Source: OtHVIQ2ge4.exe, 00000000.00000002.1923723190.0000000001747000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669399598.0000000001747000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exe |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1923723190.0000000001747000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669399598.0000000001747000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exe8 |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1923723190.0000000001747000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669399598.0000000001747000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exer |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1923723190.0000000001747000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669196004.0000000005DF7000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669399598.0000000001747000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1463375710.0000000005E50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1463375710.0000000005E50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1669196004.0000000005DF7000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1923723190.0000000001747000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669196004.0000000005DF7000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669399598.0000000001747000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1927343304.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1923723190.0000000001747000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669399598.0000000001747000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1923723190.0000000001741000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669399598.000000000173E000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1490834833.000000000170A000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1412529541.000000000170A000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1515380529.000000000170A000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1490653917.00000000016E9000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1533192683.000000000170B000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1412390385.00000000016E7000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1515231364.00000000016E9000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1412482635.00000000016E9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.microsoft |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1463375710.0000000005E50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1923723190.0000000001747000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669196004.0000000005DF7000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669399598.0000000001747000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1463375710.0000000005E50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1463375710.0000000005E50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1669196004.0000000005DF7000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTru |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1923723190.0000000001747000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669196004.0000000005DF7000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669399598.0000000001747000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1463375710.0000000005E50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1463375710.0000000005E50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1668686461.0000000005E18000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005E17000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000002.1928241920.0000000006499000.00000002.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1668516238.0000000005E73000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005DA6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1463375710.0000000005E50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1923723190.0000000001747000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669196004.0000000005DF7000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669399598.0000000001747000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0A |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1923723190.0000000001747000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669196004.0000000005DF7000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669399598.0000000001747000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0C |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1669196004.0000000005DF7000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0X |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1927343304.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1927343304.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000002.1923723190.0000000001747000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669399598.0000000001747000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/rootr30; |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1463375710.0000000005E50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1927343304.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1927343304.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000002.1923723190.0000000001747000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669399598.0000000001747000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06 |
Source: Amcache.hve.5.dr | String found in binary or memory: http://upx.sf.net |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1463375710.0000000005E50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1463375710.0000000005E50000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1413980413.0000000005DDD000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1414278908.0000000005DDA000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1414039052.0000000005DDA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1669399598.000000000173E000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005E08000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000002.1927498523.0000000005E08000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aui-cdn.atlassian.com/ |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1927498523.0000000005E08000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005E08000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000002.1927498523.0000000005E08000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-exp.pro |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1927498523.0000000005E08000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-exp.prod-east.frontend.public.atl-paas.net |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1927498523.0000000005E08000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1927498523.0000000005E08000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1927498523.0000000005E08000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/ |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1927498523.0000000005E08000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/; |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1927498523.0000000005E08000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/ |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1927498523.0000000005DFB000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669399598.0000000001747000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000002.1927498523.0000000005E08000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669516961.0000000001754000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1- |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1923723190.00000000016D4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com:443 |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1923723190.00000000016E7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1923369236.000000000135A000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe.0.0 |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1923723190.00000000016D4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe0 |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1923723190.00000000016E7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exeagerQ |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1923723190.00000000016D4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exef |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1923723190.00000000016D4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org:443/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1669399598.000000000173E000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005E08000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000002.1927498523.0000000005E08000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.cookielaw.org/ |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1413980413.0000000005DDD000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1414278908.0000000005DDA000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1414039052.0000000005DDA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1413980413.0000000005DDD000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1414278908.0000000005DDA000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1414039052.0000000005DDA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1413980413.0000000005DDD000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1414278908.0000000005DDA000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1414039052.0000000005DDA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1413980413.0000000005DDD000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1414278908.0000000005DDA000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1414039052.0000000005DDA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1413980413.0000000005DDD000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1414278908.0000000005DDA000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1414039052.0000000005DDA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1413980413.0000000005DDD000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1414278908.0000000005DDA000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1414039052.0000000005DDA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1669399598.000000000173E000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005E08000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000002.1927498523.0000000005E08000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://dz8aopenkvv6s.cloudfront.net |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1571967887.0000000001762000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1412482635.00000000016E9000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669516961.0000000001754000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1437414630.0000000005E21000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/ |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1412529541.000000000170A000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1412390385.00000000016E7000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1412482635.00000000016E9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/RC |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1488527580.0000000005E31000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1488413895.0000000005E30000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1488229578.0000000005E30000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/Uu |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1412529541.000000000170A000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1515056514.0000000001755000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1515380529.000000000170A000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000002.1923723190.00000000016E7000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1533192683.000000000170B000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1412390385.00000000016E7000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1515231364.00000000016E9000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1412482635.00000000016E9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/api |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1412390385.00000000016CD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/api-Age |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1515056514.0000000001755000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apik |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1412529541.000000000170A000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1412390385.00000000016E7000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1412482635.00000000016E9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apip |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1465585068.0000000005E30000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1488527580.0000000005E31000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1488413895.0000000005E30000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1462101979.0000000005E30000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1488229578.0000000005E30000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1460907654.0000000005E30000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/ry |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1515056514.0000000001762000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1519646355.0000000001762000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/s |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1490713276.00000000016D4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat:443/api |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1515306602.00000000016D4000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1572011566.00000000016D4000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000002.1923723190.00000000016D4000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1490713276.00000000016D4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat:443/apin.txtPK |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1927498523.0000000005E08000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.prod-east.frontend.public.atl-paas.net |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1927498523.0000000005E08000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1465943932.0000000005EBF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1465943932.0000000005EBF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1669399598.000000000173E000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005E08000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000002.1927498523.0000000005E08000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1413980413.0000000005DDD000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1414278908.0000000005DDA000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1414039052.0000000005DDA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: OtHVIQ2ge4.exe, 00000000.00000002.1927343304.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000002.1923723190.0000000001747000.00000004.00000020.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669196004.0000000005DF7000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1667707090.0000000005DF6000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1669399598.0000000001747000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1413980413.0000000005DDD000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1414278908.0000000005DDA000.00000004.00000800.00020000.00000000.sdmp, OtHVIQ2ge4.exe, 00000000.00000003.1414039052.0000000005DDA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1465943932.0000000005EBF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.HCe2hc5EPKfq |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1465943932.0000000005EBF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.oX6J3D7V9Efv |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1465943932.0000000005EBF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1465943932.0000000005EBF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1465943932.0000000005EBF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg |
Source: OtHVIQ2ge4.exe, 00000000.00000003.1465943932.0000000005EBF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5C7F11 second address: 5C7F17 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5C7F17 second address: 5C7F1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 74C206 second address: 74C230 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FF628B69586h 0x00000008 jnp 00007FF628B69586h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FF628B69598h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 74C50C second address: 74C517 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FF628D73F56h 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 74C517 second address: 74C527 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007FF628B69586h 0x0000000a js 00007FF628B69586h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 74C527 second address: 74C52B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 74C52B second address: 74C53E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FF628B69586h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push edi 0x0000000f push eax 0x00000010 push edx 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 74C53E second address: 74C557 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jnl 00007FF628D73F56h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF628D73F5Bh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 74C683 second address: 74C68E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FF628B69586h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 74C93F second address: 74C948 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5C7EF7 second address: 5C7F11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FF628B69593h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 75037F second address: 75038C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 75038C second address: 750391 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 750391 second address: 750397 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 750397 second address: 7503A8 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7503A8 second address: 7503DC instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 mov eax, dword ptr [eax] 0x00000009 push ecx 0x0000000a jmp 00007FF628D73F69h 0x0000000f pop ecx 0x00000010 mov dword ptr [esp+04h], eax 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FF628D73F5Ah 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7503DC second address: 5C7F11 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B69599h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a sub dword ptr [ebp+122D1EEAh], ecx 0x00000010 push dword ptr [ebp+122D14DDh] 0x00000016 jmp 00007FF628B6958Dh 0x0000001b jmp 00007FF628B69597h 0x00000020 call dword ptr [ebp+122D1F1Fh] 0x00000026 pushad 0x00000027 mov dword ptr [ebp+122D1CE9h], ebx 0x0000002d xor eax, eax 0x0000002f pushad 0x00000030 mov di, B370h 0x00000034 or dword ptr [ebp+122D20C9h], ebx 0x0000003a popad 0x0000003b mov edx, dword ptr [esp+28h] 0x0000003f pushad 0x00000040 mov ah, 48h 0x00000042 mov esi, dword ptr [ebp+122D2CD1h] 0x00000048 popad 0x00000049 mov dword ptr [ebp+122D2DB9h], eax 0x0000004f stc 0x00000050 stc 0x00000051 mov esi, 0000003Ch 0x00000056 jmp 00007FF628B69594h 0x0000005b add esi, dword ptr [esp+24h] 0x0000005f stc 0x00000060 cld 0x00000061 lodsw 0x00000063 add dword ptr [ebp+122D1CE9h], ecx 0x00000069 jmp 00007FF628B6958Ah 0x0000006e add eax, dword ptr [esp+24h] 0x00000072 jns 00007FF628B69592h 0x00000078 mov ebx, dword ptr [esp+24h] 0x0000007c stc 0x0000007d mov dword ptr [ebp+122D1CE9h], ebx 0x00000083 nop 0x00000084 je 00007FF628B69592h 0x0000008a jnp 00007FF628B6958Ch 0x00000090 push eax 0x00000091 push eax 0x00000092 push edx 0x00000093 jmp 00007FF628B69593h 0x00000098 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 750498 second address: 7504D9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F63h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor dword ptr [esp], 1B92B0B8h 0x00000010 mov edi, dword ptr [ebp+122D20DBh] 0x00000016 push 00000003h 0x00000018 stc 0x00000019 push 00000000h 0x0000001b add si, 6E35h 0x00000020 push 00000003h 0x00000022 and ch, 00000002h 0x00000025 call 00007FF628D73F59h 0x0000002a push esi 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e push edx 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7504D9 second address: 7504DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7504DD second address: 7504E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7504E1 second address: 7504F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b jnp 00007FF628B69586h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7504F2 second address: 7504FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7504FC second address: 750500 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 750500 second address: 750535 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FF628D73F56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f jmp 00007FF628D73F5Bh 0x00000014 mov eax, dword ptr [eax] 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FF628D73F67h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 750535 second address: 75053B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 750739 second address: 75073E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 75073E second address: 750795 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push esi 0x00000009 jmp 00007FF628B6958Fh 0x0000000e pop esi 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 jmp 00007FF628B69596h 0x00000018 mov eax, dword ptr [eax] 0x0000001a jl 00007FF628B69592h 0x00000020 mov dword ptr [esp+04h], eax 0x00000024 pushad 0x00000025 jc 00007FF628B69588h 0x0000002b pushad 0x0000002c popad 0x0000002d push edx 0x0000002e push eax 0x0000002f push edx 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 750830 second address: 75086C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F63h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FF628D73F65h 0x0000000e popad 0x0000000f push eax 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FF628D73F5Bh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 75086C second address: 750901 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B69590h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FF628B69598h 0x0000000e popad 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 je 00007FF628B69599h 0x00000019 jno 00007FF628B69593h 0x0000001f mov eax, dword ptr [eax] 0x00000021 jnc 00007FF628B6959Bh 0x00000027 mov dword ptr [esp+04h], eax 0x0000002b jg 00007FF628B6958Eh 0x00000031 pop eax 0x00000032 cmc 0x00000033 lea ebx, dword ptr [ebp+1245C2D4h] 0x00000039 push eax 0x0000003a push eax 0x0000003b push edx 0x0000003c jne 00007FF628B69591h 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 736B46 second address: 736B56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007FF628D73F56h 0x0000000a jnp 00007FF628D73F56h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 76F53F second address: 76F544 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 76F544 second address: 76F54A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 76F815 second address: 76F81B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 76F81B second address: 76F82C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 jng 00007FF628D73F82h 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 76F82C second address: 76F832 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 76F832 second address: 76F836 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 76F836 second address: 76F84E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B69594h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 76F978 second address: 76F97C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 76F97C second address: 76F99E instructions: 0x00000000 rdtsc 0x00000002 jno 00007FF628B69586h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c jmp 00007FF628B69594h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 76F99E second address: 76F9B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 je 00007FF628D73F56h 0x0000000f jnc 00007FF628D73F56h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7701C0 second address: 7701C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7705C9 second address: 7705CF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7705CF second address: 7705D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7705D5 second address: 7705DA instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7705DA second address: 77062B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FF628B69586h 0x0000000a pop edx 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e pushad 0x0000000f jmp 00007FF628B6958Eh 0x00000014 push edi 0x00000015 pop edi 0x00000016 popad 0x00000017 pushad 0x00000018 ja 00007FF628B69586h 0x0000001e jnp 00007FF628B69586h 0x00000024 push esi 0x00000025 pop esi 0x00000026 jmp 00007FF628B69597h 0x0000002b popad 0x0000002c push eax 0x0000002d push edx 0x0000002e jno 00007FF628B69586h 0x00000034 push eax 0x00000035 push edx 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 77062B second address: 77062F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 770768 second address: 77076C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 77076C second address: 77077C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007FF628D73F5Eh 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 770EAE second address: 770EC9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B69597h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7710A2 second address: 7710A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7710A8 second address: 7710C3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B69597h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7710C3 second address: 7710DF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F67h 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 771512 second address: 771516 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 77427C second address: 7742B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF628D73F69h 0x0000000b popad 0x0000000c push eax 0x0000000d pushad 0x0000000e jc 00007FF628D73F65h 0x00000014 jmp 00007FF628D73F5Fh 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7747EE second address: 7747F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7443AE second address: 7443B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7443B2 second address: 7443B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 77B853 second address: 77B871 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jmp 00007FF628D73F69h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 77D81C second address: 77D82A instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF628B69586h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 77F25F second address: 77F269 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF628D73F56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 77F30B second address: 77F312 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 77F3AF second address: 77F3B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 77F49F second address: 77F4A9 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 77F9B9 second address: 77F9E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 mov dword ptr [esp], ebx 0x00000009 add esi, 440095CAh 0x0000000f nop 0x00000010 push esi 0x00000011 pushad 0x00000012 je 00007FF628D73F56h 0x00000018 push edi 0x00000019 pop edi 0x0000001a popad 0x0000001b pop esi 0x0000001c push eax 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007FF628D73F60h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 77FBF5 second address: 77FBFA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 77FEB2 second address: 77FEB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 77FEB6 second address: 77FEBA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 780041 second address: 780047 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 782813 second address: 78281D instructions: 0x00000000 rdtsc 0x00000002 jno 00007FF628B69586h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78281D second address: 782823 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 782823 second address: 78283D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF628B6958Fh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78283D second address: 782843 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 782843 second address: 782847 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7854AF second address: 78553F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pop ecx 0x00000008 mov dword ptr [esp], eax 0x0000000b push 00000000h 0x0000000d push ebp 0x0000000e call 00007FF628D73F58h 0x00000013 pop ebp 0x00000014 mov dword ptr [esp+04h], ebp 0x00000018 add dword ptr [esp+04h], 0000001Bh 0x00000020 inc ebp 0x00000021 push ebp 0x00000022 ret 0x00000023 pop ebp 0x00000024 ret 0x00000025 push 00000000h 0x00000027 push 00000000h 0x00000029 push eax 0x0000002a call 00007FF628D73F58h 0x0000002f pop eax 0x00000030 mov dword ptr [esp+04h], eax 0x00000034 add dword ptr [esp+04h], 00000018h 0x0000003c inc eax 0x0000003d push eax 0x0000003e ret 0x0000003f pop eax 0x00000040 ret 0x00000041 jnl 00007FF628D73F68h 0x00000047 or dword ptr [ebp+12489FB1h], edi 0x0000004d push 00000000h 0x0000004f xor si, 812Ah 0x00000054 xchg eax, ebx 0x00000055 pushad 0x00000056 jo 00007FF628D73F58h 0x0000005c pushad 0x0000005d popad 0x0000005e push eax 0x0000005f push edx 0x00000060 jmp 00007FF628D73F5Fh 0x00000065 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78553F second address: 785543 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78905B second address: 789060 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 785C8A second address: 785C90 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 785C90 second address: 785C94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 785C94 second address: 785CA5 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF628B69586h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 740D08 second address: 740D1C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F60h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78BABF second address: 78BB36 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B6958Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a jmp 00007FF628B69597h 0x0000000f push 00000000h 0x00000011 push 00000000h 0x00000013 push ebp 0x00000014 call 00007FF628B69588h 0x00000019 pop ebp 0x0000001a mov dword ptr [esp+04h], ebp 0x0000001e add dword ptr [esp+04h], 00000018h 0x00000026 inc ebp 0x00000027 push ebp 0x00000028 ret 0x00000029 pop ebp 0x0000002a ret 0x0000002b push 00000000h 0x0000002d push 00000000h 0x0000002f push eax 0x00000030 call 00007FF628B69588h 0x00000035 pop eax 0x00000036 mov dword ptr [esp+04h], eax 0x0000003a add dword ptr [esp+04h], 00000015h 0x00000042 inc eax 0x00000043 push eax 0x00000044 ret 0x00000045 pop eax 0x00000046 ret 0x00000047 mov dword ptr [ebp+122D23E3h], ebx 0x0000004d cld 0x0000004e push eax 0x0000004f push eax 0x00000050 push edx 0x00000051 pushad 0x00000052 push edi 0x00000053 pop edi 0x00000054 push eax 0x00000055 push edx 0x00000056 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78BB36 second address: 78BB3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78CA60 second address: 78CAB2 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FF628B6958Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d mov edi, 6C109E01h 0x00000012 mov edi, edx 0x00000014 push 00000000h 0x00000016 jmp 00007FF628B6958Dh 0x0000001b push 00000000h 0x0000001d jnc 00007FF628B69597h 0x00000023 xchg eax, esi 0x00000024 push ecx 0x00000025 pushad 0x00000026 jmp 00007FF628B6958Bh 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78BD0C second address: 78BD17 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jo 00007FF628D73F56h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78CAB2 second address: 78CAD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ecx 0x00000006 push eax 0x00000007 pushad 0x00000008 jmp 00007FF628B69595h 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78BD17 second address: 78BD96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 mov edi, dword ptr [ebp+122D2BF9h] 0x0000000e push dword ptr fs:[00000000h] 0x00000015 push 00000000h 0x00000017 push ebx 0x00000018 call 00007FF628D73F58h 0x0000001d pop ebx 0x0000001e mov dword ptr [esp+04h], ebx 0x00000022 add dword ptr [esp+04h], 0000001Bh 0x0000002a inc ebx 0x0000002b push ebx 0x0000002c ret 0x0000002d pop ebx 0x0000002e ret 0x0000002f push esi 0x00000030 cld 0x00000031 pop ebx 0x00000032 mov dword ptr fs:[00000000h], esp 0x00000039 call 00007FF628D73F62h 0x0000003e mov ebx, dword ptr [ebp+122D3706h] 0x00000044 pop edi 0x00000045 mov eax, dword ptr [ebp+122D0C9Dh] 0x0000004b movsx ebx, ax 0x0000004e push FFFFFFFFh 0x00000050 jmp 00007FF628D73F63h 0x00000055 nop 0x00000056 push eax 0x00000057 push edx 0x00000058 pushad 0x00000059 push eax 0x0000005a push edx 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78BD96 second address: 78BD9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78EA5F second address: 78EA64 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78EA64 second address: 78EACF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push ebx 0x0000000d call 00007FF628B69588h 0x00000012 pop ebx 0x00000013 mov dword ptr [esp+04h], ebx 0x00000017 add dword ptr [esp+04h], 0000001Bh 0x0000001f inc ebx 0x00000020 push ebx 0x00000021 ret 0x00000022 pop ebx 0x00000023 ret 0x00000024 mov edi, dword ptr [ebp+122D3624h] 0x0000002a push 00000000h 0x0000002c sub ebx, 27E4C14Ah 0x00000032 push 00000000h 0x00000034 push 00000000h 0x00000036 push edx 0x00000037 call 00007FF628B69588h 0x0000003c pop edx 0x0000003d mov dword ptr [esp+04h], edx 0x00000041 add dword ptr [esp+04h], 0000001Bh 0x00000049 inc edx 0x0000004a push edx 0x0000004b ret 0x0000004c pop edx 0x0000004d ret 0x0000004e mov bx, 385Bh 0x00000052 push eax 0x00000053 push eax 0x00000054 push edx 0x00000055 push eax 0x00000056 push edx 0x00000057 push eax 0x00000058 push edx 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78EACF second address: 78EAD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78EAD3 second address: 78EAE2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B6958Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78EAE2 second address: 78EAEC instructions: 0x00000000 rdtsc 0x00000002 je 00007FF628D73F5Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78FADA second address: 78FAE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78FAE1 second address: 78FB00 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FF628D73F65h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78FB00 second address: 78FB18 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FF628B69590h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78FB18 second address: 78FB1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78FB1C second address: 78FB97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ebx 0x0000000b call 00007FF628B69588h 0x00000010 pop ebx 0x00000011 mov dword ptr [esp+04h], ebx 0x00000015 add dword ptr [esp+04h], 00000017h 0x0000001d inc ebx 0x0000001e push ebx 0x0000001f ret 0x00000020 pop ebx 0x00000021 ret 0x00000022 mov dword ptr [ebp+122D229Ch], esi 0x00000028 push 00000000h 0x0000002a mov di, F8D4h 0x0000002e push 00000000h 0x00000030 push 00000000h 0x00000032 push edi 0x00000033 call 00007FF628B69588h 0x00000038 pop edi 0x00000039 mov dword ptr [esp+04h], edi 0x0000003d add dword ptr [esp+04h], 0000001Ch 0x00000045 inc edi 0x00000046 push edi 0x00000047 ret 0x00000048 pop edi 0x00000049 ret 0x0000004a pushad 0x0000004b mov bx, 5424h 0x0000004f mov cx, ax 0x00000052 popad 0x00000053 mov dword ptr [ebp+124558D5h], ecx 0x00000059 xchg eax, esi 0x0000005a push eax 0x0000005b push edx 0x0000005c pushad 0x0000005d jmp 00007FF628B6958Dh 0x00000062 push eax 0x00000063 push edx 0x00000064 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78FB97 second address: 78FB9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78FB9C second address: 78FBA6 instructions: 0x00000000 rdtsc 0x00000002 je 00007FF628B6958Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78FD06 second address: 78FD0C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78FD0C second address: 78FD29 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B6958Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ebx 0x0000000b je 00007FF628B6958Ch 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78FD29 second address: 78FDCB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 nop 0x00000006 mov ebx, 7DD6FA9Bh 0x0000000b push dword ptr fs:[00000000h] 0x00000012 mov dword ptr [ebp+12460BE0h], ebx 0x00000018 mov ebx, dword ptr [ebp+122D2EF9h] 0x0000001e mov dword ptr fs:[00000000h], esp 0x00000025 push 00000000h 0x00000027 push ecx 0x00000028 call 00007FF628D73F58h 0x0000002d pop ecx 0x0000002e mov dword ptr [esp+04h], ecx 0x00000032 add dword ptr [esp+04h], 0000001Ch 0x0000003a inc ecx 0x0000003b push ecx 0x0000003c ret 0x0000003d pop ecx 0x0000003e ret 0x0000003f sub dword ptr [ebp+122D2226h], edx 0x00000045 mov eax, dword ptr [ebp+122D0CE5h] 0x0000004b push 00000000h 0x0000004d push edx 0x0000004e call 00007FF628D73F58h 0x00000053 pop edx 0x00000054 mov dword ptr [esp+04h], edx 0x00000058 add dword ptr [esp+04h], 0000001Bh 0x00000060 inc edx 0x00000061 push edx 0x00000062 ret 0x00000063 pop edx 0x00000064 ret 0x00000065 jmp 00007FF628D73F65h 0x0000006a push FFFFFFFFh 0x0000006c mov dword ptr [ebp+122D2157h], ebx 0x00000072 mov dword ptr [ebp+12489CF0h], ebx 0x00000078 push eax 0x00000079 push eax 0x0000007a push edx 0x0000007b push eax 0x0000007c push edx 0x0000007d push eax 0x0000007e push edx 0x0000007f rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78FDCB second address: 78FDCF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78FDCF second address: 78FDD5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78FDD5 second address: 78FDDF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FF628B69586h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7929FC second address: 792A01 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 792A01 second address: 792A74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push edi 0x0000000b call 00007FF628B69588h 0x00000010 pop edi 0x00000011 mov dword ptr [esp+04h], edi 0x00000015 add dword ptr [esp+04h], 00000018h 0x0000001d inc edi 0x0000001e push edi 0x0000001f ret 0x00000020 pop edi 0x00000021 ret 0x00000022 mov dword ptr [ebp+122D2226h], ecx 0x00000028 push 00000000h 0x0000002a call 00007FF628B6958Bh 0x0000002f mov di, F4FCh 0x00000033 pop ebx 0x00000034 push 00000000h 0x00000036 push 00000000h 0x00000038 push eax 0x00000039 call 00007FF628B69588h 0x0000003e pop eax 0x0000003f mov dword ptr [esp+04h], eax 0x00000043 add dword ptr [esp+04h], 0000001Ch 0x0000004b inc eax 0x0000004c push eax 0x0000004d ret 0x0000004e pop eax 0x0000004f ret 0x00000050 movzx edi, di 0x00000053 push eax 0x00000054 js 00007FF628B6958Eh 0x0000005a push edi 0x0000005b push eax 0x0000005c push edx 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 793AE8 second address: 793AF9 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FF628D73F56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 793AF9 second address: 793B51 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FF628B69599h 0x0000000c push eax 0x0000000d pop eax 0x0000000e popad 0x0000000f popad 0x00000010 nop 0x00000011 mov dword ptr [ebp+122D36FEh], ecx 0x00000017 mov ebx, dword ptr [ebp+122D360Dh] 0x0000001d push 00000000h 0x0000001f pushad 0x00000020 xor dword ptr [ebp+122D211Eh], eax 0x00000026 movsx ecx, si 0x00000029 popad 0x0000002a push 00000000h 0x0000002c mov ebx, 02264D3Bh 0x00000031 xchg eax, esi 0x00000032 push eax 0x00000033 push edx 0x00000034 jmp 00007FF628B69590h 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 793B51 second address: 793B57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 793B57 second address: 793B80 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B69599h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edi 0x0000000d jo 00007FF628B6958Ch 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 796CA4 second address: 796CA9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 796CA9 second address: 796D23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FF628B69586h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e ja 00007FF628B6958Ah 0x00000014 nop 0x00000015 call 00007FF628B69590h 0x0000001a jng 00007FF628B6959Fh 0x00000020 pop ebx 0x00000021 push 00000000h 0x00000023 push 00000000h 0x00000025 push ebx 0x00000026 call 00007FF628B69588h 0x0000002b pop ebx 0x0000002c mov dword ptr [esp+04h], ebx 0x00000030 add dword ptr [esp+04h], 0000001Ah 0x00000038 inc ebx 0x00000039 push ebx 0x0000003a ret 0x0000003b pop ebx 0x0000003c ret 0x0000003d push 00000000h 0x0000003f mov edi, 030433AFh 0x00000044 xchg eax, esi 0x00000045 push esi 0x00000046 push eax 0x00000047 push edx 0x00000048 push eax 0x00000049 push edx 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 796D23 second address: 796D27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 796D27 second address: 796D2B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 796D2B second address: 796D40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FF628D73F5Bh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 793DCC second address: 793DE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jng 00007FF628B6958Ch 0x00000010 jng 00007FF628B69586h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 794D9F second address: 794DA5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 792C73 second address: 792C77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 797DE0 second address: 797DEA instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF628D73F5Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 79905B second address: 799060 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 799F73 second address: 799F77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 79C931 second address: 79C94E instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF628B69586h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FF628B69593h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 79C94E second address: 79C967 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF628D73F65h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 79C967 second address: 79C96B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 79C96B second address: 79C99B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF628D73F68h 0x0000000b pop edx 0x0000000c pop eax 0x0000000d jng 00007FF628D73F7Ah 0x00000013 push eax 0x00000014 push edx 0x00000015 jo 00007FF628D73F56h 0x0000001b push ebx 0x0000001c pop ebx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 79C99B second address: 79C99F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7A1F9E second address: 7A1FA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7A1FA2 second address: 7A1FC6 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FF628B69586h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jnl 00007FF628B6958Eh 0x00000012 pop eax 0x00000013 pushad 0x00000014 jp 00007FF628B6958Ch 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7A1FC6 second address: 7A1FE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007FF628D73F64h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7A1FE0 second address: 7A2001 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B69594h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jns 00007FF628B69586h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7A2001 second address: 7A2007 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7A9F5F second address: 7A9F91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FF628B6958Eh 0x0000000a popad 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f push esi 0x00000010 jmp 00007FF628B6958Dh 0x00000015 pop esi 0x00000016 mov eax, dword ptr [eax] 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b jns 00007FF628B69586h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AA06F second address: 7AA07A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FF628D73F56h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AA07A second address: 7AA0A1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B69598h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jp 00007FF628B69588h 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AA0A1 second address: 7AA0C2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F5Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d pushad 0x0000000e push esi 0x0000000f push esi 0x00000010 pop esi 0x00000011 pop esi 0x00000012 push eax 0x00000013 push edx 0x00000014 jng 00007FF628D73F56h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AA0C2 second address: 7AA0EF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [eax] 0x00000009 jnp 00007FF628B69592h 0x0000000f mov dword ptr [esp+04h], eax 0x00000013 push eax 0x00000014 push edx 0x00000015 jns 00007FF628B6958Ch 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AEA87 second address: 7AEA96 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jne 00007FF628D73F56h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AEA96 second address: 7AEA9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AEA9B second address: 7AEAB1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF628D73F60h 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AEAB1 second address: 7AEAB5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AEAB5 second address: 7AEAC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AEAC2 second address: 7AEADB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jns 00007FF628B6958Ch 0x0000000f push ecx 0x00000010 pushad 0x00000011 popad 0x00000012 pop ecx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AEADB second address: 7AEAE1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AEAE1 second address: 7AEAF5 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FF628B6958Bh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AED43 second address: 7AED4F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jp 00007FF628D73F56h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AED4F second address: 7AED97 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jc 00007FF628B6958Eh 0x0000000e push edx 0x0000000f pop edx 0x00000010 jnc 00007FF628B69586h 0x00000016 pop edx 0x00000017 pop eax 0x00000018 pushad 0x00000019 ja 00007FF628B6958Ch 0x0000001f jnl 00007FF628B69586h 0x00000025 push edx 0x00000026 jng 00007FF628B69586h 0x0000002c pop edx 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 popad 0x00000031 jmp 00007FF628B69597h 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AEF11 second address: 7AEF47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF628D73F69h 0x00000009 popad 0x0000000a jmp 00007FF628D73F65h 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AEF47 second address: 7AEF56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jnp 00007FF628B69586h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AEF56 second address: 7AEF73 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F63h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AEF73 second address: 7AEF77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7AEF77 second address: 7AEF82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7B4A2C second address: 7B4A38 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7B4A38 second address: 7B4A3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7B4A3C second address: 7B4A46 instructions: 0x00000000 rdtsc 0x00000002 js 00007FF628B69586h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7B3EEB second address: 7B3F1A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF628D73F62h 0x0000000b popad 0x0000000c pushad 0x0000000d jmp 00007FF628D73F61h 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7B3F1A second address: 7B3F1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7B42ED second address: 7B42F2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7B42F2 second address: 7B42FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7B472D second address: 7B4731 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7B4731 second address: 7B4755 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF628B69586h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b pushad 0x0000000c popad 0x0000000d pop ebx 0x0000000e jbe 00007FF628B6958Eh 0x00000014 push eax 0x00000015 push edx 0x00000016 js 00007FF628B69586h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7B4755 second address: 7B4759 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7B4759 second address: 7B4770 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FF628B69586h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c popad 0x0000000d push ecx 0x0000000e push ebx 0x0000000f jo 00007FF628B69586h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 745EB8 second address: 745EBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7B7F4F second address: 7B7F5B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7B7F5B second address: 7B7F5F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7B7F5F second address: 7B7F65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 786B1C second address: 786B21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 786B21 second address: 5C7F11 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FF628B6958Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d jnc 00007FF628B69594h 0x00000013 push dword ptr [ebp+122D14DDh] 0x00000019 mov dword ptr [ebp+122D28EAh], eax 0x0000001f call dword ptr [ebp+122D1F1Fh] 0x00000025 pushad 0x00000026 mov dword ptr [ebp+122D1CE9h], ebx 0x0000002c xor eax, eax 0x0000002e pushad 0x0000002f mov di, B370h 0x00000033 or dword ptr [ebp+122D20C9h], ebx 0x00000039 popad 0x0000003a mov edx, dword ptr [esp+28h] 0x0000003e pushad 0x0000003f mov ah, 48h 0x00000041 mov esi, dword ptr [ebp+122D2CD1h] 0x00000047 popad 0x00000048 mov dword ptr [ebp+122D2DB9h], eax 0x0000004e stc 0x0000004f stc 0x00000050 mov esi, 0000003Ch 0x00000055 jmp 00007FF628B69594h 0x0000005a add esi, dword ptr [esp+24h] 0x0000005e stc 0x0000005f cld 0x00000060 lodsw 0x00000062 add dword ptr [ebp+122D1CE9h], ecx 0x00000068 jmp 00007FF628B6958Ah 0x0000006d add eax, dword ptr [esp+24h] 0x00000071 jns 00007FF628B69592h 0x00000077 mov ebx, dword ptr [esp+24h] 0x0000007b stc 0x0000007c mov dword ptr [ebp+122D1CE9h], ebx 0x00000082 nop 0x00000083 je 00007FF628B69592h 0x00000089 jnp 00007FF628B6958Ch 0x0000008f push eax 0x00000090 push eax 0x00000091 push edx 0x00000092 jmp 00007FF628B69593h 0x00000097 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 786BA8 second address: 786BBB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F5Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 786BBB second address: 786BD5 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF628B69588h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jnc 00007FF628B69586h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 786BD5 second address: 786BEE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F65h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 786BEE second address: 786C89 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B6958Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c jmp 00007FF628B6958Ch 0x00000011 pop eax 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 jmp 00007FF628B69594h 0x0000001b pop eax 0x0000001c or dh, 00000000h 0x0000001f call 00007FF628B69589h 0x00000024 jnl 00007FF628B69594h 0x0000002a push eax 0x0000002b jmp 00007FF628B6958Ch 0x00000030 pop eax 0x00000031 push eax 0x00000032 jmp 00007FF628B6958Dh 0x00000037 mov eax, dword ptr [esp+04h] 0x0000003b push esi 0x0000003c jnp 00007FF628B6958Ch 0x00000042 pop esi 0x00000043 mov eax, dword ptr [eax] 0x00000045 jmp 00007FF628B6958Bh 0x0000004a mov dword ptr [esp+04h], eax 0x0000004e push eax 0x0000004f push edx 0x00000050 jnp 00007FF628B6958Ch 0x00000056 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 786C89 second address: 786C8F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 786E49 second address: 786E67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007FF628B6958Eh 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 786E67 second address: 786E6C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 786E6C second address: 786E7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7876AE second address: 7876DF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F61h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d pushad 0x0000000e jmp 00007FF628D73F64h 0x00000013 push esi 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7876DF second address: 7876EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 mov eax, dword ptr [eax] 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78788C second address: 7878A6 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FF628D73F58h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c jno 00007FF628D73F58h 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7878A6 second address: 768086 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push edi 0x0000000b call 00007FF628B69588h 0x00000010 pop edi 0x00000011 mov dword ptr [esp+04h], edi 0x00000015 add dword ptr [esp+04h], 00000016h 0x0000001d inc edi 0x0000001e push edi 0x0000001f ret 0x00000020 pop edi 0x00000021 ret 0x00000022 pushad 0x00000023 jmp 00007FF628B69596h 0x00000028 call 00007FF628B69590h 0x0000002d mov dword ptr [ebp+122D2366h], edi 0x00000033 pop ebx 0x00000034 popad 0x00000035 call dword ptr [ebp+12460AC4h] 0x0000003b push eax 0x0000003c push edx 0x0000003d jnp 00007FF628B6958Ch 0x00000043 push eax 0x00000044 push edx 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 768086 second address: 76808A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 76808A second address: 76808F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7B866A second address: 7B866E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 78670E second address: 786A11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 xchg eax, ebx 0x00000006 mov dword ptr [ebp+122D22D0h], edx 0x0000000c jg 00007FF628B6958Ch 0x00000012 xor dword ptr [ebp+122D353Eh], ebx 0x00000018 push dword ptr fs:[00000000h] 0x0000001f push 00000000h 0x00000021 push ebx 0x00000022 call 00007FF628B69588h 0x00000027 pop ebx 0x00000028 mov dword ptr [esp+04h], ebx 0x0000002c add dword ptr [esp+04h], 0000001Bh 0x00000034 inc ebx 0x00000035 push ebx 0x00000036 ret 0x00000037 pop ebx 0x00000038 ret 0x00000039 mov ecx, dword ptr [ebp+122D2C6Dh] 0x0000003f adc dl, FFFFFFB2h 0x00000042 mov dword ptr fs:[00000000h], esp 0x00000049 push eax 0x0000004a sub dword ptr [ebp+122D353Eh], edi 0x00000050 pop ecx 0x00000051 mov dword ptr [ebp+1249236Ah], esp 0x00000057 jmp 00007FF628B69596h 0x0000005c cmp dword ptr [ebp+122D2EBDh], 00000000h 0x00000063 jne 00007FF628B69627h 0x00000069 cmp dword ptr [ebp+122D2D09h], 00000000h 0x00000070 jne 00007FF628B6966Eh 0x00000076 cmp dword ptr [ebp+122D2CE5h], 00000000h 0x0000007d jne 00007FF628B6964Bh 0x00000083 mov byte ptr [ebp+122D37EBh], 0000006Ch 0x0000008a mov cx, di 0x0000008d mov eax, DB057083h 0x00000092 movzx ecx, dx 0x00000095 nop 0x00000096 pushad 0x00000097 push eax 0x00000098 push edx 0x00000099 pushad 0x0000009a popad 0x0000009b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7B8C42 second address: 7B8C48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7BD160 second address: 7BD16C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 jp 00007FF628B69586h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7C1743 second address: 7C1750 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jg 00007FF628D73F56h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7C1750 second address: 7C1767 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 jns 00007FF628B69586h 0x0000000d pop edi 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 push edi 0x00000012 push ebx 0x00000013 pop ebx 0x00000014 pushad 0x00000015 popad 0x00000016 pop edi 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7C18AF second address: 7C18B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7C1DEB second address: 7C1DEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7C2514 second address: 7C2539 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FF628D73F58h 0x00000008 pushad 0x00000009 push edi 0x0000000a pop edi 0x0000000b pushad 0x0000000c popad 0x0000000d push edx 0x0000000e pop edx 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 jmp 00007FF628D73F5Ch 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7C2539 second address: 7C253E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7C253E second address: 7C2557 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF628D73F64h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7C8BEE second address: 7C8BF2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7CBE95 second address: 7CBEAD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF628D73F64h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7CBEAD second address: 7CBEB1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7CBEB1 second address: 7CBEB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7386D9 second address: 7386DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7386DD second address: 7386F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF628D73F5Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7386F1 second address: 73870E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 jmp 00007FF628B69597h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D2B3C second address: 7D2B42 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D2B42 second address: 7D2B46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D1575 second address: 7D1588 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jp 00007FF628D73F56h 0x00000009 jnc 00007FF628D73F56h 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D16FD second address: 7D1702 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D1702 second address: 7D1707 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D1B16 second address: 7D1B2A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jng 00007FF628B69586h 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D1B2A second address: 7D1B36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FF628D73F56h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D1B36 second address: 7D1B5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 pushad 0x00000007 popad 0x00000008 pushad 0x00000009 popad 0x0000000a pop esi 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FF628B69598h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D1CF5 second address: 7D1D01 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FF628D73F56h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D1D01 second address: 7D1D19 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B6958Eh 0x00000007 push eax 0x00000008 push edx 0x00000009 jp 00007FF628B69586h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D282F second address: 7D2835 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D2835 second address: 7D283B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D283B second address: 7D2840 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D2840 second address: 7D2847 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D60AD second address: 7D60B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D60B3 second address: 7D60B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D60B7 second address: 7D60D4 instructions: 0x00000000 rdtsc 0x00000002 je 00007FF628D73F56h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF628D73F5Fh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D60D4 second address: 7D60DA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D60DA second address: 7D610C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jo 00007FF628D73F56h 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f jmp 00007FF628D73F63h 0x00000014 jne 00007FF628D73F56h 0x0000001a popad 0x0000001b push ebx 0x0000001c jnp 00007FF628D73F56h 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D623E second address: 7D6244 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D6534 second address: 7D653F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 747907 second address: 747911 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF628B69586h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D9D82 second address: 7D9D9A instructions: 0x00000000 rdtsc 0x00000002 jno 00007FF628D73F5Eh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D9D9A second address: 7D9DA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7D9DA0 second address: 7D9DB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 jc 00007FF628D73F5Ch 0x0000000d jng 00007FF628D73F56h 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7DA026 second address: 7DA033 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jnp 00007FF628B69586h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7DFDA1 second address: 7DFDA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7DFDA7 second address: 7DFDD8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push edi 0x0000000e pop edi 0x0000000f pushad 0x00000010 popad 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 pushad 0x00000015 jmp 00007FF628B69595h 0x0000001a jl 00007FF628B69586h 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E07D3 second address: 7E07F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop eax 0x00000007 jmp 00007FF628D73F69h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E0A8C second address: 7E0AAA instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF628B69586h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FF628B69591h 0x0000000f push edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E0AAA second address: 7E0AB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E0D86 second address: 7E0D8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E1051 second address: 7E106D instructions: 0x00000000 rdtsc 0x00000002 je 00007FF628D73F56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FF628D73F5Fh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E106D second address: 7E107D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007FF628B69586h 0x0000000a jng 00007FF628B69586h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E1325 second address: 7E1341 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FF628D73F62h 0x00000008 jg 00007FF628D73F56h 0x0000000e jnp 00007FF628D73F56h 0x00000014 push eax 0x00000015 push edx 0x00000016 ja 00007FF628D73F56h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E1341 second address: 7E1355 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c je 00007FF628B69588h 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E1355 second address: 7E1378 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FF628D73F5Eh 0x0000000a js 00007FF628D73F56h 0x00000010 jnp 00007FF628D73F56h 0x00000016 popad 0x00000017 push ecx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E15DB second address: 7E15E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E15E1 second address: 7E15E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E15E5 second address: 7E15FB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 pop eax 0x00000009 jns 00007FF628B69586h 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E15FB second address: 7E15FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E681D second address: 7E6860 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jbe 00007FF628B69586h 0x00000009 pop esi 0x0000000a push esi 0x0000000b jmp 00007FF628B69598h 0x00000010 je 00007FF628B69586h 0x00000016 pop esi 0x00000017 pop edx 0x00000018 pop eax 0x00000019 push eax 0x0000001a push edx 0x0000001b jo 00007FF628B69595h 0x00000021 push esi 0x00000022 pop esi 0x00000023 jmp 00007FF628B6958Dh 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E6860 second address: 7E687B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF628D73F67h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E687B second address: 7E687F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E5A58 second address: 7E5A5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E5A5C second address: 7E5A60 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E5A60 second address: 7E5A66 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E5A66 second address: 7E5ABD instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF628B69599h 0x00000008 pushad 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b js 00007FF628B69586h 0x00000011 jmp 00007FF628B69596h 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007FF628B69590h 0x00000022 jne 00007FF628B69586h 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E5ABD second address: 7E5AC7 instructions: 0x00000000 rdtsc 0x00000002 je 00007FF628D73F56h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E5AC7 second address: 7E5ACD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E5ACD second address: 7E5AD8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E6297 second address: 7E629D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E629D second address: 7E62C2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF628D73F68h 0x00000008 pushad 0x00000009 popad 0x0000000a js 00007FF628D73F56h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E63F7 second address: 7E6410 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF628B69595h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E6410 second address: 7E6414 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E6414 second address: 7E6426 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jp 00007FF628B69586h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E6426 second address: 7E642A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E642A second address: 7E642E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7E6589 second address: 7E658D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 74282A second address: 74283F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FF628B69590h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F1FA2 second address: 7F1FBC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FF628D73F65h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F212B second address: 7F2136 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F2136 second address: 7F2164 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edx 0x00000007 pop edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a popad 0x0000000b pushad 0x0000000c jmp 00007FF628D73F5Fh 0x00000011 pushad 0x00000012 popad 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 jng 00007FF628D73F58h 0x0000001f push edx 0x00000020 pop edx 0x00000021 pushad 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F2164 second address: 7F2170 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FF628B69586h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F2170 second address: 7F2175 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F2580 second address: 7F2585 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F2585 second address: 7F25B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FF628D73F56h 0x0000000a jmp 00007FF628D73F63h 0x0000000f jnc 00007FF628D73F56h 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 jne 00007FF628D73F56h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F25B1 second address: 7F25DF instructions: 0x00000000 rdtsc 0x00000002 ja 00007FF628B69586h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FF628B69599h 0x00000014 jnl 00007FF628B69586h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F25DF second address: 7F25E3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F28A8 second address: 7F28B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007FF628B6958Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F28B6 second address: 7F28C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FF628D73F90h 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F28C4 second address: 7F28CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F2A73 second address: 7F2A79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F2A79 second address: 7F2A9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 js 00007FF628B69586h 0x0000000f popad 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 pop eax 0x00000015 pushad 0x00000016 popad 0x00000017 popad 0x00000018 jne 00007FF628B6958Eh 0x0000001e pushad 0x0000001f popad 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F2C06 second address: 7F2C20 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F61h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F3C85 second address: 7F3C8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F3C8D second address: 7F3C92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F3C92 second address: 7F3C97 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F3C97 second address: 7F3CDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jo 00007FF628D73F62h 0x0000000b jmp 00007FF628D73F5Ch 0x00000010 pop edx 0x00000011 pop eax 0x00000012 pushad 0x00000013 jmp 00007FF628D73F65h 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c jmp 00007FF628D73F60h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7F3CDA second address: 7F3CF6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B6958Eh 0x00000007 jbe 00007FF628B69586h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push edi 0x00000012 pop edi 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7FA328 second address: 7FA33A instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FF628D73F56h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jng 00007FF628D73F56h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7FA472 second address: 7FA476 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7FA476 second address: 7FA47A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7FA47A second address: 7FA482 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7FA482 second address: 7FA488 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 7FA488 second address: 7FA48C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 8051BD second address: 8051C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 8051C1 second address: 8051C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 8051C5 second address: 8051E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007FF628D73F67h 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 808FC6 second address: 808FCA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 80CFA7 second address: 80CFCD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF628D73F63h 0x00000009 pop ebx 0x0000000a jmp 00007FF628D73F5Ah 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 80CFCD second address: 80CFD1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 80F254 second address: 80F25A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 80F25A second address: 80F266 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edi 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 80F266 second address: 80F26C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 80F26C second address: 80F272 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 81547A second address: 81547E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 81547E second address: 81548E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF628B6958Ah 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 73D67D second address: 73D681 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 81E874 second address: 81E87A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 827CBE second address: 827CCB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push edx 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 827CCB second address: 827CD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 82697C second address: 82698F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F5Dh 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 826C9D second address: 826CA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 826CA3 second address: 826CA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 8292D9 second address: 8292FD instructions: 0x00000000 rdtsc 0x00000002 jp 00007FF628B69586h 0x00000008 jnp 00007FF628B69586h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 jmp 00007FF628B69591h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 8292FD second address: 82931D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 pop esi 0x00000008 pushad 0x00000009 jmp 00007FF628D73F64h 0x0000000e push ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 82CEBC second address: 82CEE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007FF628B69586h 0x0000000a jno 00007FF628B69586h 0x00000010 popad 0x00000011 push ecx 0x00000012 jmp 00007FF628B69593h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 82CEE3 second address: 82CEF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 jns 00007FF628D73F56h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 82CEF2 second address: 82CF00 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jbe 00007FF628B69586h 0x0000000d pop edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 82CF00 second address: 82CF0D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jl 00007FF628D73F56h 0x00000009 pop edi 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 836429 second address: 836449 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push esi 0x00000006 push esi 0x00000007 pop esi 0x00000008 jmp 00007FF628B6958Eh 0x0000000d pop esi 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 push edi 0x00000014 pop edi 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 836449 second address: 836451 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 83973F second address: 839743 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 839743 second address: 839747 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 84B4BD second address: 84B4C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 84B1FA second address: 84B20F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop ecx 0x00000007 js 00007FF628D73F62h 0x0000000d jno 00007FF628D73F56h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 861F79 second address: 861F7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 860D67 second address: 860D93 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F64h 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FF628D73F62h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 860D93 second address: 860D99 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 860D99 second address: 860DA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FF628D73F56h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 860F16 second address: 860F3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF628B69598h 0x00000009 push eax 0x0000000a push edx 0x0000000b ja 00007FF628B69586h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 861092 second address: 861098 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 861098 second address: 86109E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 86123D second address: 861241 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 861241 second address: 861246 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 861246 second address: 861258 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FF628D73F5Ch 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 861669 second address: 86167F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jmp 00007FF628B6958Fh 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 86167F second address: 8616BE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F60h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FF628D73F5Bh 0x00000010 ja 00007FF628D73F6Eh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 861C2E second address: 861C3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 861C3C second address: 861C5A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FF628D73F68h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 8660D5 second address: 8660DB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 8664C3 second address: 866519 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F64h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jbe 00007FF628D73F56h 0x00000012 push eax 0x00000013 pop eax 0x00000014 popad 0x00000015 pop edx 0x00000016 mov eax, dword ptr [esp+04h] 0x0000001a jmp 00007FF628D73F67h 0x0000001f mov eax, dword ptr [eax] 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007FF628D73F62h 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 866519 second address: 866523 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007FF628B69586h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 8679E2 second address: 8679F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FF628D73F5Eh 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 869950 second address: 86998C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jmp 00007FF628B69599h 0x0000000b jmp 00007FF628B6958Bh 0x00000010 popad 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 jmp 00007FF628B6958Bh 0x00000019 pushad 0x0000001a popad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 86998C second address: 869999 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 869999 second address: 8699BB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a je 00007FF628B69586h 0x00000010 jmp 00007FF628B69592h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 781DA4 second address: 781DA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 781DA8 second address: 781DC9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FF628B69599h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 781DC9 second address: 781DF2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F61h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push esi 0x0000000c pushad 0x0000000d jmp 00007FF628D73F5Eh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 547025F second address: 5470263 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5470263 second address: 5470267 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5470267 second address: 54702A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushfd 0x00000007 jmp 00007FF628B6958Dh 0x0000000c add esi, 5E3BF9E6h 0x00000012 jmp 00007FF628B69591h 0x00000017 popfd 0x00000018 popad 0x00000019 mov ecx, dword ptr [ebp+08h] 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FF628B6958Dh 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54702A6 second address: 54702B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF628D73F5Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54702C9 second address: 54702E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B69594h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54905F4 second address: 5490668 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov dx, cx 0x00000007 popad 0x00000008 push ecx 0x00000009 pushfd 0x0000000a jmp 00007FF628D73F65h 0x0000000f add si, 8FB6h 0x00000014 jmp 00007FF628D73F61h 0x00000019 popfd 0x0000001a pop eax 0x0000001b popad 0x0000001c push edx 0x0000001d pushad 0x0000001e mov bl, al 0x00000020 push edx 0x00000021 pushfd 0x00000022 jmp 00007FF628D73F62h 0x00000027 xor esi, 04F34208h 0x0000002d jmp 00007FF628D73F5Bh 0x00000032 popfd 0x00000033 pop esi 0x00000034 popad 0x00000035 mov dword ptr [esp], ebp 0x00000038 pushad 0x00000039 movsx edi, cx 0x0000003c popad 0x0000003d mov ebp, esp 0x0000003f push eax 0x00000040 push edx 0x00000041 push eax 0x00000042 push edx 0x00000043 pushad 0x00000044 popad 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490668 second address: 549066E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 549066E second address: 5490690 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F67h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490690 second address: 5490694 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490694 second address: 5490698 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490698 second address: 549069E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 549069E second address: 54906BD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F5Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FF628D73F5Eh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54906BD second address: 54906C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54906C3 second address: 5490701 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ecx 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007FF628D73F5Fh 0x00000010 and ax, 926Eh 0x00000015 jmp 00007FF628D73F69h 0x0000001a popfd 0x0000001b pushad 0x0000001c pushad 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490701 second address: 5490782 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 xchg eax, esi 0x00000007 jmp 00007FF628B69598h 0x0000000c push eax 0x0000000d pushad 0x0000000e mov ebx, 434296C4h 0x00000013 mov esi, edx 0x00000015 popad 0x00000016 xchg eax, esi 0x00000017 pushad 0x00000018 pushfd 0x00000019 jmp 00007FF628B69591h 0x0000001e and eax, 4EEA5AB6h 0x00000024 jmp 00007FF628B69591h 0x00000029 popfd 0x0000002a popad 0x0000002b lea eax, dword ptr [ebp-04h] 0x0000002e jmp 00007FF628B6958Eh 0x00000033 nop 0x00000034 push eax 0x00000035 push edx 0x00000036 jmp 00007FF628B69597h 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490782 second address: 5490796 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov edi, 65B65038h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 mov dx, ax 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490796 second address: 54907D4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B69596h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 movzx eax, dx 0x0000000c popad 0x0000000d nop 0x0000000e jmp 00007FF628B6958Dh 0x00000013 push dword ptr [ebp+08h] 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FF628B6958Dh 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54907F4 second address: 5490854 instructions: 0x00000000 rdtsc 0x00000002 mov cl, 7Eh 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushfd 0x00000007 jmp 00007FF628D73F5Bh 0x0000000c and ecx, 36533D6Eh 0x00000012 jmp 00007FF628D73F69h 0x00000017 popfd 0x00000018 popad 0x00000019 cmp dword ptr [ebp-04h], 00000000h 0x0000001d jmp 00007FF628D73F5Eh 0x00000022 mov esi, eax 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007FF628D73F67h 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490854 second address: 5490886 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 37F3793Ah 0x00000008 push ebx 0x00000009 pop esi 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d je 00007FF628B69606h 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 call 00007FF628B69596h 0x0000001b pop eax 0x0000001c mov di, 6866h 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490902 second address: 5490908 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490908 second address: 549090C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 549090C second address: 5490920 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov di, si 0x0000000f mov ax, E94Bh 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490920 second address: 5490926 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490926 second address: 5480011 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 leave 0x00000009 jmp 00007FF628D73F5Fh 0x0000000e retn 0004h 0x00000011 nop 0x00000012 cmp eax, 00000000h 0x00000015 setne al 0x00000018 jmp 00007FF628D73F52h 0x0000001a xor ebx, ebx 0x0000001c test al, 01h 0x0000001e jne 00007FF628D73F57h 0x00000020 sub esp, 04h 0x00000023 mov dword ptr [esp], 0000000Dh 0x0000002a call 00007FF62DC5154Bh 0x0000002f mov edi, edi 0x00000031 push eax 0x00000032 push edx 0x00000033 jmp 00007FF628D73F5Dh 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480011 second address: 5480021 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF628B6958Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480021 second address: 5480071 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 pushad 0x0000000a movzx eax, di 0x0000000d mov esi, edx 0x0000000f popad 0x00000010 mov dword ptr [esp], ebp 0x00000013 jmp 00007FF628D73F61h 0x00000018 mov ebp, esp 0x0000001a jmp 00007FF628D73F5Eh 0x0000001f sub esp, 2Ch 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007FF628D73F67h 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480071 second address: 54800ED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, ax 0x00000006 mov ax, 8B37h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebx 0x0000000e pushad 0x0000000f call 00007FF628B69598h 0x00000014 pop ecx 0x00000015 call 00007FF628B69597h 0x0000001a mov si, F6FFh 0x0000001e pop ecx 0x0000001f popad 0x00000020 push eax 0x00000021 pushad 0x00000022 pushfd 0x00000023 jmp 00007FF628B69590h 0x00000028 jmp 00007FF628B69595h 0x0000002d popfd 0x0000002e push ecx 0x0000002f mov di, 1FE2h 0x00000033 pop edx 0x00000034 popad 0x00000035 xchg eax, ebx 0x00000036 push eax 0x00000037 push edx 0x00000038 push eax 0x00000039 push edx 0x0000003a push eax 0x0000003b push edx 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54800ED second address: 54800F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54800F1 second address: 548010C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B69597h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 548010C second address: 5480157 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF628D73F5Fh 0x00000009 and esi, 354E6E3Eh 0x0000000f jmp 00007FF628D73F69h 0x00000014 popfd 0x00000015 movzx eax, dx 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b push esi 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FF628D73F5Fh 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480157 second address: 548015D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 548015D second address: 5480161 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480197 second address: 54801BC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B6958Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub edi, edi 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FF628B69592h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54801BC second address: 5480217 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 16209C04h 0x00000008 pushfd 0x00000009 jmp 00007FF628D73F5Dh 0x0000000e or ecx, 210EE746h 0x00000014 jmp 00007FF628D73F61h 0x00000019 popfd 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d inc ebx 0x0000001e jmp 00007FF628D73F5Eh 0x00000023 test al, al 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007FF628D73F67h 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480217 second address: 548023A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop edi 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007FF628B697A9h 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FF628B69593h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 548023A second address: 5480260 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F69h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 lea ecx, dword ptr [ebp-14h] 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480260 second address: 5480264 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480264 second address: 548026A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 548026A second address: 5480270 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54802E6 second address: 54802EB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54802EB second address: 548030D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov ebx, 6A9A0228h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push esp 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FF628B69593h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 548030D second address: 5480313 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480313 second address: 5480350 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007FF628B69598h 0x00000014 add eax, 1EB216E8h 0x0000001a jmp 00007FF628B6958Bh 0x0000001f popfd 0x00000020 movzx ecx, di 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480350 second address: 5480356 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480356 second address: 548035A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 548035A second address: 548035E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 548039F second address: 54803A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54803A5 second address: 54803A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54803A9 second address: 54803C3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jg 00007FF698AD7661h 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FF628B6958Ah 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54803C3 second address: 54803D5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FF628D73F5Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54803D5 second address: 54803D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54803D9 second address: 54803F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 js 00007FF628D73FB7h 0x0000000e pushad 0x0000000f movzx ecx, dx 0x00000012 popad 0x00000013 cmp dword ptr [ebp-14h], edi 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54803F5 second address: 54803F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54803F9 second address: 54803FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54803FF second address: 548042C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B6958Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007FF698AD760Fh 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FF628B69590h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 548042C second address: 5480432 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480432 second address: 5480438 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480438 second address: 548043C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 548043C second address: 5480440 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480440 second address: 54804AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebx, dword ptr [ebp+08h] 0x0000000b jmp 00007FF628D73F64h 0x00000010 lea eax, dword ptr [ebp-2Ch] 0x00000013 pushad 0x00000014 call 00007FF628D73F5Eh 0x00000019 movzx eax, di 0x0000001c pop edi 0x0000001d popad 0x0000001e push ebp 0x0000001f jmp 00007FF628D73F66h 0x00000024 mov dword ptr [esp], esi 0x00000027 jmp 00007FF628D73F60h 0x0000002c nop 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007FF628D73F5Ah 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54804AF second address: 54804B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54804B3 second address: 54804B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54804B9 second address: 54804D2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B6958Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54804D2 second address: 54804D8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54804D8 second address: 5480516 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dl, BEh 0x00000005 pushfd 0x00000006 jmp 00007FF628B6958Eh 0x0000000b adc cl, FFFFFFD8h 0x0000000e jmp 00007FF628B6958Bh 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 nop 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FF628B69595h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480568 second address: 548057C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov esi, eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov cl, dh 0x0000000e mov eax, 3DB9AA35h 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 548057C second address: 5470D5C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B6958Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007FF628B69594h 0x00000012 adc ah, FFFFFFB8h 0x00000015 jmp 00007FF628B6958Bh 0x0000001a popfd 0x0000001b mov dl, ah 0x0000001d popad 0x0000001e je 00007FF698AD7626h 0x00000024 xor eax, eax 0x00000026 jmp 00007FF628B42CBAh 0x0000002b pop esi 0x0000002c pop edi 0x0000002d pop ebx 0x0000002e leave 0x0000002f retn 0004h 0x00000032 nop 0x00000033 xor ebx, ebx 0x00000035 cmp eax, 00000000h 0x00000038 je 00007FF628B696E3h 0x0000003e call 00007FF62DA3775Fh 0x00000043 mov edi, edi 0x00000045 push eax 0x00000046 push edx 0x00000047 pushad 0x00000048 mov al, F6h 0x0000004a mov bh, EFh 0x0000004c popad 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5470D5C second address: 5470D8F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F65h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FF628D73F5Eh 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 mov cx, BDE3h 0x00000017 mov edi, eax 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5470D8F second address: 5470DD8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 77CF7A36h 0x00000008 mov eax, ebx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov ch, EFh 0x00000013 pushfd 0x00000014 jmp 00007FF628B69597h 0x00000019 xor ch, 0000006Eh 0x0000001c jmp 00007FF628B69599h 0x00000021 popfd 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5470DD8 second address: 5470EA9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF628D73F67h 0x00000009 and ch, 0000007Eh 0x0000000c jmp 00007FF628D73F69h 0x00000011 popfd 0x00000012 call 00007FF628D73F60h 0x00000017 pop esi 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b mov ebp, esp 0x0000001d pushad 0x0000001e push ebx 0x0000001f jmp 00007FF628D73F5Ah 0x00000024 pop eax 0x00000025 mov cx, bx 0x00000028 popad 0x00000029 push esi 0x0000002a jmp 00007FF628D73F5Ah 0x0000002f mov dword ptr [esp], ecx 0x00000032 jmp 00007FF628D73F60h 0x00000037 mov dword ptr [ebp-04h], 55534552h 0x0000003e pushad 0x0000003f pushfd 0x00000040 jmp 00007FF628D73F5Eh 0x00000045 adc ecx, 55EE0D38h 0x0000004b jmp 00007FF628D73F5Bh 0x00000050 popfd 0x00000051 push eax 0x00000052 push edx 0x00000053 pushfd 0x00000054 jmp 00007FF628D73F66h 0x00000059 sbb eax, 12388798h 0x0000005f jmp 00007FF628D73F5Bh 0x00000064 popfd 0x00000065 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 548092E second address: 5480934 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480934 second address: 5480938 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480938 second address: 548093C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 548093C second address: 54809C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FF628D73F5Dh 0x0000000e xchg eax, ebp 0x0000000f jmp 00007FF628D73F5Eh 0x00000014 mov ebp, esp 0x00000016 pushad 0x00000017 call 00007FF628D73F5Eh 0x0000001c pushfd 0x0000001d jmp 00007FF628D73F62h 0x00000022 and al, 00000048h 0x00000025 jmp 00007FF628D73F5Bh 0x0000002a popfd 0x0000002b pop ecx 0x0000002c push edx 0x0000002d jmp 00007FF628D73F64h 0x00000032 pop eax 0x00000033 popad 0x00000034 cmp dword ptr [7544459Ch], 05h 0x0000003b push eax 0x0000003c push edx 0x0000003d jmp 00007FF628D73F5Ch 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54809C1 second address: 5480A4A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FF628B69591h 0x00000009 xor ecx, 5D46AEC6h 0x0000000f jmp 00007FF628B69591h 0x00000014 popfd 0x00000015 pushfd 0x00000016 jmp 00007FF628B69590h 0x0000001b sub ecx, 4A3B9F68h 0x00000021 jmp 00007FF628B6958Bh 0x00000026 popfd 0x00000027 popad 0x00000028 pop edx 0x00000029 pop eax 0x0000002a je 00007FF698AC7571h 0x00000030 jmp 00007FF628B69596h 0x00000035 pop ebp 0x00000036 push eax 0x00000037 push edx 0x00000038 jmp 00007FF628B69597h 0x0000003d rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480B7C second address: 5480B8D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F5Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5480B8D second address: 5480BD5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B69591h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [ebp+08h], 00002000h 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007FF628B69593h 0x00000019 jmp 00007FF628B69593h 0x0000001e popfd 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490974 second address: 5490978 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490978 second address: 5490986 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, ebp 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490986 second address: 549098A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 549098A second address: 5490990 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490990 second address: 54909D5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628D73F5Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007FF628D73F66h 0x00000010 xchg eax, esi 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FF628D73F67h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54909D5 second address: 54909DA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 54909DA second address: 5490A1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007FF628D73F65h 0x0000000a or si, 4376h 0x0000000f jmp 00007FF628D73F61h 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 push eax 0x00000019 pushad 0x0000001a mov si, di 0x0000001d popad 0x0000001e xchg eax, esi 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 mov edx, ecx 0x00000024 mov edi, ecx 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490A1D second address: 5490A4A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B6958Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esi, dword ptr [ebp+0Ch] 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FF628B69595h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490A4A second address: 5490AA9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, ebx 0x00000005 call 00007FF628D73F63h 0x0000000a pop eax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e test esi, esi 0x00000010 jmp 00007FF628D73F5Fh 0x00000015 je 00007FF698CC1896h 0x0000001b pushad 0x0000001c mov si, F21Bh 0x00000020 movzx ecx, bx 0x00000023 popad 0x00000024 cmp dword ptr [7544459Ch], 05h 0x0000002b pushad 0x0000002c mov edi, 0EFFB6FCh 0x00000031 pushad 0x00000032 push ebx 0x00000033 pop esi 0x00000034 mov cx, bx 0x00000037 popad 0x00000038 popad 0x00000039 je 00007FF698CD9952h 0x0000003f push eax 0x00000040 push edx 0x00000041 pushad 0x00000042 mov edi, eax 0x00000044 push ecx 0x00000045 pop edi 0x00000046 popad 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490AA9 second address: 5490AF2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FF628B69593h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a jmp 00007FF628B69596h 0x0000000f push eax 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FF628B69597h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490C22 second address: 5490C26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\OtHVIQ2ge4.exe | RDTSC instruction interceptor: First address: 5490C26 second address: 5490C2C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |