Source: NAnOVCOt4L.exe, NAnOVCOt4L.exe, 00000000.00000003.2019808994.0000000001528000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1993065242.000000000151B000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1993286912.000000000151D000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000002.2378096531.0000000001529000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exe |
Source: NAnOVCOt4L.exe, 00000000.00000003.2019808994.0000000001528000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1993065242.000000000151B000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1993286912.000000000151D000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000002.2378096531.0000000001529000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exeer6 |
Source: NAnOVCOt4L.exe, 00000000.00000003.2019808994.0000000001528000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000002.2378096531.0000000001529000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.2019756477.0000000005C5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: NAnOVCOt4L.exe, 00000000.00000003.1803117494.0000000005BE8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: NAnOVCOt4L.exe, 00000000.00000003.1803117494.0000000005BE8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: NAnOVCOt4L.exe, 00000000.00000003.2019756477.0000000005C5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: NAnOVCOt4L.exe, 00000000.00000003.2019808994.0000000001528000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000002.2378096531.0000000001529000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.2019756477.0000000005C5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: NAnOVCOt4L.exe, 00000000.00000002.2380246394.0000000005C58000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U |
Source: NAnOVCOt4L.exe, 00000000.00000003.2019808994.0000000001528000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000002.2378096531.0000000001529000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.2019756477.0000000005C5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: NAnOVCOt4L.exe, 00000000.00000003.1803117494.0000000005BE8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: NAnOVCOt4L.exe, 00000000.00000003.2019808994.0000000001528000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000002.2378096531.0000000001529000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.2019756477.0000000005C5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: NAnOVCOt4L.exe, 00000000.00000003.1803117494.0000000005BE8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: NAnOVCOt4L.exe, 00000000.00000003.1803117494.0000000005BE8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: NAnOVCOt4L.exe, 00000000.00000003.2019808994.0000000001528000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000002.2378096531.0000000001529000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.2019756477.0000000005C5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: NAnOVCOt4L.exe, 00000000.00000003.1803117494.0000000005BE8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: NAnOVCOt4L.exe, 00000000.00000003.1803117494.0000000005BE8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: NAnOVCOt4L.exe, 00000000.00000003.1746996120.000000000150A000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1832109571.00000000014FD000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1854093448.00000000014FD000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1746946437.00000000014FD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://microsoft.co |
Source: NAnOVCOt4L.exe, 00000000.00000002.2380599032.00000000062A9000.00000002.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1992754302.0000000005C5E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: NAnOVCOt4L.exe, 00000000.00000003.1803117494.0000000005BE8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: NAnOVCOt4L.exe, 00000000.00000003.2019808994.0000000001528000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000002.2378096531.0000000001529000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.2019756477.0000000005C5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0A |
Source: NAnOVCOt4L.exe, 00000000.00000003.2019808994.0000000001528000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000002.2378096531.0000000001529000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.2019756477.0000000005C5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0C |
Source: NAnOVCOt4L.exe, 00000000.00000003.2019756477.0000000005C5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0X |
Source: NAnOVCOt4L.exe, 00000000.00000002.2380246394.0000000005C58000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F |
Source: NAnOVCOt4L.exe, 00000000.00000003.2019808994.0000000001528000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000002.2378096531.0000000001529000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.2019756477.0000000005C5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/rootr30; |
Source: NAnOVCOt4L.exe, 00000000.00000003.1803117494.0000000005BE8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: NAnOVCOt4L.exe, 00000000.00000002.2380246394.0000000005C58000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A |
Source: NAnOVCOt4L.exe, 00000000.00000003.2019808994.0000000001528000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000002.2378096531.0000000001529000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.2019756477.0000000005C5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06 |
Source: Amcache.hve.6.dr | String found in binary or memory: http://upx.sf.net |
Source: NAnOVCOt4L.exe, 00000000.00000003.1803117494.0000000005BE8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: NAnOVCOt4L.exe, 00000000.00000003.1803117494.0000000005BE8000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: NAnOVCOt4L.exe, 00000000.00000003.1747781868.0000000005BEA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1747868110.0000000005BEA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1747585176.0000000005BEC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: NAnOVCOt4L.exe, 00000000.00000002.2380058896.0000000005BAF000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1993360537.0000000001512000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1993065242.000000000151B000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1993286912.000000000151D000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000002.2378096531.0000000001529000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1992901954.0000000005BAF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aui-cdn.atlassian.com/ |
Source: NAnOVCOt4L.exe | String found in binary or memory: https://bbc-frontbucket-canary.prod-east.frontend.publi |
Source: NAnOVCOt4L.exe, 00000000.00000003.1992901954.0000000005BAF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net |
Source: NAnOVCOt4L.exe, 00000000.00000003.1992901954.0000000005BAF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-exp.prod-east.frontend.public.atl-paas.net |
Source: NAnOVCOt4L.exe, 00000000.00000003.1992901954.0000000005BAF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net |
Source: NAnOVCOt4L.exe, 00000000.00000003.1992901954.0000000005BAF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net |
Source: NAnOVCOt4L.exe, 00000000.00000003.2019808994.0000000001528000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1993065242.000000000151B000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1993286912.000000000151D000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000002.2378096531.0000000001529000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.n |
Source: NAnOVCOt4L.exe, 00000000.00000003.1992901954.0000000005BAF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/ |
Source: NAnOVCOt4L.exe, 00000000.00000003.1992901954.0000000005BAF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/; |
Source: NAnOVCOt4L.exe, 00000000.00000003.1992901954.0000000005BAF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/ |
Source: NAnOVCOt4L.exe, 00000000.00000002.2378096531.0000000001529000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000002.2380058896.0000000005BC1000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1992901954.0000000005BAF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1- |
Source: NAnOVCOt4L.exe, 00000000.00000003.1993065242.000000000151B000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1993286912.000000000151D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/I |
Source: NAnOVCOt4L.exe, 00000000.00000002.2377781687.00000000014A3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com:443 |
Source: NAnOVCOt4L.exe, 00000000.00000003.2019875119.00000000014FD000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.2020031674.000000000150B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com:443/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3 |
Source: NAnOVCOt4L.exe, 00000000.00000003.2019875119.00000000014BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe |
Source: NAnOVCOt4L.exe, 00000000.00000002.2377642265.000000000115B000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe.0.0 |
Source: NAnOVCOt4L.exe, 00000000.00000002.2377781687.00000000014A3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exeU |
Source: NAnOVCOt4L.exe, 00000000.00000002.2377781687.00000000014A3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org:443/mynewworkspace123312/scnd/downloads/FormattingCharitable.exeP |
Source: NAnOVCOt4L.exe, 00000000.00000003.1805411907.0000000005BB6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417. |
Source: NAnOVCOt4L.exe, 00000000.00000003.1805411907.0000000005BB6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta |
Source: NAnOVCOt4L.exe, 00000000.00000002.2380058896.0000000005BAF000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1993360537.0000000001512000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1993065242.000000000151B000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1993286912.000000000151D000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000002.2378096531.0000000001529000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1992901954.0000000005BAF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.cookielaw.org/ |
Source: NAnOVCOt4L.exe, 00000000.00000003.1747781868.0000000005BEA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1747868110.0000000005BEA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1747585176.0000000005BEC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: NAnOVCOt4L.exe, 00000000.00000003.1747781868.0000000005BEA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1747868110.0000000005BEA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1747585176.0000000005BEC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: NAnOVCOt4L.exe, 00000000.00000003.1747781868.0000000005BEA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1747868110.0000000005BEA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1747585176.0000000005BEC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: NAnOVCOt4L.exe, 00000000.00000003.1805411907.0000000005BB6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg |
Source: NAnOVCOt4L.exe, 00000000.00000003.1805411907.0000000005BB6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: NAnOVCOt4L.exe, 00000000.00000003.1747781868.0000000005BEA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1747868110.0000000005BEA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1747585176.0000000005BEC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: NAnOVCOt4L.exe, 00000000.00000003.1747781868.0000000005BEA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1747868110.0000000005BEA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1747585176.0000000005BEC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: NAnOVCOt4L.exe, 00000000.00000003.1747781868.0000000005BEA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1747868110.0000000005BEA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1747585176.0000000005BEC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: NAnOVCOt4L.exe, 00000000.00000002.2380058896.0000000005BAF000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1993360537.0000000001512000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1992901954.0000000005BAF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://dz8aopenkvv6s.cloudfront.net |
Source: NAnOVCOt4L.exe, 00000000.00000003.1805411907.0000000005BB6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi |
Source: NAnOVCOt4L.exe, 00000000.00000003.1746946437.00000000014BD000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000002.2380058896.0000000005BAA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1871791653.000000000152D000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1828273625.0000000005BA4000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1832704225.0000000005BA4000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/ |
Source: NAnOVCOt4L.exe, 00000000.00000003.1853962544.000000000151B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/api |
Source: NAnOVCOt4L.exe, 00000000.00000003.1853962544.000000000152D000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1828385529.0000000001532000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1871791653.000000000152D000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1854210350.0000000001532000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apiZ |
Source: NAnOVCOt4L.exe, 00000000.00000003.1746946437.00000000014BD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apill |
Source: NAnOVCOt4L.exe, 00000000.00000003.1803495068.0000000001532000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1802723716.0000000001532000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apit |
Source: NAnOVCOt4L.exe, 00000000.00000003.1746946437.00000000014BD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/b |
Source: NAnOVCOt4L.exe, 00000000.00000003.1853962544.000000000152D000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1871791653.000000000152D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/pi |
Source: NAnOVCOt4L.exe, 00000000.00000002.2377781687.00000000014A3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat:443/api |
Source: NAnOVCOt4L.exe, 00000000.00000002.2377781687.00000000014A3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat:443/apis92o4p.default-release/key4.dbPK |
Source: NAnOVCOt4L.exe, 00000000.00000003.1993166637.0000000005BB6000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1993360537.0000000001512000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1992901954.0000000005BAF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.prod-east.frontend.public.atl-paas.net |
Source: NAnOVCOt4L.exe, 00000000.00000003.1993166637.0000000005BB6000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1993360537.0000000001512000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1992901954.0000000005BAF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net |
Source: NAnOVCOt4L.exe, 00000000.00000003.1748377481.0000000005C01000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.microsof |
Source: NAnOVCOt4L.exe, 00000000.00000003.1804779045.0000000005CC3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: NAnOVCOt4L.exe, 00000000.00000003.1804779045.0000000005CC3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: NAnOVCOt4L.exe, 00000000.00000003.1775576316.0000000005BF8000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1748469194.0000000005BF8000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1775397228.0000000005BF8000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1748377481.0000000005BFF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016 |
Source: NAnOVCOt4L.exe, 00000000.00000003.1748469194.0000000005BD3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples |
Source: NAnOVCOt4L.exe, 00000000.00000003.1775576316.0000000005BF8000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1748469194.0000000005BF8000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1775397228.0000000005BF8000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1748377481.0000000005BFF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17 |
Source: NAnOVCOt4L.exe, 00000000.00000003.1748469194.0000000005BD3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install |
Source: NAnOVCOt4L.exe, 00000000.00000002.2378096531.000000000153E000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1993166637.0000000005BB6000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1993360537.0000000001512000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1992901954.0000000005BAF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website |
Source: NAnOVCOt4L.exe, 00000000.00000003.1993166637.0000000005BB6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-websiteX-Frame-OptionsSAMEORIGINX- |
Source: NAnOVCOt4L.exe, 00000000.00000003.1805411907.0000000005BB6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94 |
Source: NAnOVCOt4L.exe, 00000000.00000003.1747781868.0000000005BEA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1747868110.0000000005BEA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1747585176.0000000005BEC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: NAnOVCOt4L.exe, 00000000.00000003.1805411907.0000000005BB6000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219 |
Source: NAnOVCOt4L.exe, 00000000.00000003.2019808994.0000000001528000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000002.2380246394.0000000005C58000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000002.2378096531.0000000001529000.00000004.00000020.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.2019756477.0000000005C5A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: NAnOVCOt4L.exe, 00000000.00000003.1747781868.0000000005BEA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1747868110.0000000005BEA000.00000004.00000800.00020000.00000000.sdmp, NAnOVCOt4L.exe, 00000000.00000003.1747585176.0000000005BEC000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: NAnOVCOt4L.exe, 00000000.00000003.1804779045.0000000005CC3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2 |
Source: NAnOVCOt4L.exe, 00000000.00000003.1804779045.0000000005CC3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR |
Source: NAnOVCOt4L.exe, 00000000.00000003.1804779045.0000000005CC3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: NAnOVCOt4L.exe, 00000000.00000003.1804779045.0000000005CC3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: NAnOVCOt4L.exe, 00000000.00000003.1804779045.0000000005CC3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 87B70 second address: 87B74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 87B74 second address: 87B9D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561ADDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F6035561AE3h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 87B9D second address: 87BA1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 87BA1 second address: 87BA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 87BA7 second address: 87BAD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 87BAD second address: 87BB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FAE2D second address: 1FAE31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FAE31 second address: 1FAE37 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1EE4D7 second address: 1EE519 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F6034D241C6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007F6034D241D7h 0x00000012 jmp 00007F6034D241D0h 0x00000017 push eax 0x00000018 pop eax 0x00000019 jmp 00007F6034D241CBh 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1F9EDA second address: 1F9EE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FA16C second address: 1FA17D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 ja 00007F6034D241C6h 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FA2F3 second address: 1FA301 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6035561ADAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FA44C second address: 1FA454 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FA59F second address: 1FA5A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FA5A3 second address: 1FA5AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FC89B second address: 87B74 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 add dword ptr [esp], 0C7827C3h 0x0000000e jc 00007F6035561ADBh 0x00000014 adc dx, 64DBh 0x00000019 push dword ptr [ebp+122D1259h] 0x0000001f mov dword ptr [ebp+122D23ACh], eax 0x00000025 call dword ptr [ebp+122D241Bh] 0x0000002b pushad 0x0000002c pushad 0x0000002d sub eax, 01C64CB9h 0x00000033 mov ecx, dword ptr [ebp+122D3A06h] 0x00000039 popad 0x0000003a xor eax, eax 0x0000003c mov dword ptr [ebp+122D238Ch], esi 0x00000042 mov edx, dword ptr [esp+28h] 0x00000046 mov dword ptr [ebp+122D238Ch], ecx 0x0000004c mov dword ptr [ebp+122D3A06h], eax 0x00000052 pushad 0x00000053 jmp 00007F6035561AE8h 0x00000058 mov edx, dword ptr [ebp+122D3A72h] 0x0000005e popad 0x0000005f mov esi, 0000003Ch 0x00000064 jmp 00007F6035561ADDh 0x00000069 add esi, dword ptr [esp+24h] 0x0000006d sub dword ptr [ebp+122D2435h], edi 0x00000073 lodsw 0x00000075 pushad 0x00000076 clc 0x00000077 jmp 00007F6035561ADFh 0x0000007c popad 0x0000007d add eax, dword ptr [esp+24h] 0x00000081 sub dword ptr [ebp+122D2435h], edi 0x00000087 mov ebx, dword ptr [esp+24h] 0x0000008b pushad 0x0000008c mov bx, 1A04h 0x00000090 popad 0x00000091 nop 0x00000092 push eax 0x00000093 push edx 0x00000094 ja 00007F6035561ADCh 0x0000009a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FC8E8 second address: 1FC8EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FC8EC second address: 1FC9E8 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jmp 00007F6035561AE5h 0x0000000d nop 0x0000000e xor esi, 4312EC8Ah 0x00000014 push 00000000h 0x00000016 jmp 00007F6035561AE6h 0x0000001b push 8CEA3E46h 0x00000020 jmp 00007F6035561AE5h 0x00000025 add dword ptr [esp], 7315C23Ah 0x0000002c mov dword ptr [ebp+122D2397h], ebx 0x00000032 push 00000003h 0x00000034 mov esi, dword ptr [ebp+122D37E6h] 0x0000003a push 00000000h 0x0000003c call 00007F6035561AE4h 0x00000041 xor edi, 6ECDB9CAh 0x00000047 pop edx 0x00000048 mov edx, dword ptr [ebp+122D3896h] 0x0000004e push 00000003h 0x00000050 mov dword ptr [ebp+122D2392h], ecx 0x00000056 call 00007F6035561AD9h 0x0000005b jmp 00007F6035561AE2h 0x00000060 push eax 0x00000061 jnp 00007F6035561AE7h 0x00000067 mov eax, dword ptr [esp+04h] 0x0000006b jmp 00007F6035561AE8h 0x00000070 mov eax, dword ptr [eax] 0x00000072 jnc 00007F6035561ADCh 0x00000078 mov dword ptr [esp+04h], eax 0x0000007c push edx 0x0000007d push eax 0x0000007e push edx 0x0000007f push eax 0x00000080 pop eax 0x00000081 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FC9E8 second address: 1FC9EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FC9EC second address: 1FCA42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F6035561ADDh 0x0000000d lea ebx, dword ptr [ebp+124487EEh] 0x00000013 push 00000000h 0x00000015 push ebp 0x00000016 call 00007F6035561AD8h 0x0000001b pop ebp 0x0000001c mov dword ptr [esp+04h], ebp 0x00000020 add dword ptr [esp+04h], 0000001Dh 0x00000028 inc ebp 0x00000029 push ebp 0x0000002a ret 0x0000002b pop ebp 0x0000002c ret 0x0000002d push ecx 0x0000002e mov cl, B6h 0x00000030 pop edi 0x00000031 xchg eax, ebx 0x00000032 push eax 0x00000033 push eax 0x00000034 jns 00007F6035561AD6h 0x0000003a pop eax 0x0000003b pop eax 0x0000003c push eax 0x0000003d push eax 0x0000003e push edx 0x0000003f push eax 0x00000040 push edx 0x00000041 push eax 0x00000042 push edx 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FCA42 second address: 1FCA46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FCA46 second address: 1FCA62 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561AE8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FCAA4 second address: 1FCAA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FCAA8 second address: 1FCAAC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FCC49 second address: 1FCCBC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor dword ptr [esp], 70236396h 0x00000010 push 00000000h 0x00000012 push ecx 0x00000013 call 00007F6034D241C8h 0x00000018 pop ecx 0x00000019 mov dword ptr [esp+04h], ecx 0x0000001d add dword ptr [esp+04h], 0000001Dh 0x00000025 inc ecx 0x00000026 push ecx 0x00000027 ret 0x00000028 pop ecx 0x00000029 ret 0x0000002a mov ecx, 17287DDDh 0x0000002f push 00000003h 0x00000031 mov di, bx 0x00000034 push 00000000h 0x00000036 mov di, FD94h 0x0000003a jnc 00007F6034D241CCh 0x00000040 push 00000003h 0x00000042 sbb edx, 25293700h 0x00000048 call 00007F6034D241C9h 0x0000004d push eax 0x0000004e push edx 0x0000004f pushad 0x00000050 push eax 0x00000051 push edx 0x00000052 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FCCBC second address: 1FCCC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F6035561AD6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FCCC7 second address: 1FCCD1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007F6034D241C6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FCCD1 second address: 1FCD24 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jng 00007F6035561AE4h 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 jmp 00007F6035561AE9h 0x00000018 mov eax, dword ptr [eax] 0x0000001a jl 00007F6035561ADEh 0x00000020 mov dword ptr [esp+04h], eax 0x00000024 push eax 0x00000025 push eax 0x00000026 push edx 0x00000027 push esi 0x00000028 pop esi 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FCD24 second address: 1FCD48 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 pop eax 0x00000008 jno 00007F6034D241CCh 0x0000000e lea ebx, dword ptr [ebp+12448802h] 0x00000014 push eax 0x00000015 pushad 0x00000016 je 00007F6034D241CCh 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1FCD48 second address: 1FCD65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F6035561AE7h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1F34C6 second address: 1F34CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21ADD3 second address: 21ADE4 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F6035561AD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push esi 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21AF4C second address: 21AF50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21AF50 second address: 21AF54 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21AF54 second address: 21AF5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21AF5C second address: 21AF78 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F6035561AE6h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21B0A0 second address: 21B0BD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241D7h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21B0BD second address: 21B0C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F6035561AD6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21B0C7 second address: 21B0CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21B3B2 second address: 21B3D8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561ADEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F6035561AE1h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21B54E second address: 21B560 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F6034D241C6h 0x0000000a popad 0x0000000b pop edi 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f push edx 0x00000010 pop edx 0x00000011 pop ecx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21B560 second address: 21B57D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F6035561AE7h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21B995 second address: 21B99B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21B99B second address: 21B9A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21BB0D second address: 21BB13 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21BB13 second address: 21BB1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21BB1D second address: 21BB42 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007F6034D241D9h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21BE19 second address: 21BE1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21BE1D second address: 21BE31 instructions: 0x00000000 rdtsc 0x00000002 je 00007F6034D241C6h 0x00000008 ja 00007F6034D241C6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 210B94 second address: 210B98 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1F4FB2 second address: 1F4FB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21C998 second address: 21C99F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21CB15 second address: 21CB19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21CB19 second address: 21CB42 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F6035561AD6h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007F6035561AE8h 0x00000012 push edi 0x00000013 pop edi 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21CE14 second address: 21CE18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21CE18 second address: 21CE2A instructions: 0x00000000 rdtsc 0x00000002 jo 00007F6035561AD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jnp 00007F6035561AD6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21F230 second address: 21F234 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 21F234 second address: 21F248 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F6035561AD6h 0x00000008 jnp 00007F6035561AD6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push edi 0x00000013 pop edi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22491F second address: 224924 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 224DBD second address: 224DC7 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F6035561AD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 224EE0 second address: 224F06 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edi 0x0000000c jl 00007F6034D241CCh 0x00000012 jg 00007F6034D241C6h 0x00000018 pop edi 0x00000019 mov eax, dword ptr [esp+04h] 0x0000001d jc 00007F6034D241CEh 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 224F06 second address: 224F2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 mov eax, dword ptr [eax] 0x00000007 jne 00007F6035561AE9h 0x0000000d mov dword ptr [esp+04h], eax 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 224F2F second address: 224F33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2237FC second address: 223800 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 223800 second address: 223806 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 223806 second address: 22380D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 223F42 second address: 223F4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2278D3 second address: 2278D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2278D7 second address: 2278E7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jp 00007F6034D241CEh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1E5EEA second address: 1E5EF0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22AD2A second address: 22AD32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22AD32 second address: 22AD38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22AD38 second address: 22AD42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22DF77 second address: 22DF91 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6035561AE6h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22E282 second address: 22E286 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22E286 second address: 22E2A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F6035561AE7h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22E2A6 second address: 22E2B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007F6034D241C6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22E3C1 second address: 22E3F8 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F6035561AD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F6035561AE2h 0x0000000f popad 0x00000010 push eax 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F6035561AE6h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22E3F8 second address: 22E405 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F6034D241C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22E674 second address: 22E688 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6035561ADFh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22E688 second address: 22E68E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22EBBD second address: 22EBD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6035561ADCh 0x00000009 popad 0x0000000a pop edx 0x0000000b push eax 0x0000000c pushad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22EC74 second address: 22EC78 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22EC78 second address: 22ECA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 mov dword ptr [esp], ebx 0x0000000a mov dword ptr [ebp+122D1C9Dh], edx 0x00000010 nop 0x00000011 jbe 00007F6035561AE2h 0x00000017 push eax 0x00000018 jmp 00007F6035561ADAh 0x0000001d pop eax 0x0000001e push eax 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22ECA2 second address: 22ECA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22ECA6 second address: 22ECAC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22ECAC second address: 22ECB2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22F275 second address: 22F2BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007F6035561AE7h 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push ebp 0x0000000f call 00007F6035561AD8h 0x00000014 pop ebp 0x00000015 mov dword ptr [esp+04h], ebp 0x00000019 add dword ptr [esp+04h], 00000017h 0x00000021 inc ebp 0x00000022 push ebp 0x00000023 ret 0x00000024 pop ebp 0x00000025 ret 0x00000026 mov esi, dword ptr [ebp+122D378Eh] 0x0000002c push eax 0x0000002d push eax 0x0000002e push edx 0x0000002f push ebx 0x00000030 push ecx 0x00000031 pop ecx 0x00000032 pop ebx 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22F2BF second address: 22F2C4 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22F84B second address: 22F850 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 230251 second address: 230257 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 231348 second address: 2313AF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561ADBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push eax 0x0000000d call 00007F6035561AD8h 0x00000012 pop eax 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 add dword ptr [esp+04h], 0000001Ch 0x0000001f inc eax 0x00000020 push eax 0x00000021 ret 0x00000022 pop eax 0x00000023 ret 0x00000024 mov di, cx 0x00000027 push 00000000h 0x00000029 add si, 3908h 0x0000002e push 00000000h 0x00000030 xor si, 5A7Ch 0x00000035 cmc 0x00000036 xchg eax, ebx 0x00000037 jp 00007F6035561AEAh 0x0000003d push eax 0x0000003e pushad 0x0000003f push eax 0x00000040 push edx 0x00000041 push eax 0x00000042 push edx 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2313AF second address: 2313B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 231E72 second address: 231E9A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561AE9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushad 0x0000000c jo 00007F6035561AD6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 231E9A second address: 231F08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push edx 0x00000007 pop edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a popad 0x0000000b popad 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push ebp 0x00000010 call 00007F6034D241C8h 0x00000015 pop ebp 0x00000016 mov dword ptr [esp+04h], ebp 0x0000001a add dword ptr [esp+04h], 0000001Ah 0x00000022 inc ebp 0x00000023 push ebp 0x00000024 ret 0x00000025 pop ebp 0x00000026 ret 0x00000027 movsx edi, ax 0x0000002a mov dword ptr [ebp+122D3007h], eax 0x00000030 push 00000000h 0x00000032 push 00000000h 0x00000034 push edi 0x00000035 call 00007F6034D241C8h 0x0000003a pop edi 0x0000003b mov dword ptr [esp+04h], edi 0x0000003f add dword ptr [esp+04h], 00000014h 0x00000047 inc edi 0x00000048 push edi 0x00000049 ret 0x0000004a pop edi 0x0000004b ret 0x0000004c movzx esi, dx 0x0000004f push 00000000h 0x00000051 sub edi, dword ptr [ebp+122D37D6h] 0x00000057 xchg eax, ebx 0x00000058 push eax 0x00000059 push edx 0x0000005a pushad 0x0000005b jc 00007F6034D241C6h 0x00000061 push ecx 0x00000062 pop ecx 0x00000063 popad 0x00000064 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 232A89 second address: 232ADD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F6035561ADDh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp], eax 0x00000010 push 00000000h 0x00000012 push ebp 0x00000013 call 00007F6035561AD8h 0x00000018 pop ebp 0x00000019 mov dword ptr [esp+04h], ebp 0x0000001d add dword ptr [esp+04h], 00000016h 0x00000025 inc ebp 0x00000026 push ebp 0x00000027 ret 0x00000028 pop ebp 0x00000029 ret 0x0000002a jmp 00007F6035561ADEh 0x0000002f jns 00007F6035561AD6h 0x00000035 push 00000000h 0x00000037 push 00000000h 0x00000039 xchg eax, ebx 0x0000003a pushad 0x0000003b push eax 0x0000003c push edx 0x0000003d pushad 0x0000003e popad 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 233FFD second address: 234007 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F6034D241CCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 234007 second address: 234074 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 mov dword ptr [ebp+122D2F02h], eax 0x0000000f push 00000000h 0x00000011 xor edi, dword ptr [ebp+122D1C77h] 0x00000017 push 00000000h 0x00000019 push 00000000h 0x0000001b push esi 0x0000001c call 00007F6035561AD8h 0x00000021 pop esi 0x00000022 mov dword ptr [esp+04h], esi 0x00000026 add dword ptr [esp+04h], 00000015h 0x0000002e inc esi 0x0000002f push esi 0x00000030 ret 0x00000031 pop esi 0x00000032 ret 0x00000033 xchg eax, ebx 0x00000034 pushad 0x00000035 jmp 00007F6035561ADAh 0x0000003a jmp 00007F6035561AE2h 0x0000003f popad 0x00000040 push eax 0x00000041 push eax 0x00000042 push edx 0x00000043 push eax 0x00000044 push edx 0x00000045 jmp 00007F6035561AE3h 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 234074 second address: 23407A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 234AC1 second address: 234AC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 236C7E second address: 236C84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 237195 second address: 23719A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 23719A second address: 2371A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007F6034D241C6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2381F5 second address: 238263 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push eax 0x0000000b call 00007F6035561AD8h 0x00000010 pop eax 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 add dword ptr [esp+04h], 00000014h 0x0000001d inc eax 0x0000001e push eax 0x0000001f ret 0x00000020 pop eax 0x00000021 ret 0x00000022 push 00000000h 0x00000024 jmp 00007F6035561AE8h 0x00000029 push 00000000h 0x0000002b push 00000000h 0x0000002d push ebx 0x0000002e call 00007F6035561AD8h 0x00000033 pop ebx 0x00000034 mov dword ptr [esp+04h], ebx 0x00000038 add dword ptr [esp+04h], 00000019h 0x00000040 inc ebx 0x00000041 push ebx 0x00000042 ret 0x00000043 pop ebx 0x00000044 ret 0x00000045 mov ebx, dword ptr [ebp+122D3712h] 0x0000004b push eax 0x0000004c push eax 0x0000004d push edx 0x0000004e push eax 0x0000004f push edx 0x00000050 push edi 0x00000051 pop edi 0x00000052 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 238263 second address: 238271 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241CAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2393E5 second address: 239480 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561ADDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c stc 0x0000000d push dword ptr fs:[00000000h] 0x00000014 mov ebx, dword ptr [ebp+122D38E2h] 0x0000001a mov dword ptr fs:[00000000h], esp 0x00000021 push 00000000h 0x00000023 push edi 0x00000024 call 00007F6035561AD8h 0x00000029 pop edi 0x0000002a mov dword ptr [esp+04h], edi 0x0000002e add dword ptr [esp+04h], 0000001Bh 0x00000036 inc edi 0x00000037 push edi 0x00000038 ret 0x00000039 pop edi 0x0000003a ret 0x0000003b mov edi, dword ptr [ebp+122D38EEh] 0x00000041 mov eax, dword ptr [ebp+122D1365h] 0x00000047 jmp 00007F6035561AE8h 0x0000004c push FFFFFFFFh 0x0000004e push 00000000h 0x00000050 push esi 0x00000051 call 00007F6035561AD8h 0x00000056 pop esi 0x00000057 mov dword ptr [esp+04h], esi 0x0000005b add dword ptr [esp+04h], 00000014h 0x00000063 inc esi 0x00000064 push esi 0x00000065 ret 0x00000066 pop esi 0x00000067 ret 0x00000068 push eax 0x00000069 push eax 0x0000006a push edx 0x0000006b jmp 00007F6035561ADAh 0x00000070 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 23B10F second address: 23B115 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 23A344 second address: 23A348 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 23B115 second address: 23B119 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 23D383 second address: 23D389 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 23C2FD second address: 23C319 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241D8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 23E470 second address: 23E475 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 23F35D second address: 23F361 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 23F421 second address: 23F425 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 23E5D4 second address: 23E65E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push esi 0x0000000c call 00007F6034D241C8h 0x00000011 pop esi 0x00000012 mov dword ptr [esp+04h], esi 0x00000016 add dword ptr [esp+04h], 0000001Ch 0x0000001e inc esi 0x0000001f push esi 0x00000020 ret 0x00000021 pop esi 0x00000022 ret 0x00000023 stc 0x00000024 push dword ptr fs:[00000000h] 0x0000002b jbe 00007F6034D241CBh 0x00000031 xor edi, 55C74F81h 0x00000037 mov dword ptr fs:[00000000h], esp 0x0000003e push 00000000h 0x00000040 push edi 0x00000041 call 00007F6034D241C8h 0x00000046 pop edi 0x00000047 mov dword ptr [esp+04h], edi 0x0000004b add dword ptr [esp+04h], 0000001Bh 0x00000053 inc edi 0x00000054 push edi 0x00000055 ret 0x00000056 pop edi 0x00000057 ret 0x00000058 mov dword ptr [ebp+122D3393h], edi 0x0000005e mov eax, dword ptr [ebp+122D0895h] 0x00000064 mov dword ptr [ebp+1246AAEEh], esi 0x0000006a push FFFFFFFFh 0x0000006c push eax 0x0000006d push ecx 0x0000006e push eax 0x0000006f push edx 0x00000070 push eax 0x00000071 push edx 0x00000072 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 23E65E second address: 23E662 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 240470 second address: 240476 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 24051F second address: 240529 instructions: 0x00000000 rdtsc 0x00000002 js 00007F6035561AD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2413E1 second address: 2413E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2433BF second address: 243402 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F6035561ADCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d or dword ptr [ebp+124465ABh], edi 0x00000013 push 00000000h 0x00000015 mov dword ptr [ebp+122D2F0Ah], eax 0x0000001b push 00000000h 0x0000001d or bx, A2BFh 0x00000022 xchg eax, esi 0x00000023 jmp 00007F6035561ADAh 0x00000028 push eax 0x00000029 push edi 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007F6035561ADCh 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 23F569 second address: 23F57C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F6034D241C6h 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d push esi 0x0000000e pushad 0x0000000f push edx 0x00000010 pop edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 23F57C second address: 23F602 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 nop 0x00000007 mov bx, 6100h 0x0000000b push dword ptr fs:[00000000h] 0x00000012 mov dword ptr [ebp+124454FAh], edx 0x00000018 mov dword ptr fs:[00000000h], esp 0x0000001f push 00000000h 0x00000021 push edx 0x00000022 call 00007F6035561AD8h 0x00000027 pop edx 0x00000028 mov dword ptr [esp+04h], edx 0x0000002c add dword ptr [esp+04h], 00000017h 0x00000034 inc edx 0x00000035 push edx 0x00000036 ret 0x00000037 pop edx 0x00000038 ret 0x00000039 jno 00007F6035561ADBh 0x0000003f mov eax, dword ptr [ebp+122D08A1h] 0x00000045 jmp 00007F6035561ADDh 0x0000004a push FFFFFFFFh 0x0000004c push 00000000h 0x0000004e push eax 0x0000004f call 00007F6035561AD8h 0x00000054 pop eax 0x00000055 mov dword ptr [esp+04h], eax 0x00000059 add dword ptr [esp+04h], 00000019h 0x00000061 inc eax 0x00000062 push eax 0x00000063 ret 0x00000064 pop eax 0x00000065 ret 0x00000066 mov edi, edx 0x00000068 nop 0x00000069 push edx 0x0000006a pushad 0x0000006b push eax 0x0000006c push edx 0x0000006d rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 244457 second address: 2444E5 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F6034D241CCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d mov bx, 8008h 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push ebx 0x00000016 call 00007F6034D241C8h 0x0000001b pop ebx 0x0000001c mov dword ptr [esp+04h], ebx 0x00000020 add dword ptr [esp+04h], 0000001Ah 0x00000028 inc ebx 0x00000029 push ebx 0x0000002a ret 0x0000002b pop ebx 0x0000002c ret 0x0000002d or dword ptr [ebp+12446E96h], ecx 0x00000033 push 00000000h 0x00000035 push 00000000h 0x00000037 push ebp 0x00000038 call 00007F6034D241C8h 0x0000003d pop ebp 0x0000003e mov dword ptr [esp+04h], ebp 0x00000042 add dword ptr [esp+04h], 0000001Dh 0x0000004a inc ebp 0x0000004b push ebp 0x0000004c ret 0x0000004d pop ebp 0x0000004e ret 0x0000004f mov edi, dword ptr [ebp+122D27FEh] 0x00000055 or dword ptr [ebp+12471E9Fh], eax 0x0000005b push eax 0x0000005c pushad 0x0000005d push ebx 0x0000005e jmp 00007F6034D241D2h 0x00000063 pop ebx 0x00000064 push eax 0x00000065 push edx 0x00000066 pushad 0x00000067 popad 0x00000068 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 24273B second address: 24273F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 24273F second address: 242760 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F6034D241D5h 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 243635 second address: 243639 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2453B4 second address: 2453C5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241CDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2445FE second address: 244604 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 244604 second address: 244608 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 244608 second address: 24460C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 24470E second address: 244730 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F6034D241D8h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 247BB2 second address: 247C16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jg 00007F6035561AD6h 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jmp 00007F6035561AE6h 0x00000012 nop 0x00000013 sub bh, 00000013h 0x00000016 push 00000000h 0x00000018 push 00000000h 0x0000001a push eax 0x0000001b call 00007F6035561AD8h 0x00000020 pop eax 0x00000021 mov dword ptr [esp+04h], eax 0x00000025 add dword ptr [esp+04h], 00000017h 0x0000002d inc eax 0x0000002e push eax 0x0000002f ret 0x00000030 pop eax 0x00000031 ret 0x00000032 mov bl, ch 0x00000034 push 00000000h 0x00000036 mov dword ptr [ebp+122D23ACh], ecx 0x0000003c xchg eax, esi 0x0000003d push eax 0x0000003e push edx 0x0000003f push edi 0x00000040 jmp 00007F6035561ADDh 0x00000045 pop edi 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 247DD0 second address: 247DE3 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jc 00007F6034D241C6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 247DE3 second address: 247DED instructions: 0x00000000 rdtsc 0x00000002 jg 00007F6035561AD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 247DED second address: 247DF7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007F6034D241C6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 247DF7 second address: 247E61 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 add edi, 284F7F66h 0x0000000f push dword ptr fs:[00000000h] 0x00000016 mov dword ptr [ebp+122D2E5Ah], edx 0x0000001c mov dword ptr fs:[00000000h], esp 0x00000023 jmp 00007F6035561AE1h 0x00000028 mov eax, dword ptr [ebp+122D0719h] 0x0000002e mov dword ptr [ebp+122D2426h], ebx 0x00000034 push FFFFFFFFh 0x00000036 push 00000000h 0x00000038 push ebx 0x00000039 call 00007F6035561AD8h 0x0000003e pop ebx 0x0000003f mov dword ptr [esp+04h], ebx 0x00000043 add dword ptr [esp+04h], 0000001Ah 0x0000004b inc ebx 0x0000004c push ebx 0x0000004d ret 0x0000004e pop ebx 0x0000004f ret 0x00000050 nop 0x00000051 pushad 0x00000052 push eax 0x00000053 push edx 0x00000054 push ecx 0x00000055 pop ecx 0x00000056 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 247E61 second address: 247E65 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 250F58 second address: 250F65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 js 00007F6035561ADCh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 257A6A second address: 257A6E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 257A6E second address: 257A74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 257B5F second address: 257BBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F6034D241C6h 0x0000000a popad 0x0000000b popad 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 pushad 0x00000011 push edx 0x00000012 jmp 00007F6034D241D1h 0x00000017 pop edx 0x00000018 js 00007F6034D241C8h 0x0000001e push eax 0x0000001f pop eax 0x00000020 popad 0x00000021 mov eax, dword ptr [eax] 0x00000023 pushad 0x00000024 jnc 00007F6034D241D4h 0x0000002a jmp 00007F6034D241CEh 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007F6034D241D6h 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 257DE7 second address: 257DEB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 257DEB second address: 257DF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 25BA75 second address: 25BA7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F6035561AD6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 25BA7F second address: 25BA83 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 25BA83 second address: 25BA9C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F6035561AE1h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 25BA9C second address: 25BAB7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnl 00007F6034D241C6h 0x00000009 jmp 00007F6034D241CEh 0x0000000e popad 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 25C1F0 second address: 25C1FA instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F6035561AD6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 25C1FA second address: 25C209 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 25C209 second address: 25C20F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 25C20F second address: 25C213 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 25C388 second address: 25C3B5 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F6035561AD6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push edi 0x0000000e pop edi 0x0000000f je 00007F6035561AD6h 0x00000015 jmp 00007F6035561AE6h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 25C3B5 second address: 25C3BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 25C4F0 second address: 25C4F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 263BDD second address: 263BE5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push edx 0x00000007 pop edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 263D25 second address: 263D52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007F6035561AE1h 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F6035561AE0h 0x00000012 push eax 0x00000013 pushad 0x00000014 popad 0x00000015 pop eax 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 263D52 second address: 263D58 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 264324 second address: 264335 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F6035561AD6h 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d pop eax 0x0000000e push edx 0x0000000f pop edx 0x00000010 pop eax 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2644CA second address: 2644ED instructions: 0x00000000 rdtsc 0x00000002 jl 00007F6034D241E5h 0x00000008 jmp 00007F6034D241D9h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2644ED second address: 2644FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jnl 00007F6035561AD6h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 264A2D second address: 264A37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 push edx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 264A37 second address: 264A3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 264E75 second address: 264E79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 264E79 second address: 264E97 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F6035561AD6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F6035561ADCh 0x00000011 push eax 0x00000012 push edx 0x00000013 push edi 0x00000014 pop edi 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 264E97 second address: 264EB7 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F6034D241C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F6034D241D2h 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 264EB7 second address: 264EBD instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 269420 second address: 269454 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F6034D241C6h 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c popad 0x0000000d jmp 00007F6034D241CDh 0x00000012 pop esi 0x00000013 push edi 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F6034D241D6h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 269454 second address: 26945A instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 269596 second address: 2695A5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jnp 00007F6034D241C6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2695A5 second address: 2695C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F6035561AD6h 0x0000000a popad 0x0000000b jmp 00007F6035561AE1h 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2695C5 second address: 2695D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6034D241CDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2695D6 second address: 2695DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 269724 second address: 26972C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26972C second address: 269736 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F6035561AD6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 269736 second address: 26974E instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F6034D241C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jnl 00007F6034D241C6h 0x00000012 jne 00007F6034D241C6h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26974E second address: 269752 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 269102 second address: 269120 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6034D241D8h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 269120 second address: 26914C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F6035561AE5h 0x0000000a pushad 0x0000000b jmp 00007F6035561ADFh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26A07E second address: 26A095 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6034D241D3h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26A095 second address: 26A0AE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561AE5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26A0AE second address: 26A0D9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241D0h 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F6034D241D7h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26EACA second address: 26EAF1 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F6035561AD6h 0x00000008 jmp 00007F6035561AE9h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26EAF1 second address: 26EB02 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241CDh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1F0089 second address: 1F009B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561ADCh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1F009B second address: 1F00C2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241D4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F6034D241CDh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26D934 second address: 26D95D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 jmp 00007F6035561ADFh 0x0000000c jg 00007F6035561AD8h 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 pushad 0x00000016 push esi 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 pop esi 0x0000001a push ebx 0x0000001b pushad 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26D95D second address: 26D971 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 jns 00007F6034D241C6h 0x0000000c jc 00007F6034D241C6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22C948 second address: 22C951 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22C951 second address: 22C962 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e pushad 0x0000000f popad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22C962 second address: 22C9B3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 js 00007F6035561AD6h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e nop 0x0000000f mov edi, 75078900h 0x00000014 lea eax, dword ptr [ebp+124786E8h] 0x0000001a push 00000000h 0x0000001c push edi 0x0000001d call 00007F6035561AD8h 0x00000022 pop edi 0x00000023 mov dword ptr [esp+04h], edi 0x00000027 add dword ptr [esp+04h], 00000019h 0x0000002f inc edi 0x00000030 push edi 0x00000031 ret 0x00000032 pop edi 0x00000033 ret 0x00000034 nop 0x00000035 jl 00007F6035561ADEh 0x0000003b jbe 00007F6035561AD8h 0x00000041 pushad 0x00000042 popad 0x00000043 push eax 0x00000044 push eax 0x00000045 push edx 0x00000046 push eax 0x00000047 push edx 0x00000048 push eax 0x00000049 push edx 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22C9B3 second address: 22C9B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22C9B7 second address: 22C9C1 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F6035561AD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22C9C1 second address: 210B94 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push ebp 0x0000000c call 00007F6034D241C8h 0x00000011 pop ebp 0x00000012 mov dword ptr [esp+04h], ebp 0x00000016 add dword ptr [esp+04h], 00000019h 0x0000001e inc ebp 0x0000001f push ebp 0x00000020 ret 0x00000021 pop ebp 0x00000022 ret 0x00000023 jno 00007F6034D241CBh 0x00000029 add cx, 2937h 0x0000002e call dword ptr [ebp+122D1CA7h] 0x00000034 je 00007F6034D241D8h 0x0000003a push eax 0x0000003b push edx 0x0000003c ja 00007F6034D241C6h 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22CF44 second address: 22CF62 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F6035561AD8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xor dword ptr [esp], 2F94E34Eh 0x00000013 mov dl, 2Fh 0x00000015 push 7DB18C4Fh 0x0000001a push ecx 0x0000001b pushad 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22D158 second address: 22D15D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22D1F7 second address: 22D1FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22D1FD second address: 22D206 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22D206 second address: 22D20A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22D75B second address: 22D788 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F6034D241C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop esi 0x0000000b nop 0x0000000c push 0000001Eh 0x0000000e mov cl, 84h 0x00000010 mov ch, D8h 0x00000012 nop 0x00000013 jmp 00007F6034D241D4h 0x00000018 push eax 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22D788 second address: 22D78C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22DB13 second address: 22DB23 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241CCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22DB23 second address: 22DB43 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e je 00007F6035561AD6h 0x00000014 jmp 00007F6035561ADBh 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22DB43 second address: 22DB48 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26DD67 second address: 26DD6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26DEF6 second address: 26DF07 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241CDh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26DF07 second address: 26DF1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F6035561ADEh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26DF1B second address: 26DF2F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241CEh 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26DF2F second address: 26DF33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26DF33 second address: 26DF54 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241CCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b je 00007F6034D241E9h 0x00000011 pushad 0x00000012 jl 00007F6034D241C6h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26E0AB second address: 26E0AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26E0AF second address: 26E0B9 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F6034D241C6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26E4F6 second address: 26E4FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26E4FA second address: 26E4FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26E4FE second address: 26E51A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F6035561AE6h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26E51A second address: 26E520 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 26E520 second address: 26E524 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2726C4 second address: 2726CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2726CA second address: 2726CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2726CF second address: 2726DA instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jo 00007F6034D241C6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2726DA second address: 2726E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2726E2 second address: 2726EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 276273 second address: 276289 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F6035561AD6h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 jbe 00007F6035561AD6h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 275C10 second address: 275C14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 275C14 second address: 275C18 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 275C18 second address: 275C1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 275C1E second address: 275C3C instructions: 0x00000000 rdtsc 0x00000002 jc 00007F6035561ADAh 0x00000008 push eax 0x00000009 pop eax 0x0000000a pushad 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jne 00007F6035561B12h 0x00000014 push eax 0x00000015 push edx 0x00000016 push edx 0x00000017 pop edx 0x00000018 jnc 00007F6035561AD6h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 275C3C second address: 275C56 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F6034D241C6h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F6034D241CAh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 275C56 second address: 275C5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 275E0E second address: 275E33 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F6034D241C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007F6034D241D6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 27C321 second address: 27C325 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 27C325 second address: 27C351 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F6034D241C6h 0x00000008 jp 00007F6034D241C6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 jmp 00007F6034D241D9h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 27C351 second address: 27C356 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 27BD68 second address: 27BDA0 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F6034D241C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jl 00007F6034D241D4h 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 jmp 00007F6034D241CCh 0x00000017 jno 00007F6034D241CEh 0x0000001d popad 0x0000001e push eax 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 popad 0x00000023 ja 00007F6034D241C6h 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 282675 second address: 282687 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 js 00007F6035561AD6h 0x0000000d push edi 0x0000000e pop edi 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 281398 second address: 2813A4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2813A4 second address: 2813A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 22D5E2 second address: 22D5E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 281924 second address: 28192A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28192A second address: 28192E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2822DC second address: 2822E6 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F6035561AD6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2822E6 second address: 2822F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2822F1 second address: 28230C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F6035561AE3h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 285DF5 second address: 285E04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop eax 0x00000007 js 00007F6034D241CCh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 285E04 second address: 285E08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 285E08 second address: 285E0E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28D305 second address: 28D318 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jne 00007F6035561AD6h 0x0000000c jnl 00007F6035561AD6h 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28D318 second address: 28D326 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F6034D241C8h 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28D326 second address: 28D32A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28D32A second address: 28D32E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28D32E second address: 28D340 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c push eax 0x0000000d pop eax 0x0000000e push eax 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28B432 second address: 28B43C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28B43C second address: 28B442 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28B59A second address: 28B5B2 instructions: 0x00000000 rdtsc 0x00000002 je 00007F6034D241C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jc 00007F6034D241CEh 0x00000010 push edi 0x00000011 pop edi 0x00000012 jns 00007F6034D241C6h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28B5B2 second address: 28B5B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28B5B8 second address: 28B5CA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241CEh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28B5CA second address: 28B5D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28B861 second address: 28B869 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28BEA9 second address: 28BEC4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6035561AE1h 0x00000009 jo 00007F6035561AD6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28BEC4 second address: 28BEEA instructions: 0x00000000 rdtsc 0x00000002 jg 00007F6034D241C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jo 00007F6034D241F8h 0x00000012 push eax 0x00000013 jmp 00007F6034D241CEh 0x00000018 pop eax 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28BEEA second address: 28BEF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6035561ADAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28BEF8 second address: 28BEFC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28BEFC second address: 28BF02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28C1FF second address: 28C228 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F6034D241D2h 0x0000000b popad 0x0000000c jmp 00007F6034D241D0h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28C228 second address: 28C22E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28C7D1 second address: 28C7E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6034D241CEh 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28CD35 second address: 28CD3F instructions: 0x00000000 rdtsc 0x00000002 js 00007F6035561ADCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28CD3F second address: 28CD46 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28CD46 second address: 28CD4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28CD4C second address: 28CD52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28CD52 second address: 28CD5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 28CD5D second address: 28CD7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6034D241D2h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jns 00007F6034D241C6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 291536 second address: 29153A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 29153A second address: 291556 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F6034D241C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F6034D241D2h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 291556 second address: 29155C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 29155C second address: 291560 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 291560 second address: 291564 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2916C2 second address: 2916E9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241D9h 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d ja 00007F6034D241C6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 291869 second address: 29187B instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jmp 00007F6035561ADCh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 29187B second address: 291881 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 291881 second address: 2918AE instructions: 0x00000000 rdtsc 0x00000002 jng 00007F6035561AD6h 0x00000008 jmp 00007F6035561AE9h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 pushad 0x00000015 popad 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 pop eax 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 293348 second address: 293352 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F6034D241C6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 293352 second address: 29335C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 29335C second address: 293360 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 294996 second address: 2949A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 jno 00007F6035561AD6h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2949A3 second address: 2949A7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 298ECF second address: 298EE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pushad 0x00000006 popad 0x00000007 pop esi 0x00000008 pop ebx 0x00000009 jl 00007F6035561AF6h 0x0000000f pushad 0x00000010 jl 00007F6035561AD6h 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 29EB22 second address: 29EB28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 29F0F3 second address: 29F105 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F6035561AD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jbe 00007F6035561AD6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 29F2B4 second address: 29F2BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 29F2BA second address: 29F2C9 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jl 00007F6035561AD6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 29F571 second address: 29F58B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F6034D241D5h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2A0317 second address: 2A0320 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2A7A37 second address: 2A7A44 instructions: 0x00000000 rdtsc 0x00000002 js 00007F6034D241C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2A7A44 second address: 2A7A49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 1E0DEB second address: 1E0DEF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2B7A1B second address: 2B7A22 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2B7A22 second address: 2B7A2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F6034D241C6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2BD953 second address: 2BD959 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2BD959 second address: 2BD95F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2BD95F second address: 2BD9A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F6035561AD6h 0x0000000a popad 0x0000000b jnc 00007F6035561ADAh 0x00000011 jmp 00007F6035561AE3h 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 jl 00007F6035561AE6h 0x0000001f jmp 00007F6035561AE0h 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2BD9A4 second address: 2BD9B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6034D241CDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2BD9B5 second address: 2BD9CB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561ADCh 0x00000007 js 00007F6035561AD6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2C48FA second address: 2C492D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241D2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jng 00007F6034D241D6h 0x0000000f jmp 00007F6034D241CAh 0x00000014 jp 00007F6034D241C6h 0x0000001a pop edi 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2C492D second address: 2C4931 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2C4931 second address: 2C4937 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2C4937 second address: 2C493D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2C493D second address: 2C4941 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2C7F32 second address: 2C7F36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2C7F36 second address: 2C7F3A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2C7F3A second address: 2C7F40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2CE64B second address: 2CE651 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2CE651 second address: 2CE673 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jo 00007F6035561AD6h 0x0000000b jmp 00007F6035561AE5h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2CE7AF second address: 2CE7DA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241CAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ecx 0x0000000a pushad 0x0000000b pushad 0x0000000c jmp 00007F6034D241D0h 0x00000011 jp 00007F6034D241C6h 0x00000017 pushad 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2CE7DA second address: 2CE7E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2CE7E3 second address: 2CE7E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2CE7E7 second address: 2CE7F5 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F6035561AD6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2CEC65 second address: 2CEC6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2CEC6F second address: 2CEC9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6035561AE5h 0x00000009 jmp 00007F6035561ADAh 0x0000000e popad 0x0000000f pop esi 0x00000010 push eax 0x00000011 push edx 0x00000012 js 00007F6035561AE2h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2CEC9E second address: 2CECA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F6034D241C6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2CF117 second address: 2CF11F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2CF11F second address: 2CF124 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2D5C1D second address: 2D5C49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F6035561AD6h 0x0000000a jmp 00007F6035561AE3h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F6035561ADCh 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2D5C49 second address: 2D5C53 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F6034D241C6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2D5C53 second address: 2D5C65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F6035561ADAh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2D5C65 second address: 2D5C79 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241D0h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2D9732 second address: 2D9742 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 jns 00007F6035561AD6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 3096B7 second address: 3096D9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jg 00007F6034D241C6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edi 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007F6034D241CEh 0x00000014 pop edi 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 3096D9 second address: 3096DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 308900 second address: 308918 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241CCh 0x00000007 jp 00007F6034D241CEh 0x0000000d push esi 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 308A7C second address: 308AB0 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F6035561AD6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F6035561ADEh 0x00000011 jmp 00007F6035561ADAh 0x00000016 push edx 0x00000017 jo 00007F6035561AD6h 0x0000001d push ebx 0x0000001e pop ebx 0x0000001f pop edx 0x00000020 popad 0x00000021 pushad 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 308AB0 second address: 308AB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 308AB6 second address: 308ABA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 308ABA second address: 308ABE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 309001 second address: 309005 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 30D65F second address: 30D665 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 30DCE9 second address: 30DD49 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jl 00007F6035561AD6h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov dword ptr [esp], eax 0x00000011 push 00000000h 0x00000013 push ebx 0x00000014 call 00007F6035561AD8h 0x00000019 pop ebx 0x0000001a mov dword ptr [esp+04h], ebx 0x0000001e add dword ptr [esp+04h], 0000001Ah 0x00000026 inc ebx 0x00000027 push ebx 0x00000028 ret 0x00000029 pop ebx 0x0000002a ret 0x0000002b push dword ptr [ebp+122D2DBFh] 0x00000031 mov edx, dword ptr [ebp+122D3706h] 0x00000037 xor dword ptr [ebp+122D203Dh], edi 0x0000003d push 5DC2BD9Ch 0x00000042 push eax 0x00000043 push edx 0x00000044 push eax 0x00000045 push edx 0x00000046 jmp 00007F6035561AE2h 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 30DD49 second address: 30DD4F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 30DD4F second address: 30DD55 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 30DD55 second address: 30DD59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 30DD59 second address: 30DD5D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 310FED second address: 310FF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 310FF1 second address: 31100C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561ADFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jbe 00007F6035561AE2h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 31100C second address: 311012 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 230CDC second address: 230CE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 230F04 second address: 230F08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2310A6 second address: 2310AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 2310AA second address: 2310B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 525023D second address: 525024E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6035561ADDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 525024E second address: 5250252 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 525030D second address: 5250313 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 230EF4 second address: 230F04 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F6034D241C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52706C6 second address: 5270736 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561ADBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov edx, 418316AAh 0x00000010 pushfd 0x00000011 jmp 00007F6035561ADBh 0x00000016 or si, FB4Eh 0x0000001b jmp 00007F6035561AE9h 0x00000020 popfd 0x00000021 popad 0x00000022 xchg eax, ebp 0x00000023 jmp 00007F6035561ADEh 0x00000028 mov ebp, esp 0x0000002a pushad 0x0000002b mov edi, esi 0x0000002d mov bx, si 0x00000030 popad 0x00000031 xchg eax, ecx 0x00000032 push eax 0x00000033 push edx 0x00000034 pushad 0x00000035 mov ax, dx 0x00000038 call 00007F6035561ADDh 0x0000003d pop eax 0x0000003e popad 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270736 second address: 5270794 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F6034D241CCh 0x00000008 pushfd 0x00000009 jmp 00007F6034D241D2h 0x0000000e sub cx, 1488h 0x00000013 jmp 00007F6034D241CBh 0x00000018 popfd 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c push eax 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 pushfd 0x00000021 jmp 00007F6034D241D2h 0x00000026 adc ch, FFFFFFE8h 0x00000029 jmp 00007F6034D241CBh 0x0000002e popfd 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270794 second address: 5270799 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270799 second address: 52707CF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241CFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a pushad 0x0000000b mov cx, E7EBh 0x0000000f mov bx, si 0x00000012 popad 0x00000013 xchg eax, esi 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F6034D241D4h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52707CF second address: 52707D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52707D3 second address: 52707D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52707D9 second address: 52707DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52707DF second address: 52707E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52707E3 second address: 5270834 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561AE8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d mov ebx, 34B5B2B4h 0x00000012 popad 0x00000013 xchg eax, esi 0x00000014 jmp 00007F6035561AE6h 0x00000019 lea eax, dword ptr [ebp-04h] 0x0000001c pushad 0x0000001d mov eax, 4E624FBDh 0x00000022 mov di, si 0x00000025 popad 0x00000026 nop 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270834 second address: 5270838 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270838 second address: 527083E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 527083E second address: 527086B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241D8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F6034D241CEh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 527086B second address: 5270871 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270871 second address: 527088D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241CDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov esi, edx 0x00000011 mov eax, edi 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270959 second address: 527099C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov esi, 61ADE1B9h 0x00000009 popad 0x0000000a call 00007F6035561AE6h 0x0000000f mov edx, esi 0x00000011 pop ecx 0x00000012 popad 0x00000013 mov eax, esi 0x00000015 jmp 00007F6035561ADDh 0x0000001a pop esi 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F6035561ADDh 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 527099C second address: 5260073 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 leave 0x0000000a jmp 00007F6034D241CEh 0x0000000f retn 0004h 0x00000012 nop 0x00000013 cmp eax, 00000000h 0x00000016 setne al 0x00000019 jmp 00007F6034D241C2h 0x0000001b xor ebx, ebx 0x0000001d test al, 01h 0x0000001f jne 00007F6034D241C7h 0x00000021 sub esp, 04h 0x00000024 mov dword ptr [esp], 0000000Dh 0x0000002b call 00007F6039F217BBh 0x00000030 mov edi, edi 0x00000032 jmp 00007F6034D241D0h 0x00000037 xchg eax, ebp 0x00000038 jmp 00007F6034D241D0h 0x0000003d push eax 0x0000003e jmp 00007F6034D241CBh 0x00000043 xchg eax, ebp 0x00000044 pushad 0x00000045 push esi 0x00000046 pushfd 0x00000047 jmp 00007F6034D241D7h 0x0000004c sub cx, FE9Eh 0x00000051 jmp 00007F6034D241D9h 0x00000056 popfd 0x00000057 pop eax 0x00000058 popad 0x00000059 mov ebp, esp 0x0000005b push eax 0x0000005c push edx 0x0000005d push eax 0x0000005e push edx 0x0000005f pushad 0x00000060 popad 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260073 second address: 5260079 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260079 second address: 52600AE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub esp, 2Ch 0x0000000c pushad 0x0000000d mov edi, eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushfd 0x00000012 jmp 00007F6034D241CEh 0x00000017 sub cl, FFFFFFF8h 0x0000001a jmp 00007F6034D241CBh 0x0000001f popfd 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52600AE second address: 52600DC instructions: 0x00000000 rdtsc 0x00000002 call 00007F6035561AE8h 0x00000007 pop esi 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F6035561ADDh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52600DC second address: 5260160 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 76329CD2h 0x00000008 pushfd 0x00000009 jmp 00007F6034D241D3h 0x0000000e sbb esi, 450960CEh 0x00000014 jmp 00007F6034D241D9h 0x00000019 popfd 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d mov dword ptr [esp], ebx 0x00000020 pushad 0x00000021 pushfd 0x00000022 jmp 00007F6034D241CCh 0x00000027 jmp 00007F6034D241D5h 0x0000002c popfd 0x0000002d mov ax, 90B7h 0x00000031 popad 0x00000032 xchg eax, edi 0x00000033 push eax 0x00000034 push edx 0x00000035 push eax 0x00000036 push edx 0x00000037 jmp 00007F6034D241D4h 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260160 second address: 526016F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561ADBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 526016F second address: 52601D2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F6034D241CFh 0x00000009 adc cx, 699Eh 0x0000000e jmp 00007F6034D241D9h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push eax 0x00000018 pushad 0x00000019 pushfd 0x0000001a jmp 00007F6034D241CAh 0x0000001f jmp 00007F6034D241D5h 0x00000024 popfd 0x00000025 mov cx, 7F47h 0x00000029 popad 0x0000002a xchg eax, edi 0x0000002b pushad 0x0000002c push eax 0x0000002d push edx 0x0000002e pushad 0x0000002f popad 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260225 second address: 5260229 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260229 second address: 526022F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 526022F second address: 5260235 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260235 second address: 5260239 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260239 second address: 5260262 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007F6035561CBAh 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F6035561AE9h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260262 second address: 5260268 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260268 second address: 526026C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 526026C second address: 5260270 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 526038A second address: 52603A1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561ADBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test eax, eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52603A1 second address: 52603A7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52603A7 second address: 52603AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52603AD second address: 52603B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52603B1 second address: 52603B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52603B5 second address: 52603FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jg 00007F60A56E2295h 0x0000000e pushad 0x0000000f mov bl, cl 0x00000011 movsx edi, ax 0x00000014 popad 0x00000015 js 00007F6034D24221h 0x0000001b jmp 00007F6034D241D2h 0x00000020 cmp dword ptr [ebp-14h], edi 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007F6034D241D7h 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52603FE second address: 52604C3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561AE9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007F60A5F1FB56h 0x0000000f pushad 0x00000010 movzx esi, di 0x00000013 mov ebx, 253CCEACh 0x00000018 popad 0x00000019 mov ebx, dword ptr [ebp+08h] 0x0000001c jmp 00007F6035561ADBh 0x00000021 lea eax, dword ptr [ebp-2Ch] 0x00000024 jmp 00007F6035561AE6h 0x00000029 xchg eax, esi 0x0000002a pushad 0x0000002b pushfd 0x0000002c jmp 00007F6035561ADEh 0x00000031 sub cx, AB28h 0x00000036 jmp 00007F6035561ADBh 0x0000003b popfd 0x0000003c popad 0x0000003d push eax 0x0000003e pushad 0x0000003f pushad 0x00000040 pushfd 0x00000041 jmp 00007F6035561AE0h 0x00000046 or eax, 5D8ADD88h 0x0000004c jmp 00007F6035561ADBh 0x00000051 popfd 0x00000052 jmp 00007F6035561AE8h 0x00000057 popad 0x00000058 mov ecx, 28E19601h 0x0000005d popad 0x0000005e xchg eax, esi 0x0000005f push eax 0x00000060 push edx 0x00000061 pushad 0x00000062 push edi 0x00000063 pop eax 0x00000064 push ebx 0x00000065 pop esi 0x00000066 popad 0x00000067 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52604C3 second address: 52604D4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6034D241CDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52604D4 second address: 52604D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52604D8 second address: 52604FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F6034D241D9h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52604FC second address: 5260542 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561AE1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c jmp 00007F6035561ADEh 0x00000011 xchg eax, ebx 0x00000012 pushad 0x00000013 mov edi, ecx 0x00000015 jmp 00007F6035561ADAh 0x0000001a popad 0x0000001b push eax 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007F6035561ADEh 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260542 second address: 5260548 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52605CB second address: 5250E1E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, bx 0x00000006 mov ax, dx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c je 00007F60A5F1FB54h 0x00000012 xor eax, eax 0x00000014 jmp 00007F603553B20Ah 0x00000019 pop esi 0x0000001a pop edi 0x0000001b pop ebx 0x0000001c leave 0x0000001d retn 0004h 0x00000020 nop 0x00000021 xor ebx, ebx 0x00000023 cmp eax, 00000000h 0x00000026 je 00007F6035561C33h 0x0000002c call 00007F603A74FD6Dh 0x00000031 mov edi, edi 0x00000033 push eax 0x00000034 push edx 0x00000035 jmp 00007F6035561ADAh 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5250E1E second address: 5250EB3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F6034D241D1h 0x00000009 or eax, 42DD25B6h 0x0000000f jmp 00007F6034D241D1h 0x00000014 popfd 0x00000015 mov di, ax 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b xchg eax, ebp 0x0000001c jmp 00007F6034D241CAh 0x00000021 push eax 0x00000022 jmp 00007F6034D241CBh 0x00000027 xchg eax, ebp 0x00000028 jmp 00007F6034D241D6h 0x0000002d mov ebp, esp 0x0000002f jmp 00007F6034D241D0h 0x00000034 xchg eax, ecx 0x00000035 jmp 00007F6034D241D0h 0x0000003a push eax 0x0000003b push eax 0x0000003c push edx 0x0000003d jmp 00007F6034D241CEh 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5250EB3 second address: 5250EB8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5250EB8 second address: 5250EEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F6034D241D4h 0x00000013 xor ch, 00000028h 0x00000016 jmp 00007F6034D241CBh 0x0000001b popfd 0x0000001c pushad 0x0000001d popad 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5250EEC second address: 5250EF1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260961 second address: 526096A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, F57Ah 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 526096A second address: 52609AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F6035561AE3h 0x00000011 and ecx, 53918DCEh 0x00000017 jmp 00007F6035561AE9h 0x0000001c popfd 0x0000001d mov bx, cx 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52609AD second address: 52609B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52609B3 second address: 52609DD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561ADFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f movsx edx, si 0x00000012 call 00007F6035561ADCh 0x00000017 pop ecx 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52609DD second address: 5260A27 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241D0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c mov eax, 427D016Dh 0x00000011 pushad 0x00000012 mov ah, 8Ah 0x00000014 call 00007F6034D241D5h 0x00000019 pop esi 0x0000001a popad 0x0000001b popad 0x0000001c cmp dword ptr [75C7459Ch], 05h 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007F6034D241CAh 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260A27 second address: 5260A2D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260A2D second address: 5260A41 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007F60A56D2190h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260A41 second address: 5260A53 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561ADEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260A53 second address: 5260A89 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, bx 0x00000006 mov cl, bl 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007F6034D241CDh 0x00000015 and esi, 026510E6h 0x0000001b jmp 00007F6034D241D1h 0x00000020 popfd 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260BFA second address: 5260C39 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, dx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a pushad 0x0000000b mov bx, B1E8h 0x0000000f mov ah, bl 0x00000011 popad 0x00000012 call 00007F60A5F16A3Ch 0x00000017 push 75C12B70h 0x0000001c push dword ptr fs:[00000000h] 0x00000023 mov eax, dword ptr [esp+10h] 0x00000027 mov dword ptr [esp+10h], ebp 0x0000002b lea ebp, dword ptr [esp+10h] 0x0000002f sub esp, eax 0x00000031 push ebx 0x00000032 push esi 0x00000033 push edi 0x00000034 mov eax, dword ptr [75C74538h] 0x00000039 xor dword ptr [ebp-04h], eax 0x0000003c xor eax, ebp 0x0000003e push eax 0x0000003f mov dword ptr [ebp-18h], esp 0x00000042 push dword ptr [ebp-08h] 0x00000045 mov eax, dword ptr [ebp-04h] 0x00000048 mov dword ptr [ebp-04h], FFFFFFFEh 0x0000004f mov dword ptr [ebp-08h], eax 0x00000052 lea eax, dword ptr [ebp-10h] 0x00000055 mov dword ptr fs:[00000000h], eax 0x0000005b ret 0x0000005c jmp 00007F6035561AE8h 0x00000061 sub esi, esi 0x00000063 push eax 0x00000064 push edx 0x00000065 jmp 00007F6035561ADCh 0x0000006a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260CAA second address: 5260CAE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260CAE second address: 5260CB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260CB4 second address: 5260CE5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241CEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F60A56C7E85h 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F6034D241D7h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260CE5 second address: 5260CEB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5260CEB second address: 5260CEF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52709EF second address: 52709F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52709F5 second address: 52709F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 52709F9 second address: 5270AD3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561ADBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d mov edi, 4DAF953Ah 0x00000012 mov bx, CB06h 0x00000016 popad 0x00000017 xchg eax, ebp 0x00000018 pushad 0x00000019 call 00007F6035561AE3h 0x0000001e mov esi, 7E656DAFh 0x00000023 pop esi 0x00000024 mov ecx, edx 0x00000026 popad 0x00000027 mov ebp, esp 0x00000029 pushad 0x0000002a pushad 0x0000002b pushfd 0x0000002c jmp 00007F6035561AE3h 0x00000031 and ax, EEEEh 0x00000036 jmp 00007F6035561AE9h 0x0000003b popfd 0x0000003c call 00007F6035561AE0h 0x00000041 pop eax 0x00000042 popad 0x00000043 popad 0x00000044 xchg eax, esi 0x00000045 push eax 0x00000046 push edx 0x00000047 pushad 0x00000048 pushfd 0x00000049 jmp 00007F6035561AE9h 0x0000004e jmp 00007F6035561ADBh 0x00000053 popfd 0x00000054 pushfd 0x00000055 jmp 00007F6035561AE8h 0x0000005a sbb cx, DB28h 0x0000005f jmp 00007F6035561ADBh 0x00000064 popfd 0x00000065 popad 0x00000066 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270AD3 second address: 5270AFF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F6034D241CCh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270AFF second address: 5270B3D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561ADBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a jmp 00007F6035561AE6h 0x0000000f mov esi, dword ptr [ebp+0Ch] 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 call 00007F6035561ADDh 0x0000001a pop esi 0x0000001b movsx edi, ax 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270B3D second address: 5270B97 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6034D241D3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b jmp 00007F6034D241D6h 0x00000010 je 00007F60A56C1A11h 0x00000016 jmp 00007F6034D241D0h 0x0000001b cmp dword ptr [75C7459Ch], 05h 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007F6034D241CAh 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270B97 second address: 5270B9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270B9B second address: 5270BA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270BA1 second address: 5270BE4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F6035561ADCh 0x00000009 sbb ecx, 60FB5968h 0x0000000f jmp 00007F6035561ADBh 0x00000014 popfd 0x00000015 mov ch, 13h 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a je 00007F60A5F173A5h 0x00000020 pushad 0x00000021 jmp 00007F6035561AE1h 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 pop edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270BE4 second address: 5270C1E instructions: 0x00000000 rdtsc 0x00000002 mov edi, eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, esi 0x00000008 pushad 0x00000009 mov si, 07D1h 0x0000000d push ecx 0x0000000e pushfd 0x0000000f jmp 00007F6034D241CDh 0x00000014 adc ah, FFFFFFE6h 0x00000017 jmp 00007F6034D241D1h 0x0000001c popfd 0x0000001d pop ecx 0x0000001e popad 0x0000001f push eax 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270C1E second address: 5270C31 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6035561ADFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270CCF second address: 5270CD3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270CD3 second address: 5270CD9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270CD9 second address: 5270CDF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270CDF second address: 5270CEE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270CEE second address: 5270CF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270CF2 second address: 5270CF6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270CF6 second address: 5270CFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\NAnOVCOt4L.exe | RDTSC instruction interceptor: First address: 5270CFC second address: 5270D0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6035561ADDh 0x00000009 rdtsc |