Source: SFtDA07UDr.exe, 00000000.00000003.2138520574.0000000001704000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000002.2464326767.0000000001708000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exe |
Source: SFtDA07UDr.exe, 00000000.00000003.2138520574.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138609621.000000000174B000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000002.2464326767.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138388755.000000000174A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: SFtDA07UDr.exe, 00000000.00000003.1925427609.0000000005D25000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: SFtDA07UDr.exe, 00000000.00000003.1925427609.0000000005D25000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: SFtDA07UDr.exe, 00000000.00000003.2138609621.000000000174B000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138388755.000000000174A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: SFtDA07UDr.exe, 00000000.00000003.2138520574.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138609621.000000000174B000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000002.2464326767.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138388755.000000000174A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: SFtDA07UDr.exe, 00000000.00000003.2138609621.000000000174B000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138388755.000000000174A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U |
Source: SFtDA07UDr.exe, 00000000.00000003.2138520574.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138609621.000000000174B000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000002.2464326767.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138388755.000000000174A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: SFtDA07UDr.exe, 00000000.00000003.2045355742.0000000001710000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.micro |
Source: SFtDA07UDr.exe, 00000000.00000003.1925427609.0000000005D25000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: SFtDA07UDr.exe, 00000000.00000003.2138520574.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138609621.000000000174B000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000002.2464326767.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138388755.000000000174A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: SFtDA07UDr.exe, 00000000.00000003.1925427609.0000000005D25000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: SFtDA07UDr.exe, 00000000.00000003.1925427609.0000000005D25000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: SFtDA07UDr.exe, 00000000.00000003.2138609621.000000000174B000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138388755.000000000174A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTru |
Source: SFtDA07UDr.exe, 00000000.00000003.2138520574.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138609621.000000000174B000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000002.2464326767.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138388755.000000000174A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: SFtDA07UDr.exe, 00000000.00000003.1925427609.0000000005D25000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: SFtDA07UDr.exe, 00000000.00000003.1925427609.0000000005D25000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: SFtDA07UDr.exe, 00000000.00000002.2466286447.00000000063C9000.00000002.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138388755.000000000172B000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138214038.0000000005D07000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: SFtDA07UDr.exe, 00000000.00000003.1925427609.0000000005D25000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: SFtDA07UDr.exe, 00000000.00000003.2138520574.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138609621.000000000174B000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000002.2464326767.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138388755.000000000174A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0A |
Source: SFtDA07UDr.exe, 00000000.00000003.2138520574.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138609621.000000000174B000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000002.2464326767.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138388755.000000000174A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0C |
Source: SFtDA07UDr.exe, 00000000.00000003.2138609621.000000000174B000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138388755.000000000174A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0X |
Source: SFtDA07UDr.exe, 00000000.00000003.2138609621.000000000174B000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138388755.000000000174A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F |
Source: SFtDA07UDr.exe, 00000000.00000003.2138520574.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138609621.000000000174B000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000002.2464326767.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138388755.000000000174A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/rootr30; |
Source: SFtDA07UDr.exe, 00000000.00000003.1925427609.0000000005D25000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: SFtDA07UDr.exe, 00000000.00000003.2138609621.000000000174B000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138388755.000000000174A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A |
Source: SFtDA07UDr.exe, 00000000.00000003.2138520574.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138609621.000000000174B000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000002.2464326767.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138388755.000000000174A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06 |
Source: Amcache.hve.6.dr | String found in binary or memory: http://upx.sf.net |
Source: SFtDA07UDr.exe, 00000000.00000003.1925427609.0000000005D25000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: SFtDA07UDr.exe, 00000000.00000003.1925427609.0000000005D25000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: SFtDA07UDr.exe, 00000000.00000003.1871718842.0000000005D1F000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1872184057.0000000005D1C000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1872934364.0000000005D1C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: SFtDA07UDr.exe, 00000000.00000002.2465817210.0000000005CE1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aui-cdn.atlassian.com/ |
Source: SFtDA07UDr.exe, 00000000.00000002.2465817210.0000000005CE1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net |
Source: SFtDA07UDr.exe, 00000000.00000002.2465817210.0000000005CE1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-exp.prod-east.frontend.public.atl-paas.net |
Source: SFtDA07UDr.exe, 00000000.00000002.2465817210.0000000005CE1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net |
Source: SFtDA07UDr.exe, 00000000.00000002.2465817210.0000000005CE1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net |
Source: SFtDA07UDr.exe, 00000000.00000002.2465817210.0000000005CE1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/ |
Source: SFtDA07UDr.exe, 00000000.00000002.2465817210.0000000005CE1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/; |
Source: SFtDA07UDr.exe, 00000000.00000002.2465817210.0000000005CE1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/ |
Source: SFtDA07UDr.exe, 00000000.00000003.2138520574.0000000001704000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/ |
Source: SFtDA07UDr.exe, 00000000.00000002.2465817210.0000000005CE1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1- |
Source: SFtDA07UDr.exe, 00000000.00000003.2138520574.000000000171D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com:443/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3 |
Source: SFtDA07UDr.exe, 00000000.00000002.2464148316.00000000016A3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com:443r |
Source: SFtDA07UDr.exe, 00000000.00000002.2464148316.00000000016BD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe |
Source: SFtDA07UDr.exe, 00000000.00000002.2463985214.00000000012FA000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe.0 |
Source: SFtDA07UDr.exe, 00000000.00000002.2464148316.00000000016A3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org:443/mynewworkspace123312/scnd/downloads/FormattingCharitable.exeChrome/Default |
Source: SFtDA07UDr.exe | String found in binary or memory: https://bridge.lga1.admarke |
Source: SFtDA07UDr.exe, 00000000.00000003.1949866442.0000000005CD9000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1949295757.0000000005CD5000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1950046715.0000000005CDB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417. |
Source: SFtDA07UDr.exe, SFtDA07UDr.exe, 00000000.00000003.1949866442.0000000005CD9000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1949295757.0000000005CD5000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1950046715.0000000005CDB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta |
Source: SFtDA07UDr.exe, 00000000.00000002.2465817210.0000000005CE1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.cookielaw.org/ |
Source: SFtDA07UDr.exe, 00000000.00000003.1871718842.0000000005D1F000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1872184057.0000000005D1C000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1872934364.0000000005D1C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: SFtDA07UDr.exe, 00000000.00000003.1871718842.0000000005D1F000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1872184057.0000000005D1C000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1872934364.0000000005D1C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: SFtDA07UDr.exe, 00000000.00000003.1871718842.0000000005D1F000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1872184057.0000000005D1C000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1872934364.0000000005D1C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: SFtDA07UDr.exe, SFtDA07UDr.exe, 00000000.00000003.1949866442.0000000005CD9000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1949295757.0000000005CD5000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1950046715.0000000005CDB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg |
Source: SFtDA07UDr.exe, 00000000.00000003.1949866442.0000000005CD9000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1949295757.0000000005CD5000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1950046715.0000000005CDB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: SFtDA07UDr.exe, 00000000.00000003.1871718842.0000000005D1F000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1872184057.0000000005D1C000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1872934364.0000000005D1C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: SFtDA07UDr.exe, 00000000.00000003.1871718842.0000000005D1F000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1872184057.0000000005D1C000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1872934364.0000000005D1C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: SFtDA07UDr.exe, 00000000.00000003.1871718842.0000000005D1F000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1872184057.0000000005D1C000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1872934364.0000000005D1C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: SFtDA07UDr.exe, 00000000.00000002.2465895160.0000000005CF6000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138432899.0000000005CF0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://dz8aopenkvv6s.cloudfront.net |
Source: SFtDA07UDr.exe, 00000000.00000003.1950046715.0000000005CDB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi |
Source: SFtDA07UDr.exe, 00000000.00000003.1975922228.0000000005CDF000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1924893342.0000000005CDC000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1949295757.0000000005CD5000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1951074863.0000000005CDE000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1925246665.0000000005CDD000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1925412949.0000000005CDF000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1950046715.0000000005CDB000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1926458477.0000000005CDF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/ |
Source: SFtDA07UDr.exe, 00000000.00000003.2046022983.000000000169D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/E |
Source: SFtDA07UDr.exe, 00000000.00000002.2464395097.0000000001735000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1954876307.0000000001740000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1993373801.0000000001740000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138388755.000000000172B000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1955438629.0000000001740000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1902218493.0000000005CD6000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2046022983.00000000016BD000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1993180083.0000000001740000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1902705880.0000000005CD9000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1980257379.0000000001740000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/api |
Source: SFtDA07UDr.exe, 00000000.00000003.1954876307.0000000001740000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1993373801.0000000001740000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1955438629.0000000001740000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1993180083.0000000001740000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1980257379.0000000001740000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apiR |
Source: SFtDA07UDr.exe, 00000000.00000003.2046022983.00000000016BD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/api~l |
Source: SFtDA07UDr.exe, 00000000.00000003.2046022983.00000000016A3000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000002.2464148316.00000000016A3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat:443/api |
Source: SFtDA07UDr.exe, 00000000.00000003.2046022983.00000000016A3000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000002.2464148316.00000000016A3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat:443/apin.txtPK |
Source: SFtDA07UDr.exe, 00000000.00000003.2138432899.0000000005CF0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.prod-east.frontend.public.atl-paas.net |
Source: SFtDA07UDr.exe, 00000000.00000003.2138432899.0000000005CF0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net |
Source: SFtDA07UDr.exe, 00000000.00000003.1874681721.0000000005D32000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.microsof |
Source: SFtDA07UDr.exe, 00000000.00000003.1926488629.0000000005DF5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: SFtDA07UDr.exe, 00000000.00000003.1926488629.0000000005DF5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: SFtDA07UDr.exe, 00000000.00000003.1902301601.0000000005D2B000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1902180890.0000000005D2B000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1874681721.0000000005D32000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016 |
Source: SFtDA07UDr.exe, 00000000.00000003.1874769883.0000000005D06000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples |
Source: SFtDA07UDr.exe, 00000000.00000003.1902301601.0000000005D2B000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1902180890.0000000005D2B000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1874681721.0000000005D32000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17 |
Source: SFtDA07UDr.exe, 00000000.00000003.1874769883.0000000005D06000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install |
Source: SFtDA07UDr.exe, 00000000.00000002.2465895160.0000000005CF6000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138432899.0000000005CF0000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138629427.0000000005CDF000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000002.2465817210.0000000005CE1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website |
Source: SFtDA07UDr.exe, 00000000.00000003.2138629427.0000000005CDF000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000002.2465817210.0000000005CE1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-websiteX-Frame-OptionsSAMEORIGINX- |
Source: SFtDA07UDr.exe | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575 |
Source: SFtDA07UDr.exe, 00000000.00000003.1949866442.0000000005CD9000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1949295757.0000000005CD5000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1950046715.0000000005CDB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94 |
Source: SFtDA07UDr.exe, 00000000.00000003.1871718842.0000000005D1F000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1872184057.0000000005D1C000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1872934364.0000000005D1C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: SFtDA07UDr.exe, SFtDA07UDr.exe, 00000000.00000003.1949866442.0000000005CD9000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1949295757.0000000005CD5000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1950046715.0000000005CDB000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219 |
Source: SFtDA07UDr.exe, 00000000.00000003.2138520574.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138609621.000000000174B000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000002.2464326767.000000000171D000.00000004.00000020.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.2138388755.000000000174A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: SFtDA07UDr.exe, 00000000.00000003.1871718842.0000000005D1F000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1872184057.0000000005D1C000.00000004.00000800.00020000.00000000.sdmp, SFtDA07UDr.exe, 00000000.00000003.1872934364.0000000005D1C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: SFtDA07UDr.exe, 00000000.00000003.1926488629.0000000005DF5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2 |
Source: SFtDA07UDr.exe, 00000000.00000003.1926488629.0000000005DF5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR |
Source: SFtDA07UDr.exe, 00000000.00000003.1926488629.0000000005DF5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: SFtDA07UDr.exe, 00000000.00000003.1926488629.0000000005DF5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: SFtDA07UDr.exe, 00000000.00000003.1926488629.0000000005DF5000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CBE6D5 second address: CBE6F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jmp 00007F768C6F8119h 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CBE6F7 second address: CBE711 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F768C6F6316h 0x00000008 jmp 00007F768C6F631Bh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f popad 0x00000010 pushad 0x00000011 push ebx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CBE711 second address: CBE71F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F768C6F8106h 0x0000000a pop ebx 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CB86B7 second address: CB86C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F768C6F6316h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CB86C1 second address: CB86E7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F8113h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F768C6F810Fh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CBD65D second address: CBD67A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F768C6F6322h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CBD67A second address: CBD680 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CBD680 second address: CBD688 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push edx 0x00000007 pop edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CBDAB2 second address: CBDAC4 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F768C6F8106h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ecx 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CBDAC4 second address: CBDACA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CBDACA second address: CBDACE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CBDACE second address: CBDAD2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CBDC4C second address: CBDC59 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jo 00007F768C6F8106h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CBDC59 second address: CBDC76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F768C6F6320h 0x0000000e push ecx 0x0000000f push edx 0x00000010 pop edx 0x00000011 pop ecx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CBDDDF second address: CBDDFE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F810Ch 0x00000007 jng 00007F768C6F8106h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push ebx 0x00000010 jnl 00007F768C6F8106h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CBDF7B second address: CBDFAC instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F768C6F6316h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ecx 0x0000000d jne 00007F768C6F633Ch 0x00000013 push eax 0x00000014 pushad 0x00000015 popad 0x00000016 push eax 0x00000017 pop eax 0x00000018 pop eax 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F768C6F6324h 0x00000020 pushad 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CC01E0 second address: CC01E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CC02CB second address: CC02D1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CC03B1 second address: CC0401 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F768C6F8108h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop eax 0x0000000d pushad 0x0000000e call 00007F768C6F8110h 0x00000013 adc dh, FFFFFFA5h 0x00000016 pop esi 0x00000017 add esi, dword ptr [ebp+122D2C8Ch] 0x0000001d popad 0x0000001e push 00000003h 0x00000020 mov dword ptr [ebp+122D3720h], ecx 0x00000026 push 00000000h 0x00000028 mov edx, dword ptr [ebp+12445475h] 0x0000002e push 00000003h 0x00000030 mov edi, dword ptr [ebp+122D3961h] 0x00000036 push 9D237B37h 0x0000003b push eax 0x0000003c push edx 0x0000003d jg 00007F768C6F8108h 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CC0401 second address: CC0431 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push esi 0x00000004 pop esi 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xor dword ptr [esp], 5D237B37h 0x0000000f mov esi, 05C3EABBh 0x00000014 lea ebx, dword ptr [ebp+1244B0C1h] 0x0000001a or dl, FFFFFFA4h 0x0000001d xchg eax, ebx 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F768C6F6320h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CC0431 second address: CC044B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F768C6F8115h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CC044B second address: CC045D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jbe 00007F768C6F6320h 0x0000000e push eax 0x0000000f push edx 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CC04B9 second address: CC0508 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F768C6F8119h 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f mov edx, dword ptr [ebp+122D1D6Fh] 0x00000015 push 00000000h 0x00000017 mov dword ptr [ebp+122D2DE9h], esi 0x0000001d call 00007F768C6F8109h 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007F768C6F8113h 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CC0508 second address: CC0522 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F768C6F6326h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CC0522 second address: CC0558 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F768C6F810Bh 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 jmp 00007F768C6F8112h 0x00000017 mov eax, dword ptr [eax] 0x00000019 pushad 0x0000001a pushad 0x0000001b jnc 00007F768C6F8106h 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CC0558 second address: CC0578 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnp 00007F768C6F6318h 0x0000000b popad 0x0000000c mov dword ptr [esp+04h], eax 0x00000010 jng 00007F768C6F6333h 0x00000016 push eax 0x00000017 push edx 0x00000018 jno 00007F768C6F6316h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CC0578 second address: CC0603 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F8111h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a jno 00007F768C6F810Ch 0x00000010 push 00000003h 0x00000012 or edx, dword ptr [ebp+122D376Dh] 0x00000018 push 00000000h 0x0000001a push 00000000h 0x0000001c push ecx 0x0000001d call 00007F768C6F8108h 0x00000022 pop ecx 0x00000023 mov dword ptr [esp+04h], ecx 0x00000027 add dword ptr [esp+04h], 00000016h 0x0000002f inc ecx 0x00000030 push ecx 0x00000031 ret 0x00000032 pop ecx 0x00000033 ret 0x00000034 push 00000003h 0x00000036 sub dword ptr [ebp+122D2446h], eax 0x0000003c mov ecx, 68C68418h 0x00000041 call 00007F768C6F8109h 0x00000046 push edi 0x00000047 push ebx 0x00000048 jne 00007F768C6F8106h 0x0000004e pop ebx 0x0000004f pop edi 0x00000050 push eax 0x00000051 jmp 00007F768C6F810Ah 0x00000056 mov eax, dword ptr [esp+04h] 0x0000005a jmp 00007F768C6F810Bh 0x0000005f mov eax, dword ptr [eax] 0x00000061 push ebx 0x00000062 push eax 0x00000063 push edx 0x00000064 push edi 0x00000065 pop edi 0x00000066 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CD223A second address: CD2244 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F768C6F6316h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CB016E second address: CB0183 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F768C6F8111h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CDEAB0 second address: CDEAB4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CDED74 second address: CDED80 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push esi 0x0000000a pop esi 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CDED80 second address: CDED90 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 push edi 0x00000008 pop edi 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CDED90 second address: CDED94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CDF06E second address: CDF08E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F768C6F631Fh 0x00000009 pop esi 0x0000000a popad 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 jbe 00007F768C6F6316h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CDF08E second address: CDF092 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CDF1D3 second address: CDF1D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CDF4F8 second address: CDF4FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CDF4FE second address: CDF535 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F768C6F631Eh 0x0000000d popad 0x0000000e pushad 0x0000000f jo 00007F768C6F6325h 0x00000015 push edx 0x00000016 pop edx 0x00000017 jmp 00007F768C6F631Dh 0x0000001c push eax 0x0000001d push edx 0x0000001e push edi 0x0000001f pop edi 0x00000020 jnc 00007F768C6F6316h 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CDF535 second address: CDF549 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jl 00007F768C6F8106h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jp 00007F768C6F810Ch 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CDF83C second address: CDF840 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CDF840 second address: CDF844 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CDF844 second address: CDF84A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CDF84A second address: CDF850 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CB368E second address: CB36B7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F631Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jg 00007F768C6F6316h 0x00000010 jo 00007F768C6F6316h 0x00000016 push esi 0x00000017 pop esi 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c popad 0x0000001d push esi 0x0000001e pop esi 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CE03AB second address: CE03AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CE03AF second address: CE03B9 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CB1BB1 second address: CB1BB5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CB1BB5 second address: CB1BBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CAAFD6 second address: CAAFF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F768C6F8112h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CAAFF3 second address: CAAFF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CAAFF7 second address: CAB001 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F768C6F8106h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CE9678 second address: CE967C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CE87DC second address: CE87E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CE87E0 second address: CE87E4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CE87E4 second address: CE880E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F768C6F8115h 0x0000000c jo 00007F768C6F8106h 0x00000012 popad 0x00000013 popad 0x00000014 push eax 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CE9935 second address: CE9939 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CE9939 second address: CE993D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CE993D second address: CE9943 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CE9AE4 second address: CE9AEA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CEEDB8 second address: CEEDEE instructions: 0x00000000 rdtsc 0x00000002 jp 00007F768C6F6316h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F768C6F6325h 0x0000000f jmp 00007F768C6F6323h 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CEEDEE second address: CEEDF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CEF673 second address: CEF679 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CEFFAA second address: CEFFC1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F810Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push esi 0x0000000b pop esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF01AF second address: CF01C3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F631Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF01C3 second address: CF01C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF2044 second address: CF204A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF204A second address: CF204F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF204F second address: CF20A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a sub dword ptr [ebp+122D220Bh], ebx 0x00000010 xor si, 3150h 0x00000015 push 00000000h 0x00000017 push 00000000h 0x00000019 push esi 0x0000001a call 00007F768C6F6318h 0x0000001f pop esi 0x00000020 mov dword ptr [esp+04h], esi 0x00000024 add dword ptr [esp+04h], 0000001Dh 0x0000002c inc esi 0x0000002d push esi 0x0000002e ret 0x0000002f pop esi 0x00000030 ret 0x00000031 mov edi, dword ptr [ebp+122D37C1h] 0x00000037 push 00000000h 0x00000039 sub dword ptr [ebp+1246E266h], ebx 0x0000003f push eax 0x00000040 pushad 0x00000041 push eax 0x00000042 push edx 0x00000043 jc 00007F768C6F6316h 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF47D0 second address: CF483F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push 00000000h 0x0000000d push ebp 0x0000000e call 00007F768C6F8108h 0x00000013 pop ebp 0x00000014 mov dword ptr [esp+04h], ebp 0x00000018 add dword ptr [esp+04h], 00000018h 0x00000020 inc ebp 0x00000021 push ebp 0x00000022 ret 0x00000023 pop ebp 0x00000024 ret 0x00000025 push 00000000h 0x00000027 call 00007F768C6F8113h 0x0000002c jmp 00007F768C6F8112h 0x00000031 pop esi 0x00000032 xchg eax, ebx 0x00000033 jmp 00007F768C6F8115h 0x00000038 push eax 0x00000039 push eax 0x0000003a push edx 0x0000003b push edx 0x0000003c push eax 0x0000003d push edx 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF4518 second address: CF451C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF483F second address: CF4844 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF6CFE second address: CF6D14 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F631Eh 0x00000007 push eax 0x00000008 push edx 0x00000009 push edi 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF6D14 second address: CF6D18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF6D18 second address: CF6D45 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F6322h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jnl 00007F768C6F6331h 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F768C6F631Bh 0x00000018 push ecx 0x00000019 pop ecx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF7352 second address: CF7380 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F768C6F8106h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c jc 00007F768C6F8127h 0x00000012 pushad 0x00000013 jmp 00007F768C6F8119h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF7EAC second address: CF7EC4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F631Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CFBC70 second address: CFBC7B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CFCCB2 second address: CFCCB7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CFCF04 second address: CFCF08 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CFCF08 second address: CFCF0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CFED2C second address: CFED30 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CFED30 second address: CFED36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CFCF0E second address: CFCF41 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F768C6F8119h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c jns 00007F768C6F8108h 0x00000012 push esi 0x00000013 pop esi 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F768C6F810Ah 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D011A9 second address: D011AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D0125F second address: D0126B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D0230B second address: D02310 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D030B5 second address: D030BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D04255 second address: D04259 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D05233 second address: D05243 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F768C6F810Bh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D05243 second address: D0526F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F6320h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F768C6F6325h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D0526F second address: D05274 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CB6BA2 second address: CB6BA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CB6BA7 second address: CB6BC0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F810Fh 0x00000007 jng 00007F768C6F8112h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CB6BC0 second address: CB6BC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D0D934 second address: D0D9A5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F810Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c mov bx, 68A6h 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push esi 0x00000015 call 00007F768C6F8108h 0x0000001a pop esi 0x0000001b mov dword ptr [esp+04h], esi 0x0000001f add dword ptr [esp+04h], 00000018h 0x00000027 inc esi 0x00000028 push esi 0x00000029 ret 0x0000002a pop esi 0x0000002b ret 0x0000002c mov bl, 17h 0x0000002e jno 00007F768C6F8106h 0x00000034 push 00000000h 0x00000036 push 00000000h 0x00000038 push esi 0x00000039 call 00007F768C6F8108h 0x0000003e pop esi 0x0000003f mov dword ptr [esp+04h], esi 0x00000043 add dword ptr [esp+04h], 0000001Dh 0x0000004b inc esi 0x0000004c push esi 0x0000004d ret 0x0000004e pop esi 0x0000004f ret 0x00000050 stc 0x00000051 xchg eax, esi 0x00000052 pushad 0x00000053 push eax 0x00000054 push edx 0x00000055 push eax 0x00000056 push edx 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D0D9A5 second address: D0D9A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D0D9A9 second address: D0D9BB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push edx 0x0000000a pop edx 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push esi 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D07C0B second address: D07C22 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F768C6F631Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D0B4F7 second address: D0B4FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D07C22 second address: D07C26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D10A67 second address: D10A6C instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D08D7B second address: D08D7F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D0B4FB second address: D0B57E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F768C6F810Fh 0x0000000b popad 0x0000000c nop 0x0000000d jmp 00007F768C6F8119h 0x00000012 push dword ptr fs:[00000000h] 0x00000019 push esi 0x0000001a mov ebx, dword ptr [ebp+122D395Dh] 0x00000020 pop edi 0x00000021 mov dword ptr fs:[00000000h], esp 0x00000028 pushad 0x00000029 jnp 00007F768C6F8108h 0x0000002f pushad 0x00000030 popad 0x00000031 mov ecx, 70472D87h 0x00000036 popad 0x00000037 mov eax, dword ptr [ebp+122D05C5h] 0x0000003d push edx 0x0000003e sub edi, dword ptr [ebp+122D2F98h] 0x00000044 pop edi 0x00000045 push FFFFFFFFh 0x00000047 sub edi, 3BFF58F1h 0x0000004d nop 0x0000004e push eax 0x0000004f push edx 0x00000050 pushad 0x00000051 jmp 00007F768C6F8111h 0x00000056 push ecx 0x00000057 pop ecx 0x00000058 popad 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D0DB3A second address: D0DB9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 sub dword ptr [ebp+12452CE7h], eax 0x0000000f push dword ptr fs:[00000000h] 0x00000016 push ebx 0x00000017 mov dword ptr [ebp+122D2D9Bh], ecx 0x0000001d pop ebx 0x0000001e mov dword ptr fs:[00000000h], esp 0x00000025 mov di, si 0x00000028 mov eax, dword ptr [ebp+122D0FF5h] 0x0000002e push 00000000h 0x00000030 push ebx 0x00000031 call 00007F768C6F6318h 0x00000036 pop ebx 0x00000037 mov dword ptr [esp+04h], ebx 0x0000003b add dword ptr [esp+04h], 00000015h 0x00000043 inc ebx 0x00000044 push ebx 0x00000045 ret 0x00000046 pop ebx 0x00000047 ret 0x00000048 or di, EC40h 0x0000004d push FFFFFFFFh 0x0000004f mov ebx, dword ptr [ebp+122D3955h] 0x00000055 push eax 0x00000056 push eax 0x00000057 push edx 0x00000058 pushad 0x00000059 pushad 0x0000005a popad 0x0000005b je 00007F768C6F6316h 0x00000061 popad 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D0E9F0 second address: D0E9F5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D0FB8A second address: D0FB8E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D07C26 second address: D07C2A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D07C2A second address: D07C30 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D07C30 second address: D07C35 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D18AAB second address: D18AC7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F768C6F631Fh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D1C646 second address: D1C65F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F768C6F8112h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D1C65F second address: D1C663 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D238BA second address: D238C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D23B70 second address: D23B74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D23B74 second address: D23B89 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F768C6F810Bh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D23B89 second address: D23B93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F768C6F6316h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D23B93 second address: D23BAF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F8116h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D23CF1 second address: D23CF7 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D2A82F second address: D2A85B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 ja 00007F768C6F8106h 0x00000016 pop edi 0x00000017 jmp 00007F768C6F8115h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D2A85B second address: D2A876 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F768C6F6324h 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D2A876 second address: D2A87F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D2A87F second address: D2A883 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D2948E second address: D2949E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F768C6F8106h 0x0000000a pop esi 0x0000000b pop eax 0x0000000c pushad 0x0000000d push ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D2949E second address: D294A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop ebx 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D29758 second address: D2975C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D2975C second address: D2977A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a pop eax 0x0000000b jmp 00007F768C6F6321h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D2977A second address: D2978D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F768C6F8106h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jbe 00007F768C6F8106h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D2978D second address: D29793 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D29793 second address: D297B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F768C6F8116h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D29A1B second address: D29A4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F768C6F6327h 0x00000009 popad 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F768C6F6324h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D29B8F second address: D29B97 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 push esi 0x00000007 pop esi 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D29B97 second address: D29B9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D29B9B second address: D29BAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b jl 00007F768C6F8106h 0x00000011 pop eax 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D29BAD second address: D29BB9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007F768C6F6316h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D29BB9 second address: D29BC9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 pop eax 0x0000000a ja 00007F768C6F8106h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D29D07 second address: D29D24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F768C6F6327h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D29FD2 second address: D29FDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D29FDC second address: D29FF1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 jl 00007F768C6F6316h 0x0000000e popad 0x0000000f popad 0x00000010 push ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 push edi 0x00000014 pop edi 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D2A28A second address: D2A28E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CD6A03 second address: CD6A0B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CD6A0B second address: CD6A16 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007F768C6F8106h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D2A720 second address: D2A726 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF95DA second address: CF95E0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF95E0 second address: CF95E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF97E4 second address: CF97F3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b pushad 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF9A3B second address: CF9A56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F768C6F6326h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF9A56 second address: CF9A78 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F8113h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jnc 00007F768C6F8106h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF9A78 second address: CF9A7E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF9A7E second address: CF9A83 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF9A83 second address: CF9A89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF9A89 second address: CF9B0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push edx 0x0000000b call 00007F768C6F8108h 0x00000010 pop edx 0x00000011 mov dword ptr [esp+04h], edx 0x00000015 add dword ptr [esp+04h], 0000001Bh 0x0000001d inc edx 0x0000001e push edx 0x0000001f ret 0x00000020 pop edx 0x00000021 ret 0x00000022 push ecx 0x00000023 pushad 0x00000024 jns 00007F768C6F8106h 0x0000002a jbe 00007F768C6F8106h 0x00000030 popad 0x00000031 pop edi 0x00000032 cmc 0x00000033 push 00000004h 0x00000035 pushad 0x00000036 pushad 0x00000037 mov edx, dword ptr [ebp+122D3A29h] 0x0000003d jo 00007F768C6F8106h 0x00000043 popad 0x00000044 mov dword ptr [ebp+122D2D9Bh], esi 0x0000004a popad 0x0000004b sub dword ptr [ebp+122D1CA0h], esi 0x00000051 nop 0x00000052 jmp 00007F768C6F8117h 0x00000057 push eax 0x00000058 push eax 0x00000059 push edx 0x0000005a jmp 00007F768C6F8111h 0x0000005f rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF9E31 second address: CF9E37 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF9E37 second address: CF9E3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF9E3B second address: CF9E3F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CFA175 second address: CFA18C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F768C6F810Eh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CFA18C second address: CFA191 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CFA253 second address: CFA257 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CFA257 second address: CD6A03 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F768C6F6322h 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f push 00000000h 0x00000011 push ecx 0x00000012 call 00007F768C6F6318h 0x00000017 pop ecx 0x00000018 mov dword ptr [esp+04h], ecx 0x0000001c add dword ptr [esp+04h], 00000018h 0x00000024 inc ecx 0x00000025 push ecx 0x00000026 ret 0x00000027 pop ecx 0x00000028 ret 0x00000029 call dword ptr [ebp+12450CC9h] 0x0000002f push eax 0x00000030 push edx 0x00000031 push eax 0x00000032 push edx 0x00000033 jmp 00007F768C6F631Eh 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D3170A second address: D3170E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D3170E second address: D3173D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F768C6F6316h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ecx 0x0000000d pushad 0x0000000e jmp 00007F768C6F6329h 0x00000013 push eax 0x00000014 push edx 0x00000015 jbe 00007F768C6F6316h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D31C79 second address: D31C7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D31C7D second address: D31C95 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F768C6F6316h 0x00000008 jng 00007F768C6F6316h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 ja 00007F768C6F6316h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D31DEF second address: D31DF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D3B115 second address: D3B11A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CACC1E second address: CACC37 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F8115h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CACC37 second address: CACC40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D39ED7 second address: D39EEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jmp 00007F768C6F8110h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D39EEE second address: D39EF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D39EF9 second address: D39EFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D39EFF second address: D39F03 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D39F03 second address: D39F37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F768C6F8113h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jnl 00007F768C6F8118h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D39F37 second address: D39F47 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F631Ah 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D3A5D4 second address: D3A5D8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D39B95 second address: D39BAE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F6320h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push edi 0x0000000b pop edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D39BAE second address: D39BF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F768C6F8106h 0x0000000a popad 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007F768C6F810Bh 0x00000013 pop edx 0x00000014 jc 00007F768C6F8108h 0x0000001a pushad 0x0000001b popad 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 jmp 00007F768C6F810Dh 0x00000025 jnc 00007F768C6F8106h 0x0000002b jc 00007F768C6F8106h 0x00000031 jnl 00007F768C6F8106h 0x00000037 popad 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D3AE80 second address: D3AE84 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D3AE84 second address: D3AE8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D3EE66 second address: D3EE6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D3EE6A second address: D3EE7C instructions: 0x00000000 rdtsc 0x00000002 jg 00007F768C6F8106h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jbe 00007F768C6F810Eh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D3F277 second address: D3F27B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D41A54 second address: D41A64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F768C6F8106h 0x0000000a pop ecx 0x0000000b pushad 0x0000000c push edi 0x0000000d pop edi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D468E8 second address: D468F8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F631Ch 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D468F8 second address: D46901 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D46901 second address: D46915 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F768C6F631Eh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D46A58 second address: D46A71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F768C6F8114h 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D46A71 second address: D46A76 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D46CF7 second address: D46CFF instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D47C8E second address: D47C92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D47C92 second address: D47CB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F768C6F8119h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D47CB5 second address: D47CBF instructions: 0x00000000 rdtsc 0x00000002 ja 00007F768C6F6316h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D4ADAF second address: D4ADB9 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F768C6F8106h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D4AABF second address: D4AAC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D4F75D second address: D4F76E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jo 00007F768C6F8106h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D4EB0A second address: D4EB15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D4EB15 second address: D4EB19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D4EB19 second address: D4EB1F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D4EB1F second address: D4EB28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D4EF27 second address: D4EF31 instructions: 0x00000000 rdtsc 0x00000002 je 00007F768C6F6316h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D57655 second address: D57659 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D5584C second address: D55856 instructions: 0x00000000 rdtsc 0x00000002 js 00007F768C6F631Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D55856 second address: D55862 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jc 00007F768C6F8106h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D564EF second address: D56502 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F631Ah 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D5A3B4 second address: D5A3BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D5A3BE second address: D5A3C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D5A3C5 second address: D5A3CA instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D5A522 second address: D5A52F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 je 00007F768C6F631Eh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D5A94D second address: D5A973 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F810Ah 0x00000007 jg 00007F768C6F8106h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 push esi 0x00000011 pop esi 0x00000012 jne 00007F768C6F8106h 0x00000018 pushad 0x00000019 popad 0x0000001a jns 00007F768C6F8106h 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D5A973 second address: D5A978 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D5AAD7 second address: D5AB15 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F8117h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007F768C6F810Ah 0x00000010 jc 00007F768C6F8113h 0x00000016 push edx 0x00000017 pop edx 0x00000018 jmp 00007F768C6F810Bh 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D5AB15 second address: D5AB19 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D5AC97 second address: D5AC9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D5ADB4 second address: D5ADC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 jp 00007F768C6F6316h 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D66549 second address: D6654D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D6654D second address: D66588 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 jmp 00007F768C6F631Dh 0x0000000e pop ebx 0x0000000f push eax 0x00000010 jns 00007F768C6F6316h 0x00000016 jmp 00007F768C6F6329h 0x0000001b pop eax 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D66588 second address: D66597 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D66597 second address: D6659B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D66730 second address: D66763 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F8116h 0x00000007 jmp 00007F768C6F8119h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D66763 second address: D66774 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jl 00007F768C6F632Ah 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D668BE second address: D668C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D668C2 second address: D668D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007F768C6F631Ah 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D66CFB second address: D66D01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D66D01 second address: D66D16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F768C6F6320h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D66D16 second address: D66D1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D67744 second address: D6776E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 jmp 00007F768C6F6325h 0x0000000c jl 00007F768C6F6316h 0x00000012 push edx 0x00000013 pop edx 0x00000014 popad 0x00000015 pop ebx 0x00000016 pushad 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D6776E second address: D6777F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 pop eax 0x00000008 popad 0x00000009 jnp 00007F768C6F810Ch 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D65CDF second address: D65CE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D65CE5 second address: D65CE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D6F88B second address: D6F897 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F768C6F6316h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D6F9CF second address: D6F9D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D6F9D3 second address: D6F9D7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D6F9D7 second address: D6F9DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D6F9DD second address: D6F9FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 je 00007F768C6F631Ch 0x0000000c popad 0x0000000d jl 00007F768C6F632Dh 0x00000013 push eax 0x00000014 push edx 0x00000015 push esi 0x00000016 pop esi 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D81FFD second address: D82015 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F768C6F8114h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D82015 second address: D82036 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jne 00007F768C6F6316h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F768C6F631Dh 0x00000013 jc 00007F768C6F6316h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D90B86 second address: D90B8B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D978A2 second address: D978A7 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D97C6E second address: D97C76 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D9A205 second address: D9A224 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007F768C6F631Ch 0x0000000c pop eax 0x0000000d jnl 00007F768C6F6342h 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D9A095 second address: D9A09B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D9B75E second address: D9B762 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D9F409 second address: D9F411 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D9F411 second address: D9F418 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D9F418 second address: D9F435 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F768C6F8110h 0x00000008 push esi 0x00000009 pop esi 0x0000000a popad 0x0000000b pushad 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e push eax 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: D9F0B5 second address: D9F0CF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F768C6F631Eh 0x0000000d push eax 0x0000000e push edx 0x0000000f push edx 0x00000010 pop edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DA15A5 second address: DA15DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 jmp 00007F768C6F8113h 0x0000000d pop eax 0x0000000e jg 00007F768C6F811Ah 0x00000014 push ebx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DAE59D second address: DAE5B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F768C6F6320h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DAE5B6 second address: DAE5BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DAE5BA second address: DAE5D5 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007F768C6F631Fh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f push edi 0x00000010 pop edi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD17D4 second address: DD17DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD17DA second address: DD17E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD0630 second address: DD0647 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F810Bh 0x00000007 jo 00007F768C6F810Eh 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD0792 second address: DD079F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD079F second address: DD07A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD07A4 second address: DD07B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 jno 00007F768C6F6316h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD0914 second address: DD0936 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F768C6F8116h 0x00000009 pop edi 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD0A8B second address: DD0A9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F768C6F6316h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD0A9A second address: DD0AA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD0F99 second address: DD0FB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jmp 00007F768C6F6325h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD143E second address: DD145B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F8111h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 js 00007F768C6F810Ch 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD412C second address: DD4150 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push ebx 0x00000008 pushad 0x00000009 jmp 00007F768C6F6329h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD43DD second address: DD43EB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F810Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD43EB second address: DD43F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F768C6F631Ah 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD43F9 second address: DD4419 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F8113h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD4419 second address: DD441D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD441D second address: DD4423 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD4709 second address: DD473D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 jmp 00007F768C6F6327h 0x0000000c pop esi 0x0000000d popad 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push ecx 0x00000012 jmp 00007F768C6F631Fh 0x00000017 pop ecx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD473D second address: DD4742 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD7699 second address: DD76C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F768C6F6326h 0x00000009 jmp 00007F768C6F6325h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD723C second address: DD7258 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 ja 00007F768C6F8106h 0x0000000c jmp 00007F768C6F810Fh 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD7258 second address: DD7279 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F631Dh 0x00000007 js 00007F768C6F6326h 0x0000000d jmp 00007F768C6F631Ah 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD9144 second address: DD9148 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD9148 second address: DD9184 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F768C6F6316h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f ja 00007F768C6F6316h 0x00000015 jmp 00007F768C6F631Bh 0x0000001a js 00007F768C6F6316h 0x00000020 popad 0x00000021 popad 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007F768C6F631Eh 0x0000002b push ecx 0x0000002c pop ecx 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD9184 second address: DD9190 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F768C6F8106h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD9190 second address: DD91A0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F768C6F6316h 0x0000000a js 00007F768C6F6316h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: DD91A0 second address: DD91A4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: CF2BF8 second address: CF2BFE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53A035B second address: 53A03E4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F8112h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov al, dh 0x0000000d movzx ecx, di 0x00000010 popad 0x00000011 xchg eax, ebp 0x00000012 pushad 0x00000013 pushad 0x00000014 push edx 0x00000015 pop eax 0x00000016 pushfd 0x00000017 jmp 00007F768C6F810Dh 0x0000001c or esi, 6A2B32F6h 0x00000022 jmp 00007F768C6F8111h 0x00000027 popfd 0x00000028 popad 0x00000029 pushfd 0x0000002a jmp 00007F768C6F8110h 0x0000002f sbb ecx, 767BB418h 0x00000035 jmp 00007F768C6F810Bh 0x0000003a popfd 0x0000003b popad 0x0000003c mov ebp, esp 0x0000003e pushad 0x0000003f mov al, 99h 0x00000041 mov ecx, ebx 0x00000043 popad 0x00000044 mov edx, dword ptr [ebp+0Ch] 0x00000047 pushad 0x00000048 mov cx, di 0x0000004b mov esi, edi 0x0000004d popad 0x0000004e mov ecx, dword ptr [ebp+08h] 0x00000051 pushad 0x00000052 push eax 0x00000053 push edx 0x00000054 mov si, dx 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C0684 second address: 53C069A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F631Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C069A second address: 53C069E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C069E second address: 53C06A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C06A4 second address: 53C070D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F768C6F8118h 0x00000009 adc ah, FFFFFFF8h 0x0000000c jmp 00007F768C6F810Bh 0x00000011 popfd 0x00000012 mov ebx, ecx 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 mov ebp, esp 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c push ebx 0x0000001d pop ecx 0x0000001e pushfd 0x0000001f jmp 00007F768C6F8113h 0x00000024 xor ah, 0000006Eh 0x00000027 jmp 00007F768C6F8119h 0x0000002c popfd 0x0000002d popad 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C070D second address: 53C0713 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C07D1 second address: 53C07E6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F8111h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C07E6 second address: 53C0801 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F6321h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C0801 second address: 53C080A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov di, E89Ch 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C080A second address: 53C083C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F6322h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+08h] 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F768C6F6327h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C08AB second address: 53C08B0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C08B0 second address: 53C08EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F768C6F631Dh 0x0000000a add cx, 4C76h 0x0000000f jmp 00007F768C6F6321h 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 cmp dword ptr [ebp-04h], 00000000h 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007F768C6F631Dh 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C08EF second address: 53C08F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C08F5 second address: 53C0949 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esi, eax 0x0000000a pushad 0x0000000b call 00007F768C6F6325h 0x00000010 pushfd 0x00000011 jmp 00007F768C6F6320h 0x00000016 sub cl, 00000028h 0x00000019 jmp 00007F768C6F631Bh 0x0000001e popfd 0x0000001f pop ecx 0x00000020 mov cx, dx 0x00000023 popad 0x00000024 je 00007F768C6F634Dh 0x0000002a push eax 0x0000002b push edx 0x0000002c pushad 0x0000002d push ecx 0x0000002e pop edi 0x0000002f mov di, cx 0x00000032 popad 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C0949 second address: 53C094F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C09A9 second address: 53C0A11 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F768C6F631Fh 0x00000009 or eax, 73D35D3Eh 0x0000000f jmp 00007F768C6F6329h 0x00000014 popfd 0x00000015 push ecx 0x00000016 pop ebx 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a leave 0x0000001b pushad 0x0000001c pushfd 0x0000001d jmp 00007F768C6F6328h 0x00000022 sub ax, 9168h 0x00000027 jmp 00007F768C6F631Bh 0x0000002c popfd 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 popad 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C0A11 second address: 53B0268 instructions: 0x00000000 rdtsc 0x00000002 mov si, 9E7Bh 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 retn 0004h 0x0000000c nop 0x0000000d sub esp, 04h 0x00000010 xor ebx, ebx 0x00000012 cmp eax, 00000000h 0x00000015 je 00007F768C6F826Ah 0x0000001b mov dword ptr [esp], 0000000Dh 0x00000022 call 00007F7690F844FFh 0x00000027 mov edi, edi 0x00000029 pushad 0x0000002a mov edx, eax 0x0000002c pushad 0x0000002d mov dh, ch 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0268 second address: 53B028A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push esi 0x00000007 jmp 00007F768C6F631Eh 0x0000000c mov dword ptr [esp], ebp 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 mov bx, AE8Eh 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B028A second address: 53B030F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F8114h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007F768C6F8110h 0x00000010 sub esp, 2Ch 0x00000013 pushad 0x00000014 pushad 0x00000015 mov bx, si 0x00000018 mov di, si 0x0000001b popad 0x0000001c pushfd 0x0000001d jmp 00007F768C6F8114h 0x00000022 add si, BB68h 0x00000027 jmp 00007F768C6F810Bh 0x0000002c popfd 0x0000002d popad 0x0000002e xchg eax, ebx 0x0000002f jmp 00007F768C6F8116h 0x00000034 push eax 0x00000035 push eax 0x00000036 push edx 0x00000037 jmp 00007F768C6F810Eh 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B030F second address: 53B0315 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0315 second address: 53B0319 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0319 second address: 53B031D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B04B4 second address: 53B04B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B04B8 second address: 53B04BE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B04BE second address: 53B04C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B04C4 second address: 53B04C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B04C8 second address: 53B04CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0538 second address: 53B053C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B053C second address: 53B0542 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0542 second address: 53B0551 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F768C6F631Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0551 second address: 53B0585 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F8119h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b js 00007F768C6F81C6h 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F768C6F810Dh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0585 second address: 53B0619 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F768C6F6327h 0x00000009 jmp 00007F768C6F6323h 0x0000000e popfd 0x0000000f pushfd 0x00000010 jmp 00007F768C6F6328h 0x00000015 adc ax, 6888h 0x0000001a jmp 00007F768C6F631Bh 0x0000001f popfd 0x00000020 popad 0x00000021 pop edx 0x00000022 pop eax 0x00000023 cmp dword ptr [ebp-14h], edi 0x00000026 jmp 00007F768C6F6326h 0x0000002b jne 00007F76FCF641B7h 0x00000031 push eax 0x00000032 push edx 0x00000033 jmp 00007F768C6F6327h 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0619 second address: 53B067A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F8119h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebx, dword ptr [ebp+08h] 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F768C6F810Ch 0x00000013 xor esi, 244A9FA8h 0x00000019 jmp 00007F768C6F810Bh 0x0000001e popfd 0x0000001f mov di, ax 0x00000022 popad 0x00000023 lea eax, dword ptr [ebp-2Ch] 0x00000026 jmp 00007F768C6F8112h 0x0000002b xchg eax, esi 0x0000002c push eax 0x0000002d push edx 0x0000002e pushad 0x0000002f mov ecx, edi 0x00000031 push eax 0x00000032 push edx 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B067A second address: 53B067F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B067F second address: 53B0710 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F8114h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F768C6F810Bh 0x0000000f xchg eax, esi 0x00000010 pushad 0x00000011 mov dx, ax 0x00000014 mov cx, A657h 0x00000018 popad 0x00000019 nop 0x0000001a jmp 00007F768C6F810Ah 0x0000001f push eax 0x00000020 jmp 00007F768C6F810Bh 0x00000025 nop 0x00000026 jmp 00007F768C6F8116h 0x0000002b xchg eax, ebx 0x0000002c jmp 00007F768C6F8110h 0x00000031 push eax 0x00000032 jmp 00007F768C6F810Bh 0x00000037 xchg eax, ebx 0x00000038 pushad 0x00000039 call 00007F768C6F8114h 0x0000003e push eax 0x0000003f push edx 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0710 second address: 53B072F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 call 00007F768C6F6327h 0x0000000c pop eax 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0008 second address: 53B000C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B000C second address: 53B0012 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0012 second address: 53B005E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F8111h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push ebx 0x0000000e pop eax 0x0000000f pushfd 0x00000010 jmp 00007F768C6F810Fh 0x00000015 and eax, 57C9013Eh 0x0000001b jmp 00007F768C6F8119h 0x00000020 popfd 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B005E second address: 53B0064 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0064 second address: 53B0068 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0068 second address: 53B0105 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F768C6F6326h 0x0000000e xchg eax, ebp 0x0000000f pushad 0x00000010 pushad 0x00000011 mov cl, 86h 0x00000013 mov ebx, 4C635DACh 0x00000018 popad 0x00000019 pushfd 0x0000001a jmp 00007F768C6F6325h 0x0000001f jmp 00007F768C6F631Bh 0x00000024 popfd 0x00000025 popad 0x00000026 mov ebp, esp 0x00000028 jmp 00007F768C6F6326h 0x0000002d xchg eax, ecx 0x0000002e push eax 0x0000002f push edx 0x00000030 pushad 0x00000031 mov di, 5640h 0x00000035 pushfd 0x00000036 jmp 00007F768C6F6329h 0x0000003b or cl, 00000046h 0x0000003e jmp 00007F768C6F6321h 0x00000043 popfd 0x00000044 popad 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0105 second address: 53B0163 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F8111h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F768C6F8117h 0x00000011 sbb ch, 0000002Eh 0x00000014 jmp 00007F768C6F8119h 0x00000019 popfd 0x0000001a call 00007F768C6F8110h 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B020E second address: 53B0226 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F768C6F6324h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0226 second address: 53B024B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 leave 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov bl, ch 0x0000000e call 00007F768C6F8115h 0x00000013 pop ecx 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0BC0 second address: 53B0BC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0BC7 second address: 53B0BCD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0BCD second address: 53B0C0E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007F768C6F6329h 0x00000012 or cx, 43F6h 0x00000017 jmp 00007F768C6F6321h 0x0000001c popfd 0x0000001d movzx esi, dx 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0C0E second address: 53B0C4F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F810Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F768C6F810Bh 0x0000000f xchg eax, ebp 0x00000010 jmp 00007F768C6F8116h 0x00000015 mov ebp, esp 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F768C6F810Ah 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0C4F second address: 53B0C53 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0C53 second address: 53B0C59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0C59 second address: 53B0C5F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0C5F second address: 53B0C63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0C63 second address: 53B0C84 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 cmp dword ptr [75C7459Ch], 05h 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F768C6F631Eh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0C84 second address: 53B0C8A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0C8A second address: 53B0CBB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F631Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F76FCF54079h 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F768C6F6327h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0CBB second address: 53B0CF9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, 5ADF080Ah 0x00000008 pushfd 0x00000009 jmp 00007F768C6F810Bh 0x0000000e or eax, 09DD2EAEh 0x00000014 jmp 00007F768C6F8119h 0x00000019 popfd 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d pop ebp 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0CF9 second address: 53B0CFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0CFD second address: 53B0D03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0D58 second address: 53B0DDC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, 17E7h 0x00000007 call 00007F768C6F631Ch 0x0000000c pop esi 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 add dword ptr [esp], 05677A2Ah 0x00000017 jmp 00007F768C6F6321h 0x0000001c call 00007F76FCF5B101h 0x00000021 push 75C12B70h 0x00000026 push dword ptr fs:[00000000h] 0x0000002d mov eax, dword ptr [esp+10h] 0x00000031 mov dword ptr [esp+10h], ebp 0x00000035 lea ebp, dword ptr [esp+10h] 0x00000039 sub esp, eax 0x0000003b push ebx 0x0000003c push esi 0x0000003d push edi 0x0000003e mov eax, dword ptr [75C74538h] 0x00000043 xor dword ptr [ebp-04h], eax 0x00000046 xor eax, ebp 0x00000048 push eax 0x00000049 mov dword ptr [ebp-18h], esp 0x0000004c push dword ptr [ebp-08h] 0x0000004f mov eax, dword ptr [ebp-04h] 0x00000052 mov dword ptr [ebp-04h], FFFFFFFEh 0x00000059 mov dword ptr [ebp-08h], eax 0x0000005c lea eax, dword ptr [ebp-10h] 0x0000005f mov dword ptr fs:[00000000h], eax 0x00000065 ret 0x00000066 jmp 00007F768C6F631Eh 0x0000006b sub esi, esi 0x0000006d jmp 00007F768C6F6321h 0x00000072 mov dword ptr [ebp-1Ch], esi 0x00000075 push eax 0x00000076 push edx 0x00000077 pushad 0x00000078 pushfd 0x00000079 jmp 00007F768C6F6323h 0x0000007e jmp 00007F768C6F6323h 0x00000083 popfd 0x00000084 popad 0x00000085 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0DDC second address: 53B0DE2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53B0DE2 second address: 53B0DE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C0A7A second address: 53C0A8D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop edi 0x00000005 mov dx, cx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C0A8D second address: 53C0AA6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F6325h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C0AA6 second address: 53C0AAC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C0AAC second address: 53C0AB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C0AB0 second address: 53C0AB4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C0AB4 second address: 53C0B00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 pushad 0x0000000a pushad 0x0000000b mov di, ax 0x0000000e mov dx, ax 0x00000011 popad 0x00000012 mov edx, esi 0x00000014 popad 0x00000015 mov dword ptr [esp], esi 0x00000018 pushad 0x00000019 push eax 0x0000001a call 00007F768C6F6327h 0x0000001f pop eax 0x00000020 pop edx 0x00000021 mov ax, C3B5h 0x00000025 popad 0x00000026 mov esi, dword ptr [ebp+0Ch] 0x00000029 pushad 0x0000002a mov di, ax 0x0000002d mov esi, 17552A69h 0x00000032 popad 0x00000033 test esi, esi 0x00000035 push eax 0x00000036 push edx 0x00000037 pushad 0x00000038 push eax 0x00000039 push edx 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C0B00 second address: 53C0B0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov edx, 63E40E52h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C0B0A second address: 53C0BD3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F6328h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F76FCF43BA7h 0x0000000f pushad 0x00000010 call 00007F768C6F631Eh 0x00000015 push esi 0x00000016 pop edx 0x00000017 pop eax 0x00000018 pushfd 0x00000019 jmp 00007F768C6F6327h 0x0000001e or si, 385Eh 0x00000023 jmp 00007F768C6F6329h 0x00000028 popfd 0x00000029 popad 0x0000002a cmp dword ptr [75C7459Ch], 05h 0x00000031 pushad 0x00000032 jmp 00007F768C6F631Ch 0x00000037 movzx esi, bx 0x0000003a popad 0x0000003b je 00007F76FCF5BC1Fh 0x00000041 pushad 0x00000042 mov dx, 926Eh 0x00000046 push edi 0x00000047 pushfd 0x00000048 jmp 00007F768C6F6322h 0x0000004d add ax, 46B8h 0x00000052 jmp 00007F768C6F631Bh 0x00000057 popfd 0x00000058 pop esi 0x00000059 popad 0x0000005a push eax 0x0000005b pushad 0x0000005c movzx ecx, di 0x0000005f mov dl, 3Bh 0x00000061 popad 0x00000062 mov dword ptr [esp], esi 0x00000065 push eax 0x00000066 push edx 0x00000067 pushad 0x00000068 pushad 0x00000069 popad 0x0000006a pushad 0x0000006b popad 0x0000006c popad 0x0000006d rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | RDTSC instruction interceptor: First address: 53C0C45 second address: 53C0C63 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F768C6F8111h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov eax, edi 0x0000000f push ebx 0x00000010 pop ecx 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddfffla | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifd | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnf | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.db | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.json | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpak | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |
Source: C:\Users\user\Desktop\SFtDA07UDr.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj | Jump to behavior |