Source: 2oM46LNCOo.exe, 00000002.00000003.1511299256.000000000158E000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574302041.000000000158E000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1886379427.000000000158E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exe |
Source: 2oM46LNCOo.exe, 00000002.00000002.1886070092.0000000001527000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1886412666.0000000001597000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: 2oM46LNCOo.exe, 00000002.00000003.1372032271.0000000005D77000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: 2oM46LNCOo.exe, 00000002.00000003.1372032271.0000000005D77000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: 2oM46LNCOo.exe, 00000002.00000002.1886070092.0000000001527000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1886412666.0000000001597000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: 2oM46LNCOo.exe, 00000002.00000002.1886070092.0000000001527000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1886412666.0000000001597000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: 2oM46LNCOo.exe, 00000002.00000002.1886412666.0000000001597000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U |
Source: 2oM46LNCOo.exe, 00000002.00000002.1886070092.0000000001527000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1886412666.0000000001597000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: 2oM46LNCOo.exe, 00000002.00000003.1426222320.0000000001542000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1511665760.0000000001572000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1404582172.0000000001529000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1452041940.0000000001571000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1426169334.0000000001529000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.micro |
Source: 2oM46LNCOo.exe, 00000002.00000003.1372032271.0000000005D77000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: 2oM46LNCOo.exe, 00000002.00000002.1886070092.0000000001527000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1886412666.0000000001597000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: 2oM46LNCOo.exe, 00000002.00000003.1372032271.0000000005D77000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: 2oM46LNCOo.exe, 00000002.00000003.1372032271.0000000005D77000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: 2oM46LNCOo.exe, 00000002.00000002.1886070092.0000000001527000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1886412666.0000000001597000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: 2oM46LNCOo.exe, 00000002.00000002.1886070092.0000000001527000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1886412666.0000000001597000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: 2oM46LNCOo.exe, 00000002.00000003.1372032271.0000000005D77000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: 2oM46LNCOo.exe, 00000002.00000003.1372032271.0000000005D77000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: 2oM46LNCOo.exe, 00000002.00000003.1574302041.0000000001583000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1890837215.00000000062E9000.00000002.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574118043.0000000005D70000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574082227.0000000005DFA000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574238846.0000000005D41000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: 2oM46LNCOo.exe, 00000002.00000003.1372032271.0000000005D77000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: 2oM46LNCOo.exe, 00000002.00000002.1886070092.0000000001527000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1886412666.0000000001597000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0A |
Source: 2oM46LNCOo.exe, 00000002.00000002.1886070092.0000000001527000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1886412666.0000000001597000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0C |
Source: 2oM46LNCOo.exe, 00000002.00000002.1886070092.0000000001527000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1886412666.0000000001597000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0X |
Source: 2oM46LNCOo.exe, 00000002.00000002.1886412666.0000000001597000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F |
Source: 2oM46LNCOo.exe, 00000002.00000002.1886070092.0000000001527000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1886412666.0000000001597000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/rootr30; |
Source: 2oM46LNCOo.exe, 00000002.00000003.1372032271.0000000005D77000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: 2oM46LNCOo.exe, 00000002.00000002.1886412666.0000000001597000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A |
Source: 2oM46LNCOo.exe, 00000002.00000002.1886070092.0000000001527000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1886412666.0000000001597000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06 |
Source: Amcache.hve.11.dr | String found in binary or memory: http://upx.sf.net |
Source: 2oM46LNCOo.exe, 00000002.00000003.1372032271.0000000005D77000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: 2oM46LNCOo.exe, 00000002.00000003.1372032271.0000000005D77000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: 2oM46LNCOo.exe, 00000002.00000003.1319992084.0000000005D8B000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1319900927.0000000005D8B000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1319831966.0000000005D8E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: 2oM46LNCOo.exe, 00000002.00000003.1574302041.000000000158E000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574485157.0000000005D5F000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574485157.0000000005D4F000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1890146207.0000000005D5F000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1886379427.000000000158E000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574238846.0000000005D41000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aui-cdn.atlassian.com/ |
Source: 2oM46LNCOo.exe, 00000002.00000003.1574238846.0000000005D41000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net |
Source: 2oM46LNCOo.exe, 00000002.00000003.1574238846.0000000005D41000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-exp.prod-east.frontend.public.atl-paas.net |
Source: 2oM46LNCOo.exe, 00000002.00000003.1574238846.0000000005D41000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net |
Source: 2oM46LNCOo.exe, 00000002.00000003.1574238846.0000000005D41000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net |
Source: 2oM46LNCOo.exe, 00000002.00000003.1574238846.0000000005D41000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/ |
Source: 2oM46LNCOo.exe, 00000002.00000003.1574238846.0000000005D41000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/; |
Source: 2oM46LNCOo.exe, 00000002.00000003.1574238846.0000000005D41000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/ |
Source: 2oM46LNCOo.exe, 00000002.00000002.1890146207.0000000005D50000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574238846.0000000005D41000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1- |
Source: 2oM46LNCOo.exe, 00000002.00000003.1511299256.000000000158E000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1511665760.0000000001572000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/ |
Source: 2oM46LNCOo.exe, 00000002.00000003.1511299256.000000000158E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/3S |
Source: 2oM46LNCOo.exe, 00000002.00000003.1511299256.000000000158E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/_ |
Source: 2oM46LNCOo.exe, 00000002.00000003.1511299256.000000000158E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/f |
Source: 2oM46LNCOo.exe, 00000002.00000003.1511687623.0000000001542000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe |
Source: 2oM46LNCOo.exe, 00000002.00000002.1885827492.00000000012FA000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe.0 |
Source: 2oM46LNCOo.exe, 00000002.00000003.1511602212.0000000005D4D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org:443/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe |
Source: 2oM46LNCOo.exe, 00000002.00000003.1375451426.0000000005D4F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252. |
Source: 2oM46LNCOo.exe, 00000002.00000003.1375451426.0000000005D4F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta |
Source: 2oM46LNCOo.exe, 00000002.00000003.1574302041.000000000158E000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574485157.0000000005D5F000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574485157.0000000005D4F000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1890146207.0000000005D5F000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1886379427.000000000158E000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574238846.0000000005D41000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.cookielaw.org/ |
Source: 2oM46LNCOo.exe, 00000002.00000003.1319992084.0000000005D8B000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1319900927.0000000005D8B000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1319831966.0000000005D8E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: 2oM46LNCOo.exe, 00000002.00000003.1319992084.0000000005D8B000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1319900927.0000000005D8B000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1319831966.0000000005D8E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: 2oM46LNCOo.exe, 00000002.00000003.1319992084.0000000005D8B000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1319900927.0000000005D8B000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1319831966.0000000005D8E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: 2oM46LNCOo.exe, 00000002.00000003.1375451426.0000000005D4F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg |
Source: 2oM46LNCOo.exe, 00000002.00000003.1375451426.0000000005D4F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: 2oM46LNCOo.exe, 00000002.00000003.1319992084.0000000005D8B000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1319900927.0000000005D8B000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1319831966.0000000005D8E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: 2oM46LNCOo.exe, 00000002.00000003.1319992084.0000000005D8B000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1319900927.0000000005D8B000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1319831966.0000000005D8E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: 2oM46LNCOo.exe, 00000002.00000003.1319992084.0000000005D8B000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1319900927.0000000005D8B000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1319831966.0000000005D8E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: 2oM46LNCOo.exe, 00000002.00000003.1574302041.000000000158E000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574485157.0000000005D5F000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574485157.0000000005D4F000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1890146207.0000000005D5F000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574459178.0000000001596000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574238846.0000000005D41000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://dz8aopenkvv6s.cloudfront.net |
Source: 2oM46LNCOo.exe, 00000002.00000003.1375451426.0000000005D4F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e |
Source: 2oM46LNCOo.exe, 00000002.00000003.1425834485.00000000015BE000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1426222320.0000000001542000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1886070092.000000000151B000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1439414268.00000000015BE000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1397400304.00000000015BD000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1438546515.00000000015A4000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1452024343.00000000015BB000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1451859378.00000000015A4000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574302041.00000000015BE000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1438667211.00000000015BE000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1511624035.00000000015BE000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1451859378.00000000015B5000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1426169334.0000000001529000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1398164398.00000000015BD000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1886412666.00000000015BE000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1425834485.00000000015A4000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1404451499.00000000015BD000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1511687623.0000000001542000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/ |
Source: 2oM46LNCOo.exe, 00000002.00000003.1425834485.00000000015BE000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1368140153.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1439414268.00000000015BE000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1397400304.00000000015BD000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1452024343.00000000015BB000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1369759598.00000000015BC000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1438667211.00000000015BE000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1511624035.00000000015BE000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1451859378.00000000015B5000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1398164398.00000000015BD000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1374925194.00000000015BD000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1404451499.00000000015BD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/Q |
Source: 2oM46LNCOo.exe, 00000002.00000003.1511687623.0000000001542000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/api |
Source: 2oM46LNCOo.exe, 00000002.00000003.1511641547.0000000001596000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1511299256.000000000158E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apis |
Source: 2oM46LNCOo.exe, 00000002.00000003.1425834485.000000000158E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apix |
Source: 2oM46LNCOo.exe, 00000002.00000003.1438546515.00000000015A4000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1425834485.00000000015A4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/pi |
Source: 2oM46LNCOo.exe, 00000002.00000003.1451859378.00000000015A4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/piN |
Source: 2oM46LNCOo.exe, 00000002.00000003.1368269136.0000000005D47000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1370014291.0000000005D52000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1438703314.0000000005D52000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1426026271.0000000005D4F000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1344435777.0000000005D49000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1372032271.0000000005D52000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1368343590.0000000005D4F000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1374948031.0000000005D52000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1375451426.0000000005D52000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat:443/api |
Source: 2oM46LNCOo.exe, 00000002.00000002.1890146207.0000000005D5F000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574459178.0000000001596000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574238846.0000000005D41000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.prod-east.frontend.public.atl-paas.net |
Source: 2oM46LNCOo.exe, 00000002.00000002.1890146207.0000000005D5F000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574459178.0000000001596000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574238846.0000000005D41000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net |
Source: 2oM46LNCOo.exe, 00000002.00000003.1375030220.0000000005E6E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: 2oM46LNCOo.exe, 00000002.00000003.1375030220.0000000005E6E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: 2oM46LNCOo.exe, 00000002.00000003.1574302041.000000000158E000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574485157.0000000005D5F000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574485157.0000000005D4F000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1890146207.0000000005D5F000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574459178.0000000001596000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1574238846.0000000005D41000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website |
Source: 2oM46LNCOo.exe, 00000002.00000003.1375451426.0000000005D4F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0 |
Source: 2oM46LNCOo.exe, 00000002.00000003.1319992084.0000000005D8B000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1319900927.0000000005D8B000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1319831966.0000000005D8E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: 2oM46LNCOo.exe, 00000002.00000002.1886070092.0000000001527000.00000004.00000020.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000002.1886412666.0000000001597000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: 2oM46LNCOo.exe, 00000002.00000003.1319992084.0000000005D8B000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1319900927.0000000005D8B000.00000004.00000800.00020000.00000000.sdmp, 2oM46LNCOo.exe, 00000002.00000003.1319831966.0000000005D8E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: 2oM46LNCOo.exe, 00000002.00000003.1375451426.0000000005D4F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u |
Source: 2oM46LNCOo.exe, 00000002.00000003.1375030220.0000000005E6E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.jXqaKJMO4ZEP |
Source: 2oM46LNCOo.exe, 00000002.00000003.1375030220.0000000005E6E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.NYz0wxyUaYSW |
Source: 2oM46LNCOo.exe, 00000002.00000003.1375030220.0000000005E6E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/gro.allizom.www.d |
Source: 2oM46LNCOo.exe, 00000002.00000003.1375030220.0000000005E6E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: 2oM46LNCOo.exe, 00000002.00000003.1375030220.0000000005E6E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AC4B2 second address: 9AC4DF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F6E9D0B3546h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jbe 00007F6E9D0B3538h 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 push edi 0x00000019 pop edi 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AC4DF second address: 9AC4E3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AC4E3 second address: 9AC4E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AC4E9 second address: 9AC50F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6E9CE0442Bh 0x00000009 jmp 00007F6E9CE04437h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AC50F second address: 9AC519 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AC6A0 second address: 9AC6AB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnp 00007F6E9CE04426h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AC970 second address: 9AC9A7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B353Ah 0x00000007 jmp 00007F6E9D0B3544h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop eax 0x0000000f jnc 00007F6E9D0B3554h 0x00000015 push eax 0x00000016 push edx 0x00000017 jnl 00007F6E9D0B3536h 0x0000001d jne 00007F6E9D0B3536h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AC9A7 second address: 9AC9B1 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F6E9CE04426h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9A21E3 second address: 9A21F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6E9D0B353Ah 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9ACB0F second address: 9ACB13 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9ACB13 second address: 9ACB19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9ACB19 second address: 9ACB1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF1B1 second address: 9AF1B6 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF1B6 second address: 9AF1C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 push esi 0x00000011 pop esi 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF1C9 second address: 9AF1CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF1CF second address: 9AF1E3 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a push eax 0x0000000b push edx 0x0000000c jc 00007F6E9CE04428h 0x00000012 push edx 0x00000013 pop edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF288 second address: 9AF28D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF28D second address: 9AF2B2 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F6E9CE0442Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b mov dword ptr [ebp+122D30C6h], eax 0x00000011 push 00000000h 0x00000013 mov dl, ACh 0x00000015 push B877693Dh 0x0000001a push esi 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF2B2 second address: 9AF2B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF2B6 second address: 9AF362 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F6E9CE04426h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop esi 0x0000000b add dword ptr [esp], 47889743h 0x00000012 mov edi, dword ptr [ebp+122D1CC5h] 0x00000018 push 00000003h 0x0000001a push 00000000h 0x0000001c push ecx 0x0000001d call 00007F6E9CE04428h 0x00000022 pop ecx 0x00000023 mov dword ptr [esp+04h], ecx 0x00000027 add dword ptr [esp+04h], 00000017h 0x0000002f inc ecx 0x00000030 push ecx 0x00000031 ret 0x00000032 pop ecx 0x00000033 ret 0x00000034 push 00000000h 0x00000036 pushad 0x00000037 mov dword ptr [ebp+122D22AAh], esi 0x0000003d jg 00007F6E9CE0442Ch 0x00000043 popad 0x00000044 push 00000003h 0x00000046 push ecx 0x00000047 movzx edi, cx 0x0000004a pop ecx 0x0000004b push 5B8EBE15h 0x00000050 jmp 00007F6E9CE04439h 0x00000055 add dword ptr [esp], 647141EBh 0x0000005c jmp 00007F6E9CE04434h 0x00000061 mov edx, dword ptr [ebp+122D2D89h] 0x00000067 lea ebx, dword ptr [ebp+1245A0E8h] 0x0000006d mov edi, dword ptr [ebp+122D2F5Dh] 0x00000073 push eax 0x00000074 push eax 0x00000075 push edx 0x00000076 jne 00007F6E9CE04428h 0x0000007c rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF362 second address: 9AF368 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF368 second address: 9AF36C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF421 second address: 9AF425 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF425 second address: 9AF42B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF42B second address: 9AF430 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF430 second address: 9AF447 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 pushad 0x0000000a push eax 0x0000000b pop eax 0x0000000c jc 00007F6E9CE04426h 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF447 second address: 9AF484 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F6E9D0B3536h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c jmp 00007F6E9D0B3545h 0x00000011 push 00000000h 0x00000013 push eax 0x00000014 pop edx 0x00000015 call 00007F6E9D0B3539h 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F6E9D0B353Dh 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF484 second address: 9AF4AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jc 00007F6E9CE0443Ch 0x00000011 jmp 00007F6E9CE04436h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF4AB second address: 9AF5AD instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F6E9D0B353Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e push ecx 0x0000000f jmp 00007F6E9D0B3548h 0x00000014 pop ecx 0x00000015 mov eax, dword ptr [eax] 0x00000017 pushad 0x00000018 push edx 0x00000019 jmp 00007F6E9D0B3545h 0x0000001e pop edx 0x0000001f jmp 00007F6E9D0B3545h 0x00000024 popad 0x00000025 mov dword ptr [esp+04h], eax 0x00000029 jmp 00007F6E9D0B3546h 0x0000002e pop eax 0x0000002f jmp 00007F6E9D0B3548h 0x00000034 push 00000003h 0x00000036 push 00000000h 0x00000038 push eax 0x00000039 call 00007F6E9D0B3538h 0x0000003e pop eax 0x0000003f mov dword ptr [esp+04h], eax 0x00000043 add dword ptr [esp+04h], 0000001Ah 0x0000004b inc eax 0x0000004c push eax 0x0000004d ret 0x0000004e pop eax 0x0000004f ret 0x00000050 push 00000000h 0x00000052 mov dl, bh 0x00000054 push 00000003h 0x00000056 push esi 0x00000057 mov dword ptr [ebp+122D1DDDh], eax 0x0000005d pop esi 0x0000005e call 00007F6E9D0B3539h 0x00000063 jmp 00007F6E9D0B3549h 0x00000068 push eax 0x00000069 jmp 00007F6E9D0B353Ah 0x0000006e mov eax, dword ptr [esp+04h] 0x00000072 push eax 0x00000073 push edx 0x00000074 jbe 00007F6E9D0B353Ch 0x0000007a jnl 00007F6E9D0B3536h 0x00000080 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF5AD second address: 9AF5CD instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jl 00007F6E9CE04426h 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e jmp 00007F6E9CE0442Ah 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 pushad 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF5CD second address: 9AF61E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007F6E9D0B3547h 0x0000000a popad 0x0000000b pop eax 0x0000000c push 00000000h 0x0000000e push edx 0x0000000f call 00007F6E9D0B3538h 0x00000014 pop edx 0x00000015 mov dword ptr [esp+04h], edx 0x00000019 add dword ptr [esp+04h], 0000001Ch 0x00000021 inc edx 0x00000022 push edx 0x00000023 ret 0x00000024 pop edx 0x00000025 ret 0x00000026 lea ebx, dword ptr [ebp+1245A0F1h] 0x0000002c mov cl, 45h 0x0000002e push eax 0x0000002f push eax 0x00000030 push edx 0x00000031 push eax 0x00000032 push edx 0x00000033 push eax 0x00000034 push edx 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF61E second address: 9AF622 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF622 second address: 9AF62C instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F6E9D0B3536h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF679 second address: 9AF67E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF79C second address: 9AF7BE instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push esi 0x00000004 pop esi 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jmp 00007F6E9D0B353Fh 0x00000011 jnp 00007F6E9D0B3536h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9AF7BE second address: 9AF7C8 instructions: 0x00000000 rdtsc 0x00000002 je 00007F6E9CE0442Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9D016A second address: 9D0174 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F6E9D0B3555h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9D0174 second address: 9D0197 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6E9CE04439h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9D0197 second address: 9D01CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 jmp 00007F6E9D0B353Fh 0x0000000c jmp 00007F6E9D0B3548h 0x00000011 jp 00007F6E9D0B353Ch 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9CE9C6 second address: 9CE9CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9CE9CC second address: 9CE9D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9CE9D0 second address: 9CE9E0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE0442Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9CE9E0 second address: 9CE9F5 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F6E9D0B353Ah 0x00000008 push ecx 0x00000009 jng 00007F6E9D0B3536h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9CF059 second address: 9CF074 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push edx 0x00000006 pop edx 0x00000007 jc 00007F6E9CE04426h 0x0000000d popad 0x0000000e pushad 0x0000000f push edi 0x00000010 pop edi 0x00000011 jnl 00007F6E9CE04426h 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9CF074 second address: 9CF09C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F6E9D0B353Ch 0x0000000e push eax 0x0000000f jmp 00007F6E9D0B3541h 0x00000014 pop eax 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9CF936 second address: 9CF94F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE0442Dh 0x00000007 push eax 0x00000008 push edx 0x00000009 jnc 00007F6E9CE04426h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9CF94F second address: 9CF953 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9CFA9C second address: 9CFAA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9CFBDE second address: 9CFBF8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B3543h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9D4676 second address: 9D46B7 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edi 0x0000000a jmp 00007F6E9CE04439h 0x0000000f pop edi 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 push eax 0x00000015 jmp 00007F6E9CE0442Ch 0x0000001a pop eax 0x0000001b mov eax, dword ptr [eax] 0x0000001d pushad 0x0000001e push eax 0x0000001f push edx 0x00000020 jg 00007F6E9CE04426h 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9D46B7 second address: 9D46DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B3544h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a pushad 0x0000000b popad 0x0000000c pop esi 0x0000000d popad 0x0000000e mov dword ptr [esp+04h], eax 0x00000012 pushad 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9D46DC second address: 9D46E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9D2F95 second address: 9D2F9A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9D47EF second address: 9D47F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9D47F3 second address: 9D47F9 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9D47F9 second address: 9D480D instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a push eax 0x0000000b push edx 0x0000000c jnl 00007F6E9CE04428h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9D480D second address: 9D483B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007F6E9D0B3536h 0x00000009 jmp 00007F6E9D0B353Bh 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 push eax 0x00000016 push edx 0x00000017 push esi 0x00000018 jmp 00007F6E9D0B353Fh 0x0000001d pop esi 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9D4980 second address: 9D4984 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9D4984 second address: 9D498A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9D6DF4 second address: 9D6E29 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F6E9CE0442Eh 0x00000008 jmp 00007F6E9CE0442Fh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F6E9CE04430h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9D6E29 second address: 9D6E52 instructions: 0x00000000 rdtsc 0x00000002 js 00007F6E9D0B3536h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b je 00007F6E9D0B3536h 0x00000011 jmp 00007F6E9D0B3546h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9D6E52 second address: 9D6E57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9D6E57 second address: 9D6E6D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6E9D0B3542h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9D6E6D second address: 9D6E71 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 99EAA4 second address: 99EAAE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F6E9D0B3536h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 99EAAE second address: 99EABC instructions: 0x00000000 rdtsc 0x00000002 ja 00007F6E9CE04426h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 99EABC second address: 99EAC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 99EAC0 second address: 99EAC4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 99EAC4 second address: 99EACD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DAF94 second address: 9DAFB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F6E9CE04426h 0x0000000a jmp 00007F6E9CE0442Fh 0x0000000f popad 0x00000010 pushad 0x00000011 push edx 0x00000012 pop edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DAFB3 second address: 9DAFC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F6E9D0B3536h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DAFC2 second address: 9DAFC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DB165 second address: 9DB16D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DB555 second address: 9DB55B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DB68D second address: 9DB69D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F6E9D0B3536h 0x0000000a popad 0x0000000b pushad 0x0000000c push esi 0x0000000d pop esi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DB69D second address: 9DB6AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a pop eax 0x0000000b jc 00007F6E9CE04426h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DB6AE second address: 9DB6E4 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F6E9D0B3536h 0x00000008 jmp 00007F6E9D0B3549h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 jns 00007F6E9D0B353Ch 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DB6E4 second address: 9DB6EC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DB6EC second address: 9DB70B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6E9D0B3549h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DB70B second address: 9DB726 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE04431h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DB726 second address: 9DB72A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DD849 second address: 9DD855 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DD855 second address: 9DD85C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DD914 second address: 9DD918 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DD918 second address: 9DD91E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DD91E second address: 9DD933 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F6E9CE0442Ch 0x00000008 jno 00007F6E9CE04426h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 pushad 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DD933 second address: 9DD93C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DD93C second address: 9DD968 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F6E9CE04426h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f pushad 0x00000010 jne 00007F6E9CE0442Ch 0x00000016 jc 00007F6E9CE04428h 0x0000001c pushad 0x0000001d popad 0x0000001e popad 0x0000001f mov eax, dword ptr [eax] 0x00000021 pushad 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DD968 second address: 9DD96C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DE596 second address: 9DE5ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 jmp 00007F6E9CE04432h 0x0000000a xchg eax, ebx 0x0000000b push 00000000h 0x0000000d push ecx 0x0000000e call 00007F6E9CE04428h 0x00000013 pop ecx 0x00000014 mov dword ptr [esp+04h], ecx 0x00000018 add dword ptr [esp+04h], 00000019h 0x00000020 inc ecx 0x00000021 push ecx 0x00000022 ret 0x00000023 pop ecx 0x00000024 ret 0x00000025 mov dword ptr [ebp+122D327Bh], ebx 0x0000002b nop 0x0000002c push eax 0x0000002d push edx 0x0000002e jmp 00007F6E9CE04435h 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DE76B second address: 9DE76F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DEA9A second address: 9DEA9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DEA9E second address: 9DEAA2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DEAA2 second address: 9DEAB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jnc 00007F6E9CE04426h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DEAB1 second address: 9DEAC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 pushad 0x00000009 jnl 00007F6E9D0B3536h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DF043 second address: 9DF0C3 instructions: 0x00000000 rdtsc 0x00000002 je 00007F6E9CE04428h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f push 00000000h 0x00000011 push eax 0x00000012 call 00007F6E9CE04428h 0x00000017 pop eax 0x00000018 mov dword ptr [esp+04h], eax 0x0000001c add dword ptr [esp+04h], 00000016h 0x00000024 inc eax 0x00000025 push eax 0x00000026 ret 0x00000027 pop eax 0x00000028 ret 0x00000029 pushad 0x0000002a mov esi, dword ptr [ebp+122D2EE1h] 0x00000030 sub bx, 3730h 0x00000035 popad 0x00000036 mov dword ptr [ebp+122D1D3Ah], eax 0x0000003c push 00000000h 0x0000003e mov dword ptr [ebp+122D243Dh], ecx 0x00000044 push 00000000h 0x00000046 push 00000000h 0x00000048 push eax 0x00000049 call 00007F6E9CE04428h 0x0000004e pop eax 0x0000004f mov dword ptr [esp+04h], eax 0x00000053 add dword ptr [esp+04h], 0000001Bh 0x0000005b inc eax 0x0000005c push eax 0x0000005d ret 0x0000005e pop eax 0x0000005f ret 0x00000060 mov dword ptr [ebp+122D1D3Ah], ebx 0x00000066 jnp 00007F6E9CE04426h 0x0000006c push eax 0x0000006d push eax 0x0000006e push edx 0x0000006f push eax 0x00000070 push edx 0x00000071 push eax 0x00000072 push edx 0x00000073 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DF0C3 second address: 9DF0C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DF0C7 second address: 9DF0CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DF0CB second address: 9DF0D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DFA3C second address: 9DFA42 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DF85E second address: 9DF864 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DFA42 second address: 9DFA47 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9E09F9 second address: 9E09FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9E09FD second address: 9E0A07 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F6E9CE04426h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9E0A07 second address: 9E0A11 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F6E9D0B3536h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9E158A second address: 9E1598 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 ja 00007F6E9CE04426h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9E1E99 second address: 9E1E9E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9E12DA second address: 9E12F8 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F6E9CE04426h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F6E9CE04432h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9E3332 second address: 9E333A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9E3D4E second address: 9E3D8F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 pushad 0x00000008 popad 0x00000009 pop ebx 0x0000000a popad 0x0000000b mov dword ptr [esp], eax 0x0000000e mov si, B983h 0x00000012 push 00000000h 0x00000014 push 00000000h 0x00000016 push ebp 0x00000017 call 00007F6E9CE04428h 0x0000001c pop ebp 0x0000001d mov dword ptr [esp+04h], ebp 0x00000021 add dword ptr [esp+04h], 00000014h 0x00000029 inc ebp 0x0000002a push ebp 0x0000002b ret 0x0000002c pop ebp 0x0000002d ret 0x0000002e mov si, dx 0x00000031 push 00000000h 0x00000033 mov esi, dword ptr [ebp+122D2CF1h] 0x00000039 push eax 0x0000003a pushad 0x0000003b push eax 0x0000003c push edx 0x0000003d push edi 0x0000003e pop edi 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9E3D8F second address: 9E3D93 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9E7E92 second address: 9E7F13 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 jo 00007F6E9CE04447h 0x0000000e nop 0x0000000f jp 00007F6E9CE0442Ch 0x00000015 sub ebx, dword ptr [ebp+122D1D44h] 0x0000001b push 00000000h 0x0000001d push 00000000h 0x0000001f push esi 0x00000020 call 00007F6E9CE04428h 0x00000025 pop esi 0x00000026 mov dword ptr [esp+04h], esi 0x0000002a add dword ptr [esp+04h], 0000001Dh 0x00000032 inc esi 0x00000033 push esi 0x00000034 ret 0x00000035 pop esi 0x00000036 ret 0x00000037 push 00000000h 0x00000039 xchg eax, esi 0x0000003a jl 00007F6E9CE0443Fh 0x00000040 push eax 0x00000041 push edx 0x00000042 jmp 00007F6E9CE0442Dh 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9E7F13 second address: 9E7F17 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9E30E9 second address: 9E3106 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F6E9CE04433h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9E3106 second address: 9E3114 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F6E9D0B3536h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9EBBF8 second address: 9EBC14 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6E9CE04438h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9EEE3B second address: 9EEE65 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B3549h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jns 00007F6E9D0B3536h 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9EFF48 second address: 9EFF4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9EFF4C second address: 9EFF6C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B3546h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a push eax 0x0000000b push esi 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9EFF6C second address: 9F000B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop esi 0x00000006 nop 0x00000007 jmp 00007F6E9CE04439h 0x0000000c push 00000000h 0x0000000e jmp 00007F6E9CE04434h 0x00000013 jnc 00007F6E9CE04436h 0x00000019 push 00000000h 0x0000001b push 00000000h 0x0000001d push ebp 0x0000001e call 00007F6E9CE04428h 0x00000023 pop ebp 0x00000024 mov dword ptr [esp+04h], ebp 0x00000028 add dword ptr [esp+04h], 0000001Dh 0x00000030 inc ebp 0x00000031 push ebp 0x00000032 ret 0x00000033 pop ebp 0x00000034 ret 0x00000035 jmp 00007F6E9CE04431h 0x0000003a mov edi, dword ptr [ebp+122D1C8Ah] 0x00000040 xchg eax, esi 0x00000041 push eax 0x00000042 push edx 0x00000043 pushad 0x00000044 jmp 00007F6E9CE0442Ah 0x00000049 jg 00007F6E9CE04426h 0x0000004f popad 0x00000050 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9F000B second address: 9F0012 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9F0012 second address: 9F0024 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b jno 00007F6E9CE04426h 0x00000011 pop edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9F0EC2 second address: 9F0F39 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnp 00007F6E9D0B3536h 0x00000009 jns 00007F6E9D0B3536h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 mov dword ptr [esp], eax 0x00000015 push 00000000h 0x00000017 push edi 0x00000018 call 00007F6E9D0B3538h 0x0000001d pop edi 0x0000001e mov dword ptr [esp+04h], edi 0x00000022 add dword ptr [esp+04h], 00000015h 0x0000002a inc edi 0x0000002b push edi 0x0000002c ret 0x0000002d pop edi 0x0000002e ret 0x0000002f mov edi, dword ptr [ebp+122D2C19h] 0x00000035 push 00000000h 0x00000037 push 00000000h 0x00000039 push ebp 0x0000003a call 00007F6E9D0B3538h 0x0000003f pop ebp 0x00000040 mov dword ptr [esp+04h], ebp 0x00000044 add dword ptr [esp+04h], 0000001Ah 0x0000004c inc ebp 0x0000004d push ebp 0x0000004e ret 0x0000004f pop ebp 0x00000050 ret 0x00000051 push 00000000h 0x00000053 mov bx, 316Ah 0x00000057 mov dword ptr [ebp+12459552h], edx 0x0000005d xchg eax, esi 0x0000005e jl 00007F6E9D0B3542h 0x00000064 jng 00007F6E9D0B353Ch 0x0000006a push eax 0x0000006b push edx 0x0000006c rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9F1EDB second address: 9F1EE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9F1EE0 second address: 9F1F32 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B353Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c mov edi, 2231C4BFh 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push esi 0x00000016 call 00007F6E9D0B3538h 0x0000001b pop esi 0x0000001c mov dword ptr [esp+04h], esi 0x00000020 add dword ptr [esp+04h], 0000001Ch 0x00000028 inc esi 0x00000029 push esi 0x0000002a ret 0x0000002b pop esi 0x0000002c ret 0x0000002d mov bh, 98h 0x0000002f push 00000000h 0x00000031 movsx edi, ax 0x00000034 xchg eax, esi 0x00000035 push eax 0x00000036 push edx 0x00000037 jo 00007F6E9D0B353Ch 0x0000003d push eax 0x0000003e push edx 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9F1F32 second address: 9F1F36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9F1F36 second address: 9F1F3B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9F2DF2 second address: 9F2DF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9F2DF9 second address: 9F2E6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 sub bh, FFFFFFA6h 0x0000000c sbb edi, 51AB444Eh 0x00000012 push 00000000h 0x00000014 push 00000000h 0x00000016 push edx 0x00000017 call 00007F6E9D0B3538h 0x0000001c pop edx 0x0000001d mov dword ptr [esp+04h], edx 0x00000021 add dword ptr [esp+04h], 00000017h 0x00000029 inc edx 0x0000002a push edx 0x0000002b ret 0x0000002c pop edx 0x0000002d ret 0x0000002e add dword ptr [ebp+122D252Fh], ebx 0x00000034 push 00000000h 0x00000036 push 00000000h 0x00000038 push esi 0x00000039 call 00007F6E9D0B3538h 0x0000003e pop esi 0x0000003f mov dword ptr [esp+04h], esi 0x00000043 add dword ptr [esp+04h], 00000016h 0x0000004b inc esi 0x0000004c push esi 0x0000004d ret 0x0000004e pop esi 0x0000004f ret 0x00000050 xchg eax, esi 0x00000051 push eax 0x00000052 push edx 0x00000053 jnc 00007F6E9D0B3548h 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9F2E6D second address: 9F2E72 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9F4AED second address: 9F4B08 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F6E9D0B3540h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9F4B08 second address: 9F4B5B instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 jc 00007F6E9CE04426h 0x0000000d pop esi 0x0000000e popad 0x0000000f nop 0x00000010 sub dword ptr [ebp+122D1CE4h], esi 0x00000016 push 00000000h 0x00000018 push 00000000h 0x0000001a push esi 0x0000001b call 00007F6E9CE04428h 0x00000020 pop esi 0x00000021 mov dword ptr [esp+04h], esi 0x00000025 add dword ptr [esp+04h], 0000001Ch 0x0000002d inc esi 0x0000002e push esi 0x0000002f ret 0x00000030 pop esi 0x00000031 ret 0x00000032 push 00000000h 0x00000034 jnl 00007F6E9CE0442Bh 0x0000003a mov bx, dx 0x0000003d xchg eax, esi 0x0000003e push eax 0x0000003f push edx 0x00000040 push eax 0x00000041 push edx 0x00000042 push ecx 0x00000043 pop ecx 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9F4B5B second address: 9F4B61 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9F4B61 second address: 9F4B6B instructions: 0x00000000 rdtsc 0x00000002 jp 00007F6E9CE0442Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9E8F97 second address: 9E8FB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b jmp 00007F6E9D0B3544h 0x00000010 pop edi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9E8FB7 second address: 9E8FC1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F6E9CE04426h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9EADE2 second address: 9EADE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9EADE7 second address: 9EADF1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F6E9CE04426h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9EADF1 second address: 9EADFE instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push ecx 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9ECF6D second address: 9ECF73 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9FCD16 second address: 9FCD1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9FCD1A second address: 9FCD46 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE04438h 0x00000007 jng 00007F6E9CE04426h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop ebx 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 jo 00007F6E9CE04426h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9FCD46 second address: 9FCD96 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F6E9D0B3536h 0x00000008 jg 00007F6E9D0B3536h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jmp 00007F6E9D0B3548h 0x00000015 jmp 00007F6E9D0B3542h 0x0000001a push eax 0x0000001b push edx 0x0000001c je 00007F6E9D0B3536h 0x00000022 jmp 00007F6E9D0B353Eh 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9FECCA second address: 9FECCE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9FECCE second address: 9FED04 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B3548h 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007F6E9D0B3545h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9EDF74 second address: 9EDF98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 pop ecx 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F6E9CE04439h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9EEFFB second address: 9EF009 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B353Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A01245 second address: A0124F instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F6E9CE04426h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A0124F second address: A0125A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pushad 0x00000006 popad 0x00000007 pop ebx 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9F30AE second address: 9F30CB instructions: 0x00000000 rdtsc 0x00000002 jno 00007F6E9CE0442Ch 0x00000008 jnl 00007F6E9CE04426h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F6E9CE0442Ah 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9F30CB second address: 9F30D0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9F30D0 second address: 9F30D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A054A2 second address: A054A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A054A8 second address: A054AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A05770 second address: A05774 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A05774 second address: A0577A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A090B1 second address: A090D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6E9D0B353Bh 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F6E9D0B3543h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A090D5 second address: A090DB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A090DB second address: A090E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A090E1 second address: A090EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push esi 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A090EA second address: A09129 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F6E9D0B3543h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007F6E9D0B3546h 0x00000012 push eax 0x00000013 push edx 0x00000014 je 00007F6E9D0B3536h 0x0000001a jnp 00007F6E9D0B3536h 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A09790 second address: A09796 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A09909 second address: A09922 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F6E9D0B3542h 0x00000008 pushad 0x00000009 push eax 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A09922 second address: A09928 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A09BFA second address: A09BFF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A09BFF second address: A09C07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A0A155 second address: A0A15B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A0A15B second address: A0A181 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F6E9CE04431h 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f pop ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 jc 00007F6E9CE0442Ch 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A0A181 second address: A0A196 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6E9D0B3541h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A0A196 second address: A0A19C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A0A19C second address: A0A1A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A0F323 second address: A0F32E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F6E9CE04426h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A0F7BA second address: A0F7C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A102C2 second address: A102C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A102C6 second address: A102D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a je 00007F6E9D0B3536h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A102D8 second address: A102DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A102DC second address: A102FA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B3548h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A102FA second address: A1030E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push edx 0x00000004 pop edx 0x00000005 jp 00007F6E9CE04426h 0x0000000b pop esi 0x0000000c jng 00007F6E9CE0442Ch 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A0F058 second address: A0F05E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A1A310 second address: A1A314 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A1A314 second address: A1A337 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6E9D0B3549h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A1939D second address: A193A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F6E9CE04426h 0x0000000a pop ecx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A193A8 second address: A193AD instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A193AD second address: A193D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push esi 0x00000008 jnc 00007F6E9CE0442Ah 0x0000000e pushad 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 jmp 00007F6E9CE0442Eh 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A197EC second address: A197F0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A19BE7 second address: A19BF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F6E9CE04426h 0x0000000a pop edx 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A213D0 second address: A213D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DC025 second address: 9DC096 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE04432h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push edi 0x0000000b pop edi 0x0000000c jmp 00007F6E9CE0442Bh 0x00000011 popad 0x00000012 popad 0x00000013 mov dword ptr [esp], eax 0x00000016 push 00000000h 0x00000018 push esi 0x00000019 call 00007F6E9CE04428h 0x0000001e pop esi 0x0000001f mov dword ptr [esp+04h], esi 0x00000023 add dword ptr [esp+04h], 00000016h 0x0000002b inc esi 0x0000002c push esi 0x0000002d ret 0x0000002e pop esi 0x0000002f ret 0x00000030 sub dword ptr [ebp+122D3034h], esi 0x00000036 lea eax, dword ptr [ebp+12486D82h] 0x0000003c mov cx, E79Ah 0x00000040 nop 0x00000041 push eax 0x00000042 push edx 0x00000043 push eax 0x00000044 push edx 0x00000045 jmp 00007F6E9CE04435h 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DC096 second address: 9DC09C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DC09C second address: 9C48C4 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b jmp 00007F6E9CE0442Fh 0x00000010 jmp 00007F6E9CE0442Fh 0x00000015 popad 0x00000016 pop edx 0x00000017 nop 0x00000018 mov edi, 501BED17h 0x0000001d mov ecx, esi 0x0000001f call dword ptr [ebp+122D2FCFh] 0x00000025 push ecx 0x00000026 push eax 0x00000027 push edx 0x00000028 push ebx 0x00000029 pop ebx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DC18F second address: 9DC1AD instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 je 00007F6E9D0B3538h 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jbe 00007F6E9D0B353Ch 0x00000018 jnp 00007F6E9D0B3536h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DC840 second address: 9DC844 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DD036 second address: 9DD03A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DD03A second address: 9DD05F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE04430h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebx 0x0000000a mov dword ptr [esp], eax 0x0000000d mov dx, 5CDCh 0x00000011 push 0000001Eh 0x00000013 push eax 0x00000014 push eax 0x00000015 push edx 0x00000016 push ecx 0x00000017 pushad 0x00000018 popad 0x00000019 pop ecx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DD1B1 second address: 9DD1D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007F6E9D0B3548h 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DD47B second address: 9DD499 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jmp 00007F6E9CE0442Dh 0x0000000f jc 00007F6E9CE04426h 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DD499 second address: 9DD502 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F6E9D0B3546h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b mov cx, 3D0Dh 0x0000000f lea eax, dword ptr [ebp+12486DC6h] 0x00000015 push 00000000h 0x00000017 push ecx 0x00000018 call 00007F6E9D0B3538h 0x0000001d pop ecx 0x0000001e mov dword ptr [esp+04h], ecx 0x00000022 add dword ptr [esp+04h], 0000001Dh 0x0000002a inc ecx 0x0000002b push ecx 0x0000002c ret 0x0000002d pop ecx 0x0000002e ret 0x0000002f mov dword ptr [ebp+122D303Ah], esi 0x00000035 push eax 0x00000036 pushad 0x00000037 push eax 0x00000038 push edx 0x00000039 jmp 00007F6E9D0B3545h 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DD502 second address: 9DD506 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DD506 second address: 9C53E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop esi 0x0000000a popad 0x0000000b mov dword ptr [esp], eax 0x0000000e push ebx 0x0000000f mov dx, bx 0x00000012 pop edx 0x00000013 lea eax, dword ptr [ebp+12486D82h] 0x00000019 adc cx, 3FA6h 0x0000001e nop 0x0000001f jmp 00007F6E9D0B353Eh 0x00000024 push eax 0x00000025 jmp 00007F6E9D0B3549h 0x0000002a nop 0x0000002b xor di, BDD5h 0x00000030 call dword ptr [ebp+12464179h] 0x00000036 push ecx 0x00000037 jmp 00007F6E9D0B3548h 0x0000003c pop ecx 0x0000003d pushad 0x0000003e pushad 0x0000003f jno 00007F6E9D0B3536h 0x00000045 push eax 0x00000046 push edx 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A20679 second address: A2067E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A20E78 second address: A20E95 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B3549h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 99D08C second address: 99D092 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A23F1C second address: A23F44 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 ja 00007F6E9D0B3536h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 jmp 00007F6E9D0B3548h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A2409D second address: A240B9 instructions: 0x00000000 rdtsc 0x00000002 je 00007F6E9CE04426h 0x00000008 jns 00007F6E9CE04426h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 jns 00007F6E9CE04426h 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9A061C second address: 9A0628 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push esi 0x00000006 push eax 0x00000007 pop eax 0x00000008 pop esi 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A2B281 second address: A2B285 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A2B6E8 second address: A2B6EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A2B6EF second address: A2B717 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007F6E9CE0442Fh 0x00000008 jmp 00007F6E9CE04432h 0x0000000d pop ecx 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A2B9F2 second address: A2B9F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A2B9F6 second address: A2BA5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F6E9CE04434h 0x0000000b je 00007F6E9CE0442Eh 0x00000011 jo 00007F6E9CE04426h 0x00000017 push edi 0x00000018 pop edi 0x00000019 push esi 0x0000001a jmp 00007F6E9CE0442Ch 0x0000001f pop esi 0x00000020 popad 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 jbe 00007F6E9CE04426h 0x0000002a jns 00007F6E9CE04426h 0x00000030 jmp 00007F6E9CE04430h 0x00000035 popad 0x00000036 jno 00007F6E9CE04432h 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 99809A second address: 9980A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c pop eax 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A2E407 second address: A2E46C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE04432h 0x00000007 jmp 00007F6E9CE0442Ch 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jmp 00007F6E9CE04439h 0x00000013 jns 00007F6E9CE0442Ah 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f popad 0x00000020 jmp 00007F6E9CE04439h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A2E46C second address: A2E470 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A2E470 second address: A2E48C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F6E9CE04426h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f jbe 00007F6E9CE04426h 0x00000015 jc 00007F6E9CE04426h 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A2E48C second address: A2E4A6 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007F6E9D0B3545h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A2E7E9 second address: A2E7ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A34460 second address: A34481 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F6E9D0B3549h 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A34481 second address: A34487 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A34487 second address: A34499 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 jmp 00007F6E9D0B353Ah 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A330D9 second address: A330EC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE0442Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3321C second address: A33220 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A33220 second address: A33226 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A33226 second address: A3322C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3322C second address: A33247 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6E9CE04437h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A33247 second address: A33261 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B3542h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A33261 second address: A33265 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A33515 second address: A3351B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3351B second address: A33539 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edi 0x00000008 pushad 0x00000009 ja 00007F6E9CE04431h 0x0000000f jmp 00007F6E9CE0442Bh 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A33539 second address: A3353D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 9DCE65 second address: 9DCEBA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE0442Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push edx 0x00000010 call 00007F6E9CE04428h 0x00000015 pop edx 0x00000016 mov dword ptr [esp+04h], edx 0x0000001a add dword ptr [esp+04h], 00000016h 0x00000022 inc edx 0x00000023 push edx 0x00000024 ret 0x00000025 pop edx 0x00000026 ret 0x00000027 mov edi, dword ptr [ebp+122D2E85h] 0x0000002d mov ebx, dword ptr [ebp+12486DC1h] 0x00000033 add edi, dword ptr [ebp+122D2F59h] 0x00000039 add eax, ebx 0x0000003b mov dword ptr [ebp+122D1DE3h], ebx 0x00000041 push eax 0x00000042 push eax 0x00000043 push edx 0x00000044 pushad 0x00000045 pushad 0x00000046 popad 0x00000047 push esi 0x00000048 pop esi 0x00000049 popad 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A336A3 second address: A336A9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3C645 second address: A3C64B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3C64B second address: A3C651 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3C651 second address: A3C672 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F6E9CE04431h 0x0000000a push ecx 0x0000000b jo 00007F6E9CE04426h 0x00000011 pop ecx 0x00000012 push ebx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3A52E second address: A3A552 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jnc 00007F6E9D0B3536h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F6E9D0B3543h 0x00000014 push eax 0x00000015 pop eax 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3A552 second address: A3A565 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 pushad 0x0000000a popad 0x0000000b pop esi 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3A565 second address: A3A56F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F6E9D0B3536h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3A56F second address: A3A573 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3A573 second address: A3A58D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6E9D0B3544h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3A875 second address: A3A879 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3A879 second address: A3A891 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6E9D0B353Bh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f pushad 0x00000010 popad 0x00000011 pop edi 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3A891 second address: A3A897 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3A897 second address: A3A89B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3A89B second address: A3A8A5 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3A8A5 second address: A3A8AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3AB8A second address: A3ABC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push ebx 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007F6E9CE0442Dh 0x0000000d pop ebx 0x0000000e jmp 00007F6E9CE04438h 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 jl 00007F6E9CE04426h 0x0000001d pop eax 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3ABC3 second address: A3ABDD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6E9D0B3544h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3ABDD second address: A3ABE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3B455 second address: A3B466 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B353Dh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3B466 second address: A3B47A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F6E9CE0442Bh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3B47A second address: A3B49E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pop ebx 0x00000008 pushad 0x00000009 jnc 00007F6E9D0B353Ah 0x0000000f push ebx 0x00000010 jmp 00007F6E9D0B353Eh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3BD14 second address: A3BD35 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F6E9CE04439h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A3BD35 second address: A3BD3C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A45F89 second address: A45FC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F6E9CE04426h 0x0000000a jmp 00007F6E9CE04435h 0x0000000f popad 0x00000010 pushad 0x00000011 jmp 00007F6E9CE04438h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A45FC4 second address: A45FF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 jmp 00007F6E9D0B3548h 0x0000000c jmp 00007F6E9D0B353Bh 0x00000011 push edi 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A453F2 second address: A453F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A453F6 second address: A4541A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B353Bh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F6E9D0B3541h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A4541A second address: A4541E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A4541E second address: A4542A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A4542A second address: A45450 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F6E9CE04426h 0x0000000a popad 0x0000000b push ebx 0x0000000c jmp 00007F6E9CE04438h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A45450 second address: A45455 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A459B9 second address: A459C5 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a push esi 0x0000000b pop esi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A45CA7 second address: A45CDD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 pushad 0x00000008 push ebx 0x00000009 jmp 00007F6E9D0B353Bh 0x0000000e jmp 00007F6E9D0B3540h 0x00000013 pop ebx 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F6E9D0B353Dh 0x0000001b push eax 0x0000001c pop eax 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A4766D second address: A47682 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F6E9CE0442Eh 0x00000008 push eax 0x00000009 pop eax 0x0000000a jbe 00007F6E9CE04426h 0x00000010 push edi 0x00000011 push edx 0x00000012 pop edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A48AFB second address: A48B01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A48B01 second address: A48B0F instructions: 0x00000000 rdtsc 0x00000002 jo 00007F6E9CE04426h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A48B0F second address: A48B13 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A4FB15 second address: A4FB1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A500F2 second address: A5011B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B353Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jc 00007F6E9D0B3538h 0x00000010 push edi 0x00000011 pop edi 0x00000012 push edi 0x00000013 jmp 00007F6E9D0B353Ch 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A503BA second address: A503C9 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 pop eax 0x00000007 pop edi 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A503C9 second address: A503D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A503D1 second address: A503DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A503DA second address: A503E0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A503E0 second address: A503E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push edi 0x00000007 pop edi 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A506C9 second address: A506CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A5083D second address: A50841 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A50841 second address: A50859 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B353Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jp 00007F6E9D0B3536h 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A4F704 second address: A4F714 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F6E9CE04426h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push edx 0x0000000f pop edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A4F714 second address: A4F718 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A56EA1 second address: A56EA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A56EA5 second address: A56EB3 instructions: 0x00000000 rdtsc 0x00000002 je 00007F6E9D0B3536h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A56EB3 second address: A56EB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A56EB7 second address: A56EF3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B3541h 0x00000007 jmp 00007F6E9D0B353Dh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop esi 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F6E9D0B3546h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A56EF3 second address: A56EF7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A56EF7 second address: A56F1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F6E9D0B3543h 0x0000000f jnc 00007F6E9D0B3536h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A56F1A second address: A56F2F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE04431h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A56F2F second address: A56F4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F6E9D0B353Fh 0x0000000c pushad 0x0000000d popad 0x0000000e jnl 00007F6E9D0B3536h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A59BA4 second address: A59BA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A59D07 second address: A59D0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A59D0D second address: A59D13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A64C0E second address: A64C1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jnc 00007F6E9D0B3536h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A64C1A second address: A64C1E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A6840B second address: A68420 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F6E9D0B3536h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f jnc 00007F6E9D0B3536h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A68420 second address: A68424 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A68424 second address: A6842D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A6A35B second address: A6A361 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A69EEC second address: A69EF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A85322 second address: A85328 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A85328 second address: A8533B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6E9D0B353Fh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A8533B second address: A85358 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE04439h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A854DA second address: A854DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A854DE second address: A854E4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A854E4 second address: A854FC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B353Ch 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a pop edx 0x0000000b jng 00007F6E9D0B3536h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A854FC second address: A8552A instructions: 0x00000000 rdtsc 0x00000002 jne 00007F6E9CE04426h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jno 00007F6E9CE04428h 0x00000013 jl 00007F6E9CE0443Dh 0x00000019 jmp 00007F6E9CE04431h 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A8552A second address: A85544 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F6E9D0B3542h 0x00000009 push eax 0x0000000a push edx 0x0000000b push edi 0x0000000c pop edi 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A856A8 second address: A856AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A856AE second address: A856C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jmp 00007F6E9D0B3541h 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A856C8 second address: A856CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A856CC second address: A856D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push edi 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A8599A second address: A859B6 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jmp 00007F6E9CE0442Eh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jg 00007F6E9CE0442Eh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A859B6 second address: A859BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A859BF second address: A859C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A85B36 second address: A85B3B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A880B8 second address: A880C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jnl 00007F6E9CE04426h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A880C4 second address: A880C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A8B762 second address: A8B769 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop ebx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A99AF3 second address: A99AF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A99AF9 second address: A99B0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F6E9CE04426h 0x0000000a popad 0x0000000b push edx 0x0000000c jns 00007F6E9CE04426h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A9B43D second address: A9B449 instructions: 0x00000000 rdtsc 0x00000002 je 00007F6E9D0B3536h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A9B449 second address: A9B44E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A95689 second address: A9568D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A9568D second address: A9569A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A9569A second address: A9569E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: A9569E second address: A956AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F6E9CE04426h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: ABD697 second address: ABD69B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: ABD69B second address: ABD6A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F6E9CE04426h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: ABD84B second address: ABD84F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: ABDC2E second address: ABDC34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: ABE03B second address: ABE03F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: ABE03F second address: ABE053 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 pushad 0x0000000a jnp 00007F6E9CE04426h 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: AC2830 second address: AC2836 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: AC2836 second address: AC28A3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE0442Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F6E9CE04430h 0x0000000f nop 0x00000010 push 00000000h 0x00000012 push ebp 0x00000013 call 00007F6E9CE04428h 0x00000018 pop ebp 0x00000019 mov dword ptr [esp+04h], ebp 0x0000001d add dword ptr [esp+04h], 0000001Bh 0x00000025 inc ebp 0x00000026 push ebp 0x00000027 ret 0x00000028 pop ebp 0x00000029 ret 0x0000002a push 00000004h 0x0000002c jmp 00007F6E9CE04430h 0x00000031 push A5936300h 0x00000036 push esi 0x00000037 pushad 0x00000038 jmp 00007F6E9CE0442Eh 0x0000003d push eax 0x0000003e push edx 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: AC2B54 second address: AC2B58 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: AC2B58 second address: AC2B71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b jno 00007F6E9CE04443h 0x00000011 push eax 0x00000012 push edx 0x00000013 jng 00007F6E9CE04426h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: AC2B71 second address: AC2B91 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B3541h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b push esi 0x0000000c je 00007F6E9D0B353Ch 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: AC2B91 second address: AC2BAE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 mov dword ptr [esp+04h], eax 0x00000009 pushad 0x0000000a pushad 0x0000000b jmp 00007F6E9CE04430h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: AC4102 second address: AC4142 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B353Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push ecx 0x0000000b jmp 00007F6E9D0B353Eh 0x00000010 push edx 0x00000011 pop edx 0x00000012 pop ecx 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 jnc 00007F6E9D0B3536h 0x0000001c jmp 00007F6E9D0B353Ah 0x00000021 push edx 0x00000022 pop edx 0x00000023 popad 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: AC4142 second address: AC4148 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 53F040B second address: 53F044F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B3541h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F6E9D0B3541h 0x0000000f xchg eax, ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F6E9D0B3548h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 53F044F second address: 53F0453 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 53F0453 second address: 53F0459 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 53F0459 second address: 53F04AE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dl, ch 0x00000005 pushfd 0x00000006 jmp 00007F6E9CE04439h 0x0000000b add al, 00000076h 0x0000000e jmp 00007F6E9CE04431h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 mov ebp, esp 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F6E9CE04438h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 53F04AE second address: 53F04B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 53F04B2 second address: 53F04B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 53F04B8 second address: 53F04CC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bl, ch 0x00000005 mov bx, D20Ch 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov edx, dword ptr [ebp+0Ch] 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 53F04CC second address: 53F04D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov dl, ch 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5410631 second address: 5410663 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B353Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F6E9D0B353Eh 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 call 00007F6E9D0B353Ah 0x0000001a pop esi 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5410663 second address: 5410669 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5410669 second address: 5410683 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B353Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov ax, bx 0x00000012 push ebx 0x00000013 pop eax 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5410683 second address: 54106A0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE04432h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54106A0 second address: 541073C instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F6E9D0B3549h 0x00000008 adc eax, 3654A296h 0x0000000e jmp 00007F6E9D0B3541h 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 popad 0x00000017 xchg eax, ecx 0x00000018 jmp 00007F6E9D0B353Eh 0x0000001d push eax 0x0000001e pushad 0x0000001f mov si, dx 0x00000022 popad 0x00000023 xchg eax, ecx 0x00000024 jmp 00007F6E9D0B353Fh 0x00000029 xchg eax, esi 0x0000002a jmp 00007F6E9D0B3546h 0x0000002f push eax 0x00000030 jmp 00007F6E9D0B353Bh 0x00000035 xchg eax, esi 0x00000036 push eax 0x00000037 push edx 0x00000038 pushad 0x00000039 call 00007F6E9D0B3547h 0x0000003e pop ecx 0x0000003f popad 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 541073C second address: 541075F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE04436h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 lea eax, dword ptr [ebp-04h] 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push edx 0x00000010 pop ecx 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 541075F second address: 5410765 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5410765 second address: 5410769 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5410769 second address: 54107A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 jmp 00007F6E9D0B3548h 0x0000000e mov dword ptr [esp], eax 0x00000011 jmp 00007F6E9D0B3540h 0x00000016 push dword ptr [ebp+08h] 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c mov cx, di 0x0000001f mov ecx, ebx 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54107A9 second address: 54107AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54107AF second address: 54107B3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54107F6 second address: 541080E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6E9CE04434h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 541080E second address: 5410812 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54108B2 second address: 54108D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F6E9CE0442Fh 0x00000008 mov esi, 4B90434Fh 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 leave 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54108D3 second address: 54108D7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54108D7 second address: 54108DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54108DD second address: 54108E3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54108E3 second address: 54108E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54108E7 second address: 5400053 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B3540h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b retn 0004h 0x0000000e nop 0x0000000f sub esp, 04h 0x00000012 xor ebx, ebx 0x00000014 cmp eax, 00000000h 0x00000017 je 00007F6E9D0B369Ah 0x0000001d mov dword ptr [esp], 0000000Dh 0x00000024 call 00007F6EA1CAF6D1h 0x00000029 mov edi, edi 0x0000002b jmp 00007F6E9D0B3540h 0x00000030 xchg eax, ebp 0x00000031 pushad 0x00000032 pushfd 0x00000033 jmp 00007F6E9D0B353Dh 0x00000038 sbb cx, 2556h 0x0000003d jmp 00007F6E9D0B3541h 0x00000042 popfd 0x00000043 popad 0x00000044 push eax 0x00000045 jmp 00007F6E9D0B3541h 0x0000004a xchg eax, ebp 0x0000004b push eax 0x0000004c push edx 0x0000004d push eax 0x0000004e push edx 0x0000004f push eax 0x00000050 push edx 0x00000051 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400053 second address: 5400057 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400057 second address: 540005B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 540005B second address: 5400061 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400061 second address: 5400067 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400067 second address: 540006B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 540006B second address: 540009E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a jmp 00007F6E9D0B3548h 0x0000000f sub esp, 2Ch 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F6E9D0B353Ah 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 540009E second address: 54000A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54000A2 second address: 54000A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54000A8 second address: 540011C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cl, 18h 0x00000005 pushfd 0x00000006 jmp 00007F6E9CE04439h 0x0000000b sub si, CAD6h 0x00000010 jmp 00007F6E9CE04431h 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 xchg eax, ebx 0x0000001a pushad 0x0000001b jmp 00007F6E9CE0442Ch 0x00000020 mov cx, E9D1h 0x00000024 popad 0x00000025 push eax 0x00000026 jmp 00007F6E9CE04437h 0x0000002b xchg eax, ebx 0x0000002c pushad 0x0000002d pushad 0x0000002e mov esi, 481BA4B1h 0x00000033 movzx ecx, dx 0x00000036 popad 0x00000037 push eax 0x00000038 push edx 0x00000039 push edx 0x0000003a pop eax 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 540011C second address: 5400140 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F6E9D0B3548h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400140 second address: 5400144 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400144 second address: 540014A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54001C7 second address: 54001CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54001CB second address: 54001CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54001CF second address: 54001D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54001D5 second address: 54001F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6E9D0B3549h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54001F2 second address: 54001F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54001F6 second address: 5400219 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test al, al 0x0000000a jmp 00007F6E9D0B353Dh 0x0000000f je 00007F6E9D0B3733h 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400219 second address: 540021F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 540021F second address: 5400225 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400225 second address: 5400229 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400229 second address: 5400285 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 lea ecx, dword ptr [ebp-14h] 0x0000000b jmp 00007F6E9D0B3548h 0x00000010 mov dword ptr [ebp-14h], edi 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 pushfd 0x00000017 jmp 00007F6E9D0B3549h 0x0000001c add ecx, 6AAE09F6h 0x00000022 jmp 00007F6E9D0B3541h 0x00000027 popfd 0x00000028 popad 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400285 second address: 540028B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54002F0 second address: 54002F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54002F4 second address: 540030D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE04435h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 540030D second address: 5400358 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F6E9D0B3547h 0x00000009 and esi, 45A64FFEh 0x0000000f jmp 00007F6E9D0B3549h 0x00000014 popfd 0x00000015 mov eax, 1C1A0C47h 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d test eax, eax 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400358 second address: 540035C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 540035C second address: 5400360 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400360 second address: 5400366 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400366 second address: 5400402 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F6E9D0B353Ch 0x00000008 pop esi 0x00000009 call 00007F6E9D0B353Bh 0x0000000e pop ecx 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 jg 00007F6F0D71163Dh 0x00000018 pushad 0x00000019 pushfd 0x0000001a jmp 00007F6E9D0B3545h 0x0000001f adc esi, 22E24E46h 0x00000025 jmp 00007F6E9D0B3541h 0x0000002a popfd 0x0000002b mov ecx, 3381D0F7h 0x00000030 popad 0x00000031 js 00007F6E9D0B3580h 0x00000037 pushad 0x00000038 mov ecx, 241BE7EFh 0x0000003d mov eax, 35E9140Bh 0x00000042 popad 0x00000043 cmp dword ptr [ebp-14h], edi 0x00000046 jmp 00007F6E9D0B353Eh 0x0000004b jne 00007F6F0D7115EEh 0x00000051 push eax 0x00000052 push edx 0x00000053 jmp 00007F6E9D0B3547h 0x00000058 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400402 second address: 5400408 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400408 second address: 5400453 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebx, dword ptr [ebp+08h] 0x0000000b jmp 00007F6E9D0B3547h 0x00000010 lea eax, dword ptr [ebp-2Ch] 0x00000013 pushad 0x00000014 pushad 0x00000015 pushfd 0x00000016 jmp 00007F6E9D0B3542h 0x0000001b and al, 00000008h 0x0000001e jmp 00007F6E9D0B353Bh 0x00000023 popfd 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400453 second address: 540049C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 call 00007F6E9CE04436h 0x0000000a mov eax, 3A3BD881h 0x0000000f pop eax 0x00000010 popad 0x00000011 push ebx 0x00000012 jmp 00007F6E9CE0442Ah 0x00000017 mov dword ptr [esp], esi 0x0000001a pushad 0x0000001b pushad 0x0000001c push eax 0x0000001d pop ebx 0x0000001e pushad 0x0000001f popad 0x00000020 popad 0x00000021 mov ax, 95E5h 0x00000025 popad 0x00000026 nop 0x00000027 pushad 0x00000028 movsx ebx, ax 0x0000002b popad 0x0000002c push eax 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 push eax 0x00000032 push edx 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 540049C second address: 54004A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54004A0 second address: 54004A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54004A4 second address: 54004AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54004AA second address: 54004C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6E9CE04436h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54004C4 second address: 54004E0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B353Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov cx, bx 0x00000012 mov cx, di 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54004E0 second address: 54004E5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54004E5 second address: 5400597 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F6E9D0B3544h 0x0000000a sub cx, E5E8h 0x0000000f jmp 00007F6E9D0B353Bh 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 xchg eax, ebx 0x00000019 pushad 0x0000001a mov al, 14h 0x0000001c pushfd 0x0000001d jmp 00007F6E9D0B3541h 0x00000022 and eax, 17FBBC06h 0x00000028 jmp 00007F6E9D0B3541h 0x0000002d popfd 0x0000002e popad 0x0000002f push eax 0x00000030 pushad 0x00000031 mov ax, dx 0x00000034 pushfd 0x00000035 jmp 00007F6E9D0B3543h 0x0000003a add cx, 0B3Eh 0x0000003f jmp 00007F6E9D0B3549h 0x00000044 popfd 0x00000045 popad 0x00000046 xchg eax, ebx 0x00000047 push eax 0x00000048 push edx 0x00000049 push eax 0x0000004a push edx 0x0000004b jmp 00007F6E9D0B3548h 0x00000050 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400597 second address: 540059D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 540059D second address: 54005AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6E9D0B353Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54005AE second address: 54005B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 53F0EE0 second address: 53F0F0D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F6E9D0B3547h 0x00000008 pop eax 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 mov esi, 4CB4EDFDh 0x00000015 mov ecx, 7A676CF9h 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 53F0F0D second address: 53F0F34 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE0442Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b push esi 0x0000000c pop esi 0x0000000d push eax 0x0000000e push edx 0x0000000f call 00007F6E9CE0442Dh 0x00000014 pop eax 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 53F0F34 second address: 53F0F72 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov ebp, esp 0x00000009 jmp 00007F6E9D0B3543h 0x0000000e xchg eax, ecx 0x0000000f jmp 00007F6E9D0B3546h 0x00000014 push eax 0x00000015 pushad 0x00000016 mov di, 8374h 0x0000001a push eax 0x0000001b push edx 0x0000001c movsx ebx, ax 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 53F0F72 second address: 53F0F7D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, ecx 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 53F0F7D second address: 53F0F87 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400A7E second address: 5400A82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400A82 second address: 5400A88 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400A88 second address: 5400A8E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400A8E second address: 5400A92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400A92 second address: 5400AFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F6E9CE0442Dh 0x0000000e xchg eax, ebp 0x0000000f jmp 00007F6E9CE0442Eh 0x00000014 mov ebp, esp 0x00000016 jmp 00007F6E9CE04430h 0x0000001b cmp dword ptr [75AB459Ch], 05h 0x00000022 pushad 0x00000023 mov edi, eax 0x00000025 mov ecx, 76ADBA09h 0x0000002a popad 0x0000002b je 00007F6F0D45234Ch 0x00000031 pushad 0x00000032 call 00007F6E9CE04431h 0x00000037 mov eax, 1C2E9517h 0x0000003c pop esi 0x0000003d popad 0x0000003e pop ebp 0x0000003f push eax 0x00000040 push edx 0x00000041 pushad 0x00000042 push eax 0x00000043 push edx 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400AFE second address: 5400B04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400B04 second address: 5400B09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400B09 second address: 5400B0F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400B0F second address: 5400B13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400B32 second address: 5400B38 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400B38 second address: 5400B54 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE0442Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push 01181911h 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400B54 second address: 5400B58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400B58 second address: 5400B68 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE0442Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400BFA second address: 5400C1E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B3549h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test al, al 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400C1E second address: 5400C22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400C22 second address: 5400C6C instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F6E9D0B3548h 0x00000008 add si, 4658h 0x0000000d jmp 00007F6E9D0B353Bh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 je 00007F6F0D6F726Ah 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f call 00007F6E9D0B353Eh 0x00000024 pop esi 0x00000025 pushad 0x00000026 popad 0x00000027 popad 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5400C6C second address: 5400C9E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE0442Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [ebp+08h], 00002000h 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F6E9CE04437h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5410936 second address: 541096A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 jmp 00007F6E9D0B3542h 0x0000000b mov dword ptr [esp], ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F6E9D0B3547h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 541096A second address: 54109A7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, dx 0x00000006 pushfd 0x00000007 jmp 00007F6E9CE0442Bh 0x0000000c add eax, 01EC1FDEh 0x00000012 jmp 00007F6E9CE04439h 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b mov ebp, esp 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54109A7 second address: 54109BA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B353Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54109BA second address: 54109C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 54109C0 second address: 5410AA7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 jmp 00007F6E9D0B353Ch 0x0000000e mov dword ptr [esp], esi 0x00000011 jmp 00007F6E9D0B3540h 0x00000016 mov esi, dword ptr [ebp+0Ch] 0x00000019 jmp 00007F6E9D0B3540h 0x0000001e test esi, esi 0x00000020 pushad 0x00000021 pushfd 0x00000022 jmp 00007F6E9D0B353Eh 0x00000027 add esi, 49F72BC8h 0x0000002d jmp 00007F6E9D0B353Bh 0x00000032 popfd 0x00000033 pushfd 0x00000034 jmp 00007F6E9D0B3548h 0x00000039 or ecx, 6F142E28h 0x0000003f jmp 00007F6E9D0B353Bh 0x00000044 popfd 0x00000045 popad 0x00000046 je 00007F6F0D6F0EA2h 0x0000004c jmp 00007F6E9D0B3546h 0x00000051 cmp dword ptr [75AB459Ch], 05h 0x00000058 push eax 0x00000059 push edx 0x0000005a pushad 0x0000005b mov bx, 38A0h 0x0000005f pushfd 0x00000060 jmp 00007F6E9D0B3549h 0x00000065 sbb ax, 17A6h 0x0000006a jmp 00007F6E9D0B3541h 0x0000006f popfd 0x00000070 popad 0x00000071 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5410AA7 second address: 5410AEA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9CE04431h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F6F0D459E01h 0x0000000f jmp 00007F6E9CE0442Eh 0x00000014 xchg eax, esi 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F6E9CE04437h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5410AEA second address: 5410AF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5410AF0 second address: 5410AF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5410B64 second address: 5410BA3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F6E9D0B3546h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a pushad 0x0000000b mov bx, cx 0x0000000e movzx eax, bx 0x00000011 popad 0x00000012 push eax 0x00000013 jmp 00007F6E9D0B3544h 0x00000018 xchg eax, esi 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5410BA3 second address: 5410BA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5410BA7 second address: 5410BAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5410BAB second address: 5410BB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5410C20 second address: 5410C78 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F6E9D0B3547h 0x00000009 sbb si, 6FEEh 0x0000000e jmp 00007F6E9D0B3549h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 pop ebp 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F6E9D0B3548h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5410C78 second address: 5410C8A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F6E9CE0442Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\2oM46LNCOo.exe | RDTSC instruction interceptor: First address: 5410C8A second address: 5410C8E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |