000022 ret 0x00000023 pop edi 0x00000024 ret 0x00000025 movsx edi, bx 0x00000028 push 00000000h 0x0000002a mov edi, 44C051C7h 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 push ebx 0x00000034 call 00007FBF0920B208h 0x00000039 pop ebx 0x0000003a mov dword ptr [esp+04h], ebx 0x0000003e add dword ptr [esp+04h], 00000014h 0x00000046 inc ebx 0x00000047 push ebx 0x00000048 ret 0x00000049 pop ebx 0x0000004a ret 0x0000004b mov dword ptr [ebp+122D1D2Ch], ecx 0x00000051 je 00007FBF0920B208h 0x00000057 mov bh, 43h 0x00000059 xchg eax, esi 0x0000005a jmp 00007FBF0920B217h 0x0000005f push eax 0x00000060 push eax 0x00000061 push edx 0x00000062 push esi 0x00000063 push esi 0x00000064 pop esi 0x00000065 pop esi 0x00000066 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 450478 second address: 450483 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007FBF093632E6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 45236A second address: 452370 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 452370 second address: 452374 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 3F7A20 second address: 3F7A39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 jnc 00007FBF0920B212h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 452B52 second address: 452B56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4539FB second address: 453A01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 454ABD second address: 454B5A instructions: 0x00000000 rdtsc 0x00000002 jne 00007FBF093632F1h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push ecx 0x0000000c jne 00007FBF093632E8h 0x00000012 pop ecx 0x00000013 nop 0x00000014 adc di, 879Ch 0x00000019 push dword ptr fs:[00000000h] 0x00000020 mov dword ptr [ebp+122D1D1Fh], ecx 0x00000026 mov dword ptr fs:[00000000h], esp 0x0000002d push 00000000h 0x0000002f push edx 0x00000030 call 00007FBF093632E8h 0x00000035 pop edx 0x00000036 mov dword ptr [esp+04h], edx 0x0000003a add dword ptr [esp+04h], 00000019h 0x00000042 inc edx 0x00000043 push edx 0x00000044 ret 0x00000045 pop edx 0x00000046 ret 0x00000047 sub ebx, dword ptr [ebp+122D2117h] 0x0000004d mov eax, dword ptr [ebp+122D1329h] 0x00000053 mov ebx, esi 0x00000055 push FFFFFFFFh 0x00000057 jmp 00007FBF093632F7h 0x0000005c push eax 0x0000005d push eax 0x0000005e push edx 0x0000005f jmp 00007FBF093632F8h 0x00000064 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 457770 second address: 457776 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 457776 second address: 45777A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 45966C second address: 459670 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 459670 second address: 45970C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push ebp 0x0000000a call 00007FBF093632E8h 0x0000000f pop ebp 0x00000010 mov dword ptr [esp+04h], ebp 0x00000014 add dword ptr [esp+04h], 00000016h 0x0000001c inc ebp 0x0000001d push ebp 0x0000001e ret 0x0000001f pop ebp 0x00000020 ret 0x00000021 mov dword ptr [ebp+122D227Ch], edx 0x00000027 push 00000000h 0x00000029 push 00000000h 0x0000002b push edx 0x0000002c call 00007FBF093632E8h 0x00000031 pop edx 0x00000032 mov dword ptr [esp+04h], edx 0x00000036 add dword ptr [esp+04h], 0000001Dh 0x0000003e inc edx 0x0000003f push edx 0x00000040 ret 0x00000041 pop edx 0x00000042 ret 0x00000043 mov dword ptr [ebp+122D31B5h], ecx 0x00000049 push 00000000h 0x0000004b push 00000000h 0x0000004d push edi 0x0000004e call 00007FBF093632E8h 0x00000053 pop edi 0x00000054 mov dword ptr [esp+04h], edi 0x00000058 add dword ptr [esp+04h], 00000017h 0x00000060 inc edi 0x00000061 push edi 0x00000062 ret 0x00000063 pop edi 0x00000064 ret 0x00000065 jmp 00007FBF093632EBh 0x0000006a xchg eax, esi 0x0000006b push eax 0x0000006c push edx 0x0000006d jmp 00007FBF093632F5h 0x00000072 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 45970C second address: 459712 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 459712 second address: 459728 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FBF093632EBh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 459728 second address: 45972E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 45A746 second address: 45A74B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 45A74B second address: 45A7C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push esi 0x0000000d call 00007FBF0920B208h 0x00000012 pop esi 0x00000013 mov dword ptr [esp+04h], esi 0x00000017 add dword ptr [esp+04h], 00000018h 0x0000001f inc esi 0x00000020 push esi 0x00000021 ret 0x00000022 pop esi 0x00000023 ret 0x00000024 mov di, cx 0x00000027 push 00000000h 0x00000029 push 00000000h 0x0000002b push eax 0x0000002c call 00007FBF0920B208h 0x00000031 pop eax 0x00000032 mov dword ptr [esp+04h], eax 0x00000036 add dword ptr [esp+04h], 0000001Ah 0x0000003e inc eax 0x0000003f push eax 0x00000040 ret 0x00000041 pop eax 0x00000042 ret 0x00000043 mov dword ptr [ebp+1247A089h], ebx 0x00000049 push 00000000h 0x0000004b jmp 00007FBF0920B212h 0x00000050 add dword ptr [ebp+122D27D1h], ebx 0x00000056 push eax 0x00000057 push eax 0x00000058 push edx 0x00000059 push esi 0x0000005a push eax 0x0000005b pop eax 0x0000005c pop esi 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 457866 second address: 45786A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 45786A second address: 457870 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 457870 second address: 457893 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 457893 second address: 457897 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 45796E second address: 457978 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 457978 second address: 45797C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 455AD0 second address: 455ADA instructions: 0x00000000 rdtsc 0x00000002 jl 00007FBF093632E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 459843 second address: 45985C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBF0920B215h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 45A902 second address: 45A908 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 45C8E5 second address: 45C8F6 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edi 0x00000009 push eax 0x0000000a push edx 0x0000000b jbe 00007FBF0920B206h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 45C8F6 second address: 45C8FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4604D0 second address: 4604D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 461AEB second address: 461AEF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 461AEF second address: 461B11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007FBF0920B21Ch 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 461B11 second address: 461B28 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632EBh 0x00000007 push eax 0x00000008 push edx 0x00000009 jno 00007FBF093632E6h 0x0000000f push esi 0x00000010 pop esi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 461B28 second address: 461B6A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FBF0920B213h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FBF0920B212h 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FBF0920B20Bh 0x0000001b ja 00007FBF0920B206h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 461B6A second address: 461B74 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FBF093632E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 46870F second address: 468714 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 468714 second address: 468719 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 468719 second address: 46872E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FBF0920B206h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e pop edi 0x0000000f jl 00007FBF0920B206h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4689ED second address: 468A02 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FBF093632EFh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 46E89B second address: 46E89F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 46E95F second address: 46E963 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 46E9E9 second address: 46E9ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 46E9ED second address: 46E9F3 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 46EABD second address: 46EAD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF0920B210h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4087D0 second address: 4087E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F2h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4087E8 second address: 4087EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4087EE second address: 40881B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007FBF093632F6h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 40881B second address: 408837 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 jp 00007FBF0920B206h 0x0000000e popad 0x0000000f pushad 0x00000010 push eax 0x00000011 pop eax 0x00000012 jc 00007FBF0920B206h 0x00000018 push ebx 0x00000019 pop ebx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 472C39 second address: 472C5B instructions: 0x00000000 rdtsc 0x00000002 jno 00007FBF093632E6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jl 00007FBF093632EEh 0x00000012 pushad 0x00000013 popad 0x00000014 jc 00007FBF093632E6h 0x0000001a popad 0x0000001b pushad 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f pop eax 0x00000020 push edi 0x00000021 pop edi 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 472D9F second address: 472DAB instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jg 00007FBF0920B206h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 472DAB second address: 472DB1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 472DB1 second address: 472DC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF0920B20Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 472F0D second address: 472F1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 jl 00007FBF093632E6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 472F1B second address: 472F34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF0920B213h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 47320B second address: 473211 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 473346 second address: 473353 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 473353 second address: 473360 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 47361A second address: 47361E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 47361E second address: 47362E instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FBF093632EAh 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 47362E second address: 473632 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 473632 second address: 47366D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push edx 0x0000000a jmp 00007FBF093632F0h 0x0000000f pop edx 0x00000010 pushad 0x00000011 push esi 0x00000012 pop esi 0x00000013 jo 00007FBF093632E6h 0x00000019 pushad 0x0000001a popad 0x0000001b jmp 00007FBF093632F1h 0x00000020 popad 0x00000021 push ecx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 47366D second address: 473673 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 474EE4 second address: 474F08 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007FBF093632E6h 0x00000009 jc 00007FBF093632E6h 0x0000000f jno 00007FBF093632E6h 0x00000015 popad 0x00000016 push edx 0x00000017 jmp 00007FBF093632EBh 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 479228 second address: 479238 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FBF0920B206h 0x00000008 jnl 00007FBF0920B206h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4798A4 second address: 4798C7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F8h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edi 0x0000000d pop edi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4798C7 second address: 4798CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4798CC second address: 4798D1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4798D1 second address: 4798DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FBF0920B206h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 479DF4 second address: 479DF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 479DF8 second address: 479DFC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 479DFC second address: 479E0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 jc 00007FBF093632E6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 479E0B second address: 479E10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 479E10 second address: 479E22 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBF093632ECh 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 47A142 second address: 47A152 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007FBF0920B20Bh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43F532 second address: 43F536 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43F536 second address: 43F577 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov dword ptr [esp], eax 0x0000000a movzx edx, dx 0x0000000d lea eax, dword ptr [ebp+1247B2D9h] 0x00000013 mov dl, 9Ch 0x00000015 mov edi, dword ptr [ebp+122D2EF0h] 0x0000001b nop 0x0000001c jc 00007FBF0920B21Eh 0x00000022 jmp 00007FBF0920B218h 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a push ebx 0x0000002b pop ebx 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43F577 second address: 429BF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push esi 0x0000000a call 00007FBF093632E8h 0x0000000f pop esi 0x00000010 mov dword ptr [esp+04h], esi 0x00000014 add dword ptr [esp+04h], 0000001Ch 0x0000001c inc esi 0x0000001d push esi 0x0000001e ret 0x0000001f pop esi 0x00000020 ret 0x00000021 call dword ptr [ebp+122D1D15h] 0x00000027 push edx 0x00000028 pushad 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43F98E second address: 43F993 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43F993 second address: 43F9A0 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push esi 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43FB59 second address: 43FB5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43FCE9 second address: 43FD1B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FBF093632F9h 0x00000008 push eax 0x00000009 pop eax 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 je 00007FBF093632E6h 0x00000017 jnp 00007FBF093632E6h 0x0000001d popad 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43FD1B second address: 43FD3E instructions: 0x00000000 rdtsc 0x00000002 jng 00007FBF0920B20Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, esi 0x0000000b mov cx, 2FBEh 0x0000000f nop 0x00000010 pushad 0x00000011 jnp 00007FBF0920B208h 0x00000017 pushad 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43FED9 second address: 43FEE3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007FBF093632E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43FEE3 second address: 43FEF4 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FBF0920B206h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push ecx 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43FFC0 second address: 43FFC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 43FFC4 second address: 43FFCA instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 440410 second address: 440447 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007FBF093632E6h 0x00000009 jmp 00007FBF093632F0h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edi 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FBF093632F7h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 440447 second address: 440479 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push eax 0x0000000b call 00007FBF0920B208h 0x00000010 pop eax 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 add dword ptr [esp+04h], 00000014h 0x0000001d inc eax 0x0000001e push eax 0x0000001f ret 0x00000020 pop eax 0x00000021 ret 0x00000022 push 0000001Eh 0x00000024 mov edi, dword ptr [ebp+122D1D15h] 0x0000002a nop 0x0000002b push eax 0x0000002c push edx 0x0000002d pushad 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 440479 second address: 44047F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44047F second address: 440484 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 440484 second address: 440489 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 440489 second address: 44048F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44048F second address: 4404A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FBF093632F0h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4405B0 second address: 4405B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44074F second address: 440754 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 440754 second address: 440789 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FBF0920B20Ch 0x00000008 jmp 00007FBF0920B216h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 jnl 00007FBF0920B206h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 440789 second address: 4407C2 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007FBF093632ECh 0x0000000c jp 00007FBF093632E6h 0x00000012 popad 0x00000013 mov eax, dword ptr [eax] 0x00000015 jmp 00007FBF093632F3h 0x0000001a mov dword ptr [esp+04h], eax 0x0000001e pushad 0x0000001f push edi 0x00000020 pushad 0x00000021 popad 0x00000022 pop edi 0x00000023 jc 00007FBF093632ECh 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 42A7ED second address: 42A813 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jo 00007FBF0920B20Ah 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FBF0920B213h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 47DC0C second address: 47DC12 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 47DC12 second address: 47DC2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF0920B215h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 47DC2B second address: 47DC2F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 47E060 second address: 47E064 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 47E064 second address: 47E07E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF093632F0h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 47E1EC second address: 47E20D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FBF0920B20Bh 0x0000000a pushad 0x0000000b popad 0x0000000c jc 00007FBF0920B206h 0x00000012 popad 0x00000013 je 00007FBF0920B212h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 47E20D second address: 47E213 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 47E3AD second address: 47E3F1 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FBF0920B206h 0x00000008 jmp 00007FBF0920B218h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jmp 00007FBF0920B20Ah 0x00000014 popad 0x00000015 push esi 0x00000016 pushad 0x00000017 jmp 00007FBF0920B211h 0x0000001c pushad 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 47E3F1 second address: 47E3F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 481CBA second address: 481CCD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF0920B20Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 481CCD second address: 481CD9 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 481CD9 second address: 481CDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 481CDD second address: 481CFE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jno 00007FBF093632E6h 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 481CFE second address: 481D06 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 481D06 second address: 481D0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 3FC94D second address: 3FC952 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 3FC952 second address: 3FC972 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FBF093632EFh 0x0000000e jne 00007FBF093632E8h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 3FC972 second address: 3FC97C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007FBF0920B206h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4892CD second address: 4892EF instructions: 0x00000000 rdtsc 0x00000002 js 00007FBF093632E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FBF093632F8h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4892EF second address: 489311 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 pushad 0x00000006 popad 0x00000007 push esi 0x00000008 pop esi 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FBF0920B20Dh 0x00000015 pushad 0x00000016 pushad 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 489311 second address: 48931C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FBF093632E6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4898FC second address: 489906 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 489906 second address: 48991A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ecx 0x00000006 jl 00007FBF093632F4h 0x0000000c push eax 0x0000000d push edx 0x0000000e jo 00007FBF093632E6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 489A67 second address: 489A88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jp 00007FBF0920B217h 0x0000000b push ecx 0x0000000c push eax 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 489A88 second address: 489A99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 je 00007FBF093632E6h 0x0000000f push edx 0x00000010 pop edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 489D6A second address: 489D6E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 489EF0 second address: 489F09 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F5h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 48A36D second address: 48A396 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B213h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a jne 00007FBF0920B216h 0x00000010 je 00007FBF0920B208h 0x00000016 push eax 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 488B78 second address: 488B87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF093632EBh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 488B87 second address: 488B8B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 488B8B second address: 488B91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 488B91 second address: 488B9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 488B9A second address: 488BCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 pop ebx 0x0000000a js 00007FBF09363317h 0x00000010 pushad 0x00000011 jnc 00007FBF093632E6h 0x00000017 jmp 00007FBF093632F7h 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 48D5DD second address: 48D5ED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FBF0920B20Ah 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 48D5ED second address: 48D5F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 48D5F2 second address: 48D5FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 48FF29 second address: 48FF2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 490077 second address: 49008D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B212h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49008D second address: 490095 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 push edx 0x00000007 pop edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4901E6 second address: 4901EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 492634 second address: 492639 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 492639 second address: 492641 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 498139 second address: 49813F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49813F second address: 49819A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FBF0920B206h 0x0000000a popad 0x0000000b push eax 0x0000000c jmp 00007FBF0920B219h 0x00000011 jmp 00007FBF0920B20Eh 0x00000016 pop eax 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a push esi 0x0000001b jmp 00007FBF0920B20Ah 0x00000020 pop esi 0x00000021 pushad 0x00000022 jmp 00007FBF0920B215h 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49819A second address: 4981B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FBF093632E6h 0x0000000a jmp 00007FBF093632F3h 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4975CD second address: 4975D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 497891 second address: 4978B1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F2h 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jnc 00007FBF093632E6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4978B1 second address: 4978B7 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4978B7 second address: 4978CD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FBF093632EFh 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 497CD5 second address: 497CDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 497CDA second address: 497CE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 497CE0 second address: 497CE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49B25D second address: 49B261 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49B261 second address: 49B267 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49B267 second address: 49B271 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49B271 second address: 49B291 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B20Ah 0x00000007 jmp 00007FBF0920B212h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49B291 second address: 49B2A5 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push edi 0x00000004 pop edi 0x00000005 jbe 00007FBF093632E6h 0x0000000b pop ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e jns 00007FBF093632E6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49A9DA second address: 49A9F5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B217h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49AB73 second address: 49AB90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF093632F9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A0E26 second address: 4A0E2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A0E2C second address: 4A0E30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A0E30 second address: 4A0E56 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FBF0920B206h 0x00000008 jmp 00007FBF0920B214h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 je 00007FBF0920B206h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49F8FB second address: 49F912 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FBF093632EAh 0x00000008 push edi 0x00000009 pushad 0x0000000a popad 0x0000000b pop edi 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push ebx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49F912 second address: 49F917 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49FA6C second address: 49FA80 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jo 00007FBF093632E6h 0x0000000e jnl 00007FBF093632E6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49FA80 second address: 49FA84 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49FA84 second address: 49FA98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 js 00007FBF093632ECh 0x0000000e jl 00007FBF093632E6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49FBE6 second address: 49FBEA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49FBEA second address: 49FBF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49FBF0 second address: 49FC0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a js 00007FBF0920B206h 0x00000010 jno 00007FBF0920B206h 0x00000016 pop ebx 0x00000017 push eax 0x00000018 push edx 0x00000019 push edi 0x0000001a pop edi 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49FC0D second address: 49FC11 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49FC11 second address: 49FC19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49FC19 second address: 49FC2A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBF093632EDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4401E5 second address: 44021C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007FBF0920B206h 0x00000009 jmp 00007FBF0920B216h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FBF0920B210h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44021C second address: 440226 instructions: 0x00000000 rdtsc 0x00000002 js 00007FBF093632E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 440226 second address: 44024D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jne 00007FBF0920B206h 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d mov edx, eax 0x0000000f mov cx, 32C1h 0x00000013 mov ebx, dword ptr [ebp+1247B318h] 0x00000019 push edi 0x0000001a pop ecx 0x0000001b add eax, ebx 0x0000001d mov dx, 8521h 0x00000021 push eax 0x00000022 pushad 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44024D second address: 440251 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 440251 second address: 440255 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 440255 second address: 44029C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FBF093632F9h 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f sbb ecx, 324BA966h 0x00000015 push 00000004h 0x00000017 mov dword ptr [ebp+122D1FE2h], eax 0x0000001d nop 0x0000001e push edx 0x0000001f jl 00007FBF093632E8h 0x00000025 push ecx 0x00000026 pop ecx 0x00000027 pop edx 0x00000028 push eax 0x00000029 push eax 0x0000002a push edx 0x0000002b jo 00007FBF093632ECh 0x00000031 push eax 0x00000032 push edx 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 44029C second address: 4402A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A000B second address: 4A000F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A000F second address: 4A0035 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FBF0920B20Eh 0x0000000b push eax 0x0000000c push edx 0x0000000d push esi 0x0000000e jmp 00007FBF0920B20Eh 0x00000013 pop esi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A0B01 second address: 4A0B05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A0B05 second address: 4A0B15 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FBF0920B206h 0x00000008 jnc 00007FBF0920B206h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A80DD second address: 4A8140 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 jp 00007FBF093632E6h 0x0000000c pop edx 0x0000000d pushad 0x0000000e jmp 00007FBF093632ECh 0x00000013 jmp 00007FBF093632F6h 0x00000018 jmp 00007FBF093632F9h 0x0000001d popad 0x0000001e popad 0x0000001f pushad 0x00000020 jnl 00007FBF093632E8h 0x00000026 push ebx 0x00000027 pop ebx 0x00000028 jo 00007FBF093632ECh 0x0000002e jo 00007FBF093632E6h 0x00000034 push ecx 0x00000035 push eax 0x00000036 push edx 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A6657 second address: 4A6664 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 js 00007FBF0920B208h 0x0000000b push esi 0x0000000c pop esi 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A6977 second address: 4A6991 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FBF093632F2h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A6C2E second address: 4A6C32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A6C32 second address: 4A6C36 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A6C36 second address: 4A6C55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FBF0920B213h 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A6EF2 second address: 4A6EFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A6EFD second address: 4A6F01 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A74A8 second address: 4A74BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop esi 0x00000006 pushad 0x00000007 jns 00007FBF093632EAh 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A7DD1 second address: 4A7DD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A7DD6 second address: 4A7DE6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBF093632EAh 0x00000009 push edx 0x0000000a pop edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4ABEE4 second address: 4ABEEB instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4AC0A8 second address: 4AC0B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF093632EBh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4AC214 second address: 4AC218 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4AC218 second address: 4AC23B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007FBF093632F9h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4AC692 second address: 4AC69E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FBF0920B206h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4AC69E second address: 4AC6A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4AC9D5 second address: 4AC9E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBF0920B20Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4AC9E6 second address: 4AC9EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4AC9EA second address: 4AC9FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FBF0920B20Ah 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B740E second address: 4B7417 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B7417 second address: 4B741D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B741D second address: 4B7421 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B7421 second address: 4B743D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FBF0920B210h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B743D second address: 4B744C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push esi 0x0000000c pop esi 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B744C second address: 4B7454 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B7454 second address: 4B7464 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007FBF093632EBh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B75B7 second address: 4B761F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 push edi 0x00000008 pop edi 0x00000009 jc 00007FBF0920B206h 0x0000000f jmp 00007FBF0920B211h 0x00000014 push eax 0x00000015 pop eax 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 jno 00007FBF0920B21Fh 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007FBF0920B20Ch 0x00000026 jmp 00007FBF0920B216h 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B761F second address: 4B7625 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B7625 second address: 4B762B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B762B second address: 4B7632 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B7632 second address: 4B7638 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B78DE second address: 4B78E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B7A28 second address: 4B7A31 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B7A31 second address: 4B7A3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B7A3A second address: 4B7A40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B7A40 second address: 4B7A44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B7BB1 second address: 4B7BB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B7D77 second address: 4B7D7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B7EF8 second address: 4B7EFE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B7EFE second address: 4B7F02 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B8D83 second address: 4B8D87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4B8D87 second address: 4B8D91 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FBF093632E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4BD0F4 second address: 4BD0F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4BD0F8 second address: 4BD108 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FBF093632E6h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f pop edi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 40352E second address: 403532 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 403532 second address: 403536 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4C3366 second address: 4C3383 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FBF0920B206h 0x00000008 jl 00007FBF0920B206h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jmp 00007FBF0920B20Ah 0x00000015 push ecx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4C2F13 second address: 4C2F19 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4D069D second address: 4D06A3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4D06A3 second address: 4D06CC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007FBF093632F7h 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 jno 00007FBF093632E6h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4D2F2E second address: 4D2F42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FBF0920B206h 0x0000000a pop esi 0x0000000b pushad 0x0000000c jg 00007FBF0920B206h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4D2F42 second address: 4D2F48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4D30D3 second address: 4D30D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4D30D7 second address: 4D30EB instructions: 0x00000000 rdtsc 0x00000002 jl 00007FBF093632F6h 0x00000008 jmp 00007FBF093632EAh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4D30EB second address: 4D30F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4D5A84 second address: 4D5AD1 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FBF093632E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnc 00007FBF093632ECh 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 jnc 00007FBF093632F6h 0x00000019 push edx 0x0000001a js 00007FBF093632E6h 0x00000020 jmp 00007FBF093632F6h 0x00000025 pop edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4D5AD1 second address: 4D5AD7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4D5AD7 second address: 4D5AF2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F0h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push esi 0x0000000c push eax 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 40A301 second address: 40A305 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 40A305 second address: 40A30B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4E5B02 second address: 4E5B08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4E5B08 second address: 4E5B0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4E5B0C second address: 4E5B14 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4E5B14 second address: 4E5B5F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F7h 0x00000007 js 00007FBF093632E6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jbe 00007FBF093632FFh 0x00000015 jmp 00007FBF093632F7h 0x0000001a pushad 0x0000001b popad 0x0000001c pop edx 0x0000001d pop eax 0x0000001e push edi 0x0000001f push eax 0x00000020 push edx 0x00000021 jp 00007FBF093632E6h 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4E5997 second address: 4E59A8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B20Ch 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4F0AD4 second address: 4F0B08 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FBF093632E6h 0x00000008 jno 00007FBF093632E6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push esi 0x00000011 jmp 00007FBF093632F2h 0x00000016 pushad 0x00000017 popad 0x00000018 pop esi 0x00000019 push eax 0x0000001a push edx 0x0000001b jnc 00007FBF093632E6h 0x00000021 jp 00007FBF093632E6h 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EF882 second address: 4EF89A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jl 00007FBF0920B206h 0x0000000c jl 00007FBF0920B206h 0x00000012 popad 0x00000013 pushad 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EF89A second address: 4EF8A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EF8A0 second address: 4EF8A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EF8A9 second address: 4EF8C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF093632F9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EF8C6 second address: 4EF8F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B216h 0x00000007 jmp 00007FBF0920B20Ch 0x0000000c pop edx 0x0000000d pop eax 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jnc 00007FBF0920B206h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EF8F7 second address: 4EF934 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F0h 0x00000007 jmp 00007FBF093632F7h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FBF093632F0h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EF934 second address: 4EF94B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007FBF0920B211h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EF94B second address: 4EF958 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FBF093632E8h 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EFAA2 second address: 4EFABF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FBF0920B210h 0x0000000c jl 00007FBF0920B206h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EFABF second address: 4EFAEE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F3h 0x00000007 jmp 00007FBF093632F0h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jo 00007FBF093632E6h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EFAEE second address: 4EFB02 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B20Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EFB02 second address: 4EFB08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EFB08 second address: 4EFB0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EFB0C second address: 4EFB36 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632ECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FBF093632F8h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EFCA5 second address: 4EFCA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EFCA9 second address: 4EFCAF instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EFCAF second address: 4EFCC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jnc 00007FBF0920B206h 0x0000000d je 00007FBF0920B206h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EFCC4 second address: 4EFCD5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 jno 00007FBF093632E6h 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4EFCD5 second address: 4EFCD9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4F4221 second address: 4F4242 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF093632F9h 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4F4242 second address: 4F425A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF0920B20Dh 0x00000009 jbe 00007FBF0920B206h 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 50166D second address: 501696 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b jne 00007FBF093632E6h 0x00000011 jmp 00007FBF093632F8h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 501696 second address: 5016D5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B20Eh 0x00000007 jmp 00007FBF0920B212h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jmp 00007FBF0920B218h 0x00000013 push ebx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 503C66 second address: 503C8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF093632ECh 0x00000009 pop ecx 0x0000000a jng 00007FBF093632F2h 0x00000010 js 00007FBF093632E6h 0x00000016 jo 00007FBF093632E6h 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 503C8D second address: 503C9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF0920B20Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 503C9F second address: 503CA3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 503CA3 second address: 503CC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF0920B215h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 503CC1 second address: 503CED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 je 00007FBF093632E6h 0x0000000f pop eax 0x00000010 ja 00007FBF093632FCh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 503AD3 second address: 503AFE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B210h 0x00000007 push esi 0x00000008 push eax 0x00000009 pop eax 0x0000000a jp 00007FBF0920B206h 0x00000010 pop esi 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushad 0x00000014 push esi 0x00000015 push edi 0x00000016 pop edi 0x00000017 pop esi 0x00000018 jo 00007FBF0920B20Ch 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 503AFE second address: 503B05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 510F72 second address: 510F76 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 510F76 second address: 510F7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 510F7C second address: 510FBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jg 00007FBF0920B206h 0x0000000d jmp 00007FBF0920B20Ah 0x00000012 popad 0x00000013 pop ebx 0x00000014 push eax 0x00000015 push edx 0x00000016 je 00007FBF0920B212h 0x0000001c jmp 00007FBF0920B20Ch 0x00000021 jmp 00007FBF0920B216h 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 510FBF second address: 510FC5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 510ABE second address: 510AC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FBF0920B206h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 510C40 second address: 510C61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 je 00007FBF093632E6h 0x0000000c jmp 00007FBF093632F4h 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 510C61 second address: 510C7D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FBF0920B20Ch 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jg 00007FBF0920B208h 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 510C7D second address: 510C8D instructions: 0x00000000 rdtsc 0x00000002 jno 00007FBF093632EAh 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 510C8D second address: 510C91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 510C91 second address: 510C97 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 527EA5 second address: 527EAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 527EAD second address: 527EBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 je 00007FBF093632ECh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 527EBA second address: 527EC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 js 00007FBF0920B208h 0x0000000d push edx 0x0000000e pop edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 526CF3 second address: 526CF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 526CF7 second address: 526CFB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 526CFB second address: 526D07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 526D07 second address: 526D39 instructions: 0x00000000 rdtsc 0x00000002 je 00007FBF0920B206h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push esi 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007FBF0920B213h 0x00000014 pop esi 0x00000015 popad 0x00000016 pushad 0x00000017 push esi 0x00000018 jnp 00007FBF0920B206h 0x0000001e pop esi 0x0000001f pushad 0x00000020 push edx 0x00000021 pop edx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 526E83 second address: 526EAC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FBF093632EFh 0x0000000e push eax 0x0000000f push edx 0x00000010 push edi 0x00000011 pop edi 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 5271C7 second address: 5271CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 527A1A second address: 527A39 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jg 00007FBF093632EEh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 527A39 second address: 527A47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jne 00007FBF0920B212h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 527A47 second address: 527A55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FBF093632E6h 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 527A55 second address: 527A5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 527A5B second address: 527A5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 52AB99 second address: 52ABC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FBF0920B20Ch 0x00000009 popad 0x0000000a pop edx 0x0000000b nop 0x0000000c mov edx, dword ptr [ebp+122D2C8Ah] 0x00000012 mov dl, FBh 0x00000014 push 00000004h 0x00000016 push ebx 0x00000017 mov edx, dword ptr [ebp+122D1E6Fh] 0x0000001d pop edx 0x0000001e push 02766B00h 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 push edx 0x00000028 pop edx 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 52ABC9 second address: 52ABD3 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FBF093632E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 52AE1A second address: 52AE5A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jg 00007FBF0920B206h 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d mov edx, dword ptr [ebp+122D2CCEh] 0x00000013 mov edx, eax 0x00000015 push dword ptr [ebp+122D391Eh] 0x0000001b mov edx, edi 0x0000001d call 00007FBF0920B209h 0x00000022 je 00007FBF0920B214h 0x00000028 push eax 0x00000029 push eax 0x0000002a push eax 0x0000002b push edx 0x0000002c push ebx 0x0000002d pop ebx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 52AE5A second address: 52AE82 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FBF093632E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop eax 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 jmp 00007FBF093632F5h 0x00000017 pop eax 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 52AE82 second address: 52AEA3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B211h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e jl 00007FBF0920B206h 0x00000014 pop eax 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 52AEA3 second address: 52AEC9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp+04h], eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push ecx 0x00000011 jmp 00007FBF093632F4h 0x00000016 pop ecx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 52DC86 second address: 52DCA3 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FBF0920B206h 0x00000008 jmp 00007FBF0920B210h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 52DCA3 second address: 52DCB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a je 00007FBF093632E6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 52DCB3 second address: 52DCB7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 52DCB7 second address: 52DCC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FBF093632EAh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 52DCC7 second address: 52DD1F instructions: 0x00000000 rdtsc 0x00000002 jno 00007FBF0920B21Fh 0x00000008 pushad 0x00000009 jbe 00007FBF0920B206h 0x0000000f jmp 00007FBF0920B216h 0x00000014 jmp 00007FBF0920B218h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 52D84D second address: 52D866 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632ECh 0x00000007 jns 00007FBF093632E6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push esi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 52D866 second address: 52D86B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 443A5A second address: 443A75 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBF093632F7h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 443A75 second address: 443A79 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49F0411 second address: 49F042E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBF093632F9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49F046D second address: 49F0471 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49F0471 second address: 49F0475 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49F0475 second address: 49F047B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49F047B second address: 49F0481 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49F0481 second address: 49F0485 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 49F0485 second address: 49F0489 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A1070F second address: 4A1071E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B20Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A1071E second address: 4A10736 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBF093632F4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10736 second address: 4A1073A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A1073A second address: 4A10758 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FBF093632EEh 0x0000000e xchg eax, ebp 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10758 second address: 4A1075C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A1075C second address: 4A10762 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10762 second address: 4A107B2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx ecx, bx 0x00000006 call 00007FBF0920B217h 0x0000000b pop eax 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov ebp, esp 0x00000011 jmp 00007FBF0920B20Fh 0x00000016 xchg eax, ecx 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a push edi 0x0000001b pop eax 0x0000001c jmp 00007FBF0920B217h 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A107B2 second address: 4A10861 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, 1DBAh 0x00000007 mov ax, dx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e jmp 00007FBF093632ECh 0x00000013 xchg eax, ecx 0x00000014 pushad 0x00000015 pushfd 0x00000016 jmp 00007FBF093632EEh 0x0000001b add ax, 2E28h 0x00000020 jmp 00007FBF093632EBh 0x00000025 popfd 0x00000026 movzx esi, bx 0x00000029 popad 0x0000002a push ebp 0x0000002b pushad 0x0000002c pushfd 0x0000002d jmp 00007FBF093632EEh 0x00000032 xor eax, 35D7E088h 0x00000038 jmp 00007FBF093632EBh 0x0000003d popfd 0x0000003e pushfd 0x0000003f jmp 00007FBF093632F8h 0x00000044 xor eax, 13EE42E8h 0x0000004a jmp 00007FBF093632EBh 0x0000004f popfd 0x00000050 popad 0x00000051 mov dword ptr [esp], esi 0x00000054 pushad 0x00000055 call 00007FBF093632F4h 0x0000005a mov bh, al 0x0000005c pop ebx 0x0000005d push eax 0x0000005e push edx 0x0000005f movzx esi, bx 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10861 second address: 4A10875 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 lea eax, dword ptr [ebp-04h] 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d movzx ecx, bx 0x00000010 mov si, dx 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10875 second address: 4A108A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop ebx 0x00000005 mov esi, 435FB8F9h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e jmp 00007FBF093632F4h 0x00000013 push eax 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FBF093632EEh 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A108A8 second address: 4A108AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A108AE second address: 4A108B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A108B2 second address: 4A108CB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B20Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A108CB second address: 4A108D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A108D1 second address: 4A108D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10942 second address: 4A10976 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FBF093632F7h 0x00000008 pop esi 0x00000009 mov dx, 95FCh 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov esi, eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FBF093632EEh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10976 second address: 4A1097C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A1097C second address: 4A10980 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A109CC second address: 4A001BA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B212h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a jmp 00007FBF0920B210h 0x0000000f leave 0x00000010 jmp 00007FBF0920B210h 0x00000015 retn 0004h 0x00000018 nop 0x00000019 cmp eax, 00000000h 0x0000001c setne al 0x0000001f jmp 00007FBF0920B202h 0x00000021 xor ebx, ebx 0x00000023 test al, 01h 0x00000025 jne 00007FBF0920B207h 0x00000027 sub esp, 04h 0x0000002a mov dword ptr [esp], 0000000Dh 0x00000031 call 00007FBF0D998963h 0x00000036 mov edi, edi 0x00000038 jmp 00007FBF0920B211h 0x0000003d xchg eax, ebp 0x0000003e jmp 00007FBF0920B20Eh 0x00000043 push eax 0x00000044 pushad 0x00000045 pushfd 0x00000046 jmp 00007FBF0920B211h 0x0000004b sbb eax, 4B4E4346h 0x00000051 jmp 00007FBF0920B211h 0x00000056 popfd 0x00000057 push eax 0x00000058 push edx 0x00000059 mov bl, ah 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A001BA second address: 4A00201 instructions: 0x00000000 rdtsc 0x00000002 movsx ebx, si 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 xchg eax, ebp 0x00000009 jmp 00007FBF093632F2h 0x0000000e mov ebp, esp 0x00000010 jmp 00007FBF093632F0h 0x00000015 sub esp, 2Ch 0x00000018 jmp 00007FBF093632F0h 0x0000001d xchg eax, ebx 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00201 second address: 4A00205 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00205 second address: 4A0020B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A0020B second address: 4A00233 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FBF0920B211h 0x00000008 pop esi 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FBF0920B20Dh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00233 second address: 4A0024F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A0024F second address: 4A00253 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00253 second address: 4A00259 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00259 second address: 4A00277 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, 4E67h 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, edi 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FBF0920B20Fh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00277 second address: 4A0028F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBF093632F4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A0028F second address: 4A002B7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B20Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FBF0920B214h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00317 second address: 4A003B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub ebx, ebx 0x0000000b jmp 00007FBF093632F7h 0x00000010 sub edi, edi 0x00000012 jmp 00007FBF093632EFh 0x00000017 inc ebx 0x00000018 jmp 00007FBF093632F6h 0x0000001d test al, al 0x0000001f pushad 0x00000020 pushfd 0x00000021 jmp 00007FBF093632EEh 0x00000026 sbb ah, 00000068h 0x00000029 jmp 00007FBF093632EBh 0x0000002e popfd 0x0000002f mov dx, cx 0x00000032 popad 0x00000033 je 00007FBF09363463h 0x00000039 jmp 00007FBF093632F2h 0x0000003e lea ecx, dword ptr [ebp-14h] 0x00000041 push eax 0x00000042 push edx 0x00000043 push eax 0x00000044 push edx 0x00000045 pushad 0x00000046 popad 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A003B3 second address: 4A003B9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A003B9 second address: 4A003BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A003BF second address: 4A003C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A003C3 second address: 4A003C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A003C7 second address: 4A003D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [ebp-14h], edi 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A003D8 second address: 4A003DE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A003DE second address: 4A003E5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cl, 70h 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00431 second address: 4A00435 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00435 second address: 4A00448 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B20Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00448 second address: 4A0044E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A0044E second address: 4A00452 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A004D4 second address: 4A004E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBF093632F1h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A004E9 second address: 4A0056A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 cmp dword ptr [ebp-14h], edi 0x0000000b jmp 00007FBF0920B20Dh 0x00000010 jne 00007FBF7B8991A0h 0x00000016 jmp 00007FBF0920B20Eh 0x0000001b mov ebx, dword ptr [ebp+08h] 0x0000001e jmp 00007FBF0920B210h 0x00000023 lea eax, dword ptr [ebp-2Ch] 0x00000026 jmp 00007FBF0920B210h 0x0000002b xchg eax, esi 0x0000002c push eax 0x0000002d push edx 0x0000002e pushad 0x0000002f pushfd 0x00000030 jmp 00007FBF0920B218h 0x00000035 sub ax, B8E8h 0x0000003a jmp 00007FBF0920B20Bh 0x0000003f popfd 0x00000040 popad 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A0056A second address: 4A0058E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A0058E second address: 4A005A8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B216h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A005A8 second address: 4A005BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBF093632EEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A005BA second address: 4A005C8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c mov eax, edi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A005C8 second address: 4A00661 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FBF093632EFh 0x00000008 add si, 6B9Eh 0x0000000d jmp 00007FBF093632F9h 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 mov ebx, esi 0x00000017 popad 0x00000018 nop 0x00000019 jmp 00007FBF093632EAh 0x0000001e push eax 0x0000001f jmp 00007FBF093632EBh 0x00000024 nop 0x00000025 jmp 00007FBF093632F6h 0x0000002a xchg eax, ebx 0x0000002b jmp 00007FBF093632F0h 0x00000030 push eax 0x00000031 jmp 00007FBF093632EBh 0x00000036 xchg eax, ebx 0x00000037 push eax 0x00000038 push edx 0x00000039 jmp 00007FBF093632F5h 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00020 second address: 4A0003B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B217h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A0003B second address: 4A00067 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FBF093632ECh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00067 second address: 4A000A8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FBF0920B211h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebp 0x0000000e jmp 00007FBF0920B20Ch 0x00000013 mov ebp, esp 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FBF0920B217h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A000A8 second address: 4A000AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A000AE second address: 4A000D0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B20Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ecx 0x0000000c pushad 0x0000000d mov eax, 4F6C2FDBh 0x00000012 mov edx, esi 0x00000014 popad 0x00000015 push eax 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A000D0 second address: 4A000D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A000D4 second address: 4A000DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A000DA second address: 4A000F6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FBF093632F7h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A000F6 second address: 4A0011F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ecx 0x00000008 jmp 00007FBF0920B214h 0x0000000d mov dword ptr [ebp-04h], 55534552h 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A0011F second address: 4A00123 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00123 second address: 4A00127 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00127 second address: 4A0012D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00CB9 second address: 4A00CD3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B216h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00CD3 second address: 4A00CD9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00CD9 second address: 4A00CDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00D59 second address: 4A00D5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00D5D second address: 4A00D6C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B20Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00D6C second address: 4A00DED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop esi 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a test al, al 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FBF093632EDh 0x00000013 xor si, B146h 0x00000018 jmp 00007FBF093632F1h 0x0000001d popfd 0x0000001e popad 0x0000001f je 00007FBF7B9D6ECCh 0x00000025 pushad 0x00000026 pushfd 0x00000027 jmp 00007FBF093632F3h 0x0000002c sub ecx, 4D1C087Eh 0x00000032 jmp 00007FBF093632F9h 0x00000037 popfd 0x00000038 push ecx 0x00000039 mov ax, bx 0x0000003c pop ebx 0x0000003d popad 0x0000003e cmp dword ptr [ebp+08h], 00002000h 0x00000045 push eax 0x00000046 push edx 0x00000047 push eax 0x00000048 push edx 0x00000049 push eax 0x0000004a push edx 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00DED second address: 4A00DF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00DF1 second address: 4A00DF5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A00DF5 second address: 4A00DFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10A35 second address: 4A10AB2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632EDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FBF093632EEh 0x0000000f push eax 0x00000010 pushad 0x00000011 mov dx, 0AD4h 0x00000015 pushfd 0x00000016 jmp 00007FBF093632EDh 0x0000001b jmp 00007FBF093632EBh 0x00000020 popfd 0x00000021 popad 0x00000022 xchg eax, ebp 0x00000023 pushad 0x00000024 pushfd 0x00000025 jmp 00007FBF093632F4h 0x0000002a xor cl, FFFFFFB8h 0x0000002d jmp 00007FBF093632EBh 0x00000032 popfd 0x00000033 movzx ecx, di 0x00000036 popad 0x00000037 mov ebp, esp 0x00000039 push eax 0x0000003a push edx 0x0000003b jmp 00007FBF093632EEh 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10AB2 second address: 4A10ADF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF0920B20Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a pushad 0x0000000b jmp 00007FBF0920B20Bh 0x00000010 popad 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FBF0920B20Bh 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10ADF second address: 4A10AE5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10AE5 second address: 4A10AF4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBF0920B20Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10AF4 second address: 4A10AF8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10AF8 second address: 4A10BA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 jmp 00007FBF0920B215h 0x0000000e mov esi, dword ptr [ebp+0Ch] 0x00000011 jmp 00007FBF0920B20Eh 0x00000016 test esi, esi 0x00000018 pushad 0x00000019 pushfd 0x0000001a jmp 00007FBF0920B20Eh 0x0000001f jmp 00007FBF0920B215h 0x00000024 popfd 0x00000025 mov ebx, esi 0x00000027 popad 0x00000028 je 00007FBF7B878A6Bh 0x0000002e jmp 00007FBF0920B20Ah 0x00000033 cmp dword ptr [770E459Ch], 05h 0x0000003a pushad 0x0000003b mov si, 9A9Dh 0x0000003f pushfd 0x00000040 jmp 00007FBF0920B20Ah 0x00000045 xor esi, 26CD4FF8h 0x0000004b jmp 00007FBF0920B20Bh 0x00000050 popfd 0x00000051 popad 0x00000052 je 00007FBF7B890B11h 0x00000058 push eax 0x00000059 push edx 0x0000005a jmp 00007FBF0920B215h 0x0000005f rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10BA9 second address: 4A10BB9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FBF093632ECh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10BB9 second address: 4A10BBD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10C1A second address: 4A10C55 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF093632F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a pushad 0x0000000b mov ax, AE43h 0x0000000f jmp 00007FBF093632F8h 0x00000014 popad 0x00000015 push eax 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10C55 second address: 4A10C5B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10C5B second address: 4A10C61 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10CA2 second address: 4A10CA6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10CA6 second address: 4A10CF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushfd 0x00000007 jmp 00007FBF093632EEh 0x0000000c adc esi, 09C762F8h 0x00000012 jmp 00007FBF093632EBh 0x00000017 popfd 0x00000018 popad 0x00000019 pop esi 0x0000001a jmp 00007FBF093632F6h 0x0000001f pop ebp 0x00000020 pushad 0x00000021 jmp 00007FBF093632EEh 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\fr2Mul3G6m.exe | RDTSC instruction interceptor: First address: 4A10CF9 second address: 4A10CFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |