Source: fnCae9FQhg.exe, 00000001.00000003.2506607339.0000000000979000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000002.2570535052.0000000000979000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exe |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057CD000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506607339.0000000000972000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: fnCae9FQhg.exe, 00000001.00000003.2309216569.00000000057F3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: fnCae9FQhg.exe, 00000001.00000003.2309216569.00000000057F3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057CD000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506607339.0000000000972000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057CD000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506607339.0000000000972000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057CD000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506607339.0000000000972000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: fnCae9FQhg.exe, 00000001.00000003.2309216569.00000000057F3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057CD000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506607339.0000000000972000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: fnCae9FQhg.exe, 00000001.00000003.2309216569.00000000057F3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: fnCae9FQhg.exe, 00000001.00000003.2309216569.00000000057F3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057CD000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506607339.0000000000972000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057CD000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506607339.0000000000972000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: fnCae9FQhg.exe, 00000001.00000003.2309216569.00000000057F3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: fnCae9FQhg.exe, 00000001.00000003.2309216569.00000000057F3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: fnCae9FQhg.exe, 00000001.00000002.2573643849.0000000005EB9000.00000002.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506188966.0000000005876000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: fnCae9FQhg.exe, 00000001.00000003.2309216569.00000000057F3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057CD000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506607339.0000000000972000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0A |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057CD000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506607339.0000000000972000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0C |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057CD000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506607339.0000000000972000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0X |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057CD000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506607339.0000000000972000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/rootr30; |
Source: fnCae9FQhg.exe, 00000001.00000003.2309216569.00000000057F3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057CD000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506607339.0000000000972000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06 |
Source: Amcache.hve.6.dr | String found in binary or memory: http://upx.sf.net |
Source: fnCae9FQhg.exe, 00000001.00000003.2309216569.00000000057F3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: fnCae9FQhg.exe, 00000001.00000003.2309216569.00000000057F3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: fnCae9FQhg.exe, 00000001.00000003.2256988736.000000000580B000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2255629205.000000000580E000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2258466145.000000000580B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: fnCae9FQhg.exe, 00000001.00000003.2506669532.0000000000953000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aui-cdn.atlassian.com/ |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-exp.prod-east.frontend.public.atl-paas.net |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/ |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/; |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/ |
Source: fnCae9FQhg.exe, 00000001.00000002.2570241622.000000000096E000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506669532.0000000000955000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506709241.0000000000969000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/ |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1- |
Source: fnCae9FQhg.exe, 00000001.00000002.2570241622.0000000000955000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506669532.0000000000955000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000002.2570241622.0000000000915000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000002.2570241622.00000000008F3000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe |
Source: fnCae9FQhg.exe, 00000001.00000002.2570223927.000000000085A000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe.0 |
Source: fnCae9FQhg.exe, 00000001.00000003.2311137046.00000000057CF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189. |
Source: fnCae9FQhg.exe, 00000001.00000003.2311137046.00000000057CF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta |
Source: fnCae9FQhg.exe, 00000001.00000003.2506669532.0000000000953000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.cookielaw.org/ |
Source: fnCae9FQhg.exe, 00000001.00000003.2256988736.000000000580B000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2255629205.000000000580E000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2258466145.000000000580B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: fnCae9FQhg.exe, 00000001.00000003.2256988736.000000000580B000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2255629205.000000000580E000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2258466145.000000000580B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: fnCae9FQhg.exe, 00000001.00000003.2256988736.000000000580B000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2255629205.000000000580E000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2258466145.000000000580B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: fnCae9FQhg.exe, 00000001.00000003.2311137046.00000000057CF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg |
Source: fnCae9FQhg.exe, 00000001.00000003.2311137046.00000000057CF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: fnCae9FQhg.exe, 00000001.00000003.2256988736.000000000580B000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2255629205.000000000580E000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2258466145.000000000580B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: fnCae9FQhg.exe, 00000001.00000003.2256988736.000000000580B000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2255629205.000000000580E000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2258466145.000000000580B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: fnCae9FQhg.exe, 00000001.00000003.2256988736.000000000580B000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2255629205.000000000580E000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2258466145.000000000580B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: fnCae9FQhg.exe, 00000001.00000002.2570241622.0000000000915000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://dz8aopenkvv6s.cloudfront.net |
Source: fnCae9FQhg.exe, 00000001.00000003.2311137046.00000000057CF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi |
Source: fnCae9FQhg.exe, 00000001.00000002.2570241622.0000000000915000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2361173008.000000000096E000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2364529673.000000000096E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/ |
Source: fnCae9FQhg.exe, 00000001.00000002.2570241622.0000000000915000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2414518158.0000000000979000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2365046031.0000000000979000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2361076263.0000000000979000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/api |
Source: fnCae9FQhg.exe, 00000001.00000003.2365046031.0000000000979000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apiC |
Source: fnCae9FQhg.exe, 00000001.00000002.2570241622.0000000000915000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apibP |
Source: fnCae9FQhg.exe, 00000001.00000003.2361076263.0000000000979000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apie3 |
Source: fnCae9FQhg.exe, 00000001.00000002.2570241622.0000000000915000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apix=0 |
Source: fnCae9FQhg.exe, 00000001.00000002.2570241622.0000000000915000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apiype- |
Source: fnCae9FQhg.exe, 00000001.00000003.2361173008.000000000096E000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2364529673.000000000096E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/es |
Source: fnCae9FQhg.exe, 00000001.00000003.2365135377.000000000096E000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2414674758.000000000096E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/ic |
Source: fnCae9FQhg.exe, 00000001.00000003.2365135377.000000000096E000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000002.2570241622.000000000096E000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2414674758.000000000096E000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506669532.0000000000955000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506709241.0000000000969000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/ks(; |
Source: fnCae9FQhg.exe, 00000001.00000003.2365135377.000000000096E000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2414674758.000000000096E000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2361173008.000000000096E000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2364529673.000000000096E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/ksp; |
Source: fnCae9FQhg.exe, 00000001.00000002.2570241622.0000000000915000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/pi |
Source: fnCae9FQhg.exe, 00000001.00000003.2361173008.000000000096E000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2364529673.000000000096E000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/r8; |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.prod-east.frontend.public.atl-paas.net |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net |
Source: fnCae9FQhg.exe, 00000001.00000003.2310692867.00000000058DF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: fnCae9FQhg.exe, 00000001.00000003.2310692867.00000000058DF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: fnCae9FQhg.exe, 00000001.00000003.2506669532.0000000000953000.00000004.00000020.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057C0000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website |
Source: fnCae9FQhg.exe, 00000001.00000003.2506669532.0000000000953000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-websiteX-Frame-OptionsSAMEORIGINX- |
Source: fnCae9FQhg.exe, 00000001.00000003.2311137046.00000000057CF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3 |
Source: fnCae9FQhg.exe, 00000001.00000003.2256988736.000000000580B000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2255629205.000000000580E000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2258466145.000000000580B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: fnCae9FQhg.exe, 00000001.00000002.2573222229.00000000057CD000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2506607339.0000000000972000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: fnCae9FQhg.exe, 00000001.00000003.2256988736.000000000580B000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2255629205.000000000580E000.00000004.00000800.00020000.00000000.sdmp, fnCae9FQhg.exe, 00000001.00000003.2258466145.000000000580B000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: fnCae9FQhg.exe, 00000001.00000003.2311059794.00000000057EF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.or |
Source: fnCae9FQhg.exe, 00000001.00000003.2311059794.00000000057EF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org |
Source: fnCae9FQhg.exe, 00000001.00000003.2310692867.00000000058DF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle |
Source: fnCae9FQhg.exe, 00000001.00000003.2310692867.00000000058DF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ |
Source: fnCae9FQhg.exe, 00000001.00000003.2310692867.00000000058DF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: fnCae9FQhg.exe, 00000001.00000003.2311137046.00000000057CF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_ |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: A192CE second address: A192D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B9AD5A second address: B9AD5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B9AD5E second address: B9AD7B instructions: 0x00000000 rdtsc 0x00000002 jo 00007F1BB4D69EA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnl 00007F1BB4D69EAEh 0x00000010 push ecx 0x00000011 push eax 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B9B3EE second address: B9B3F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B9B3F4 second address: B9B3F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B9B3F8 second address: B9B402 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F1BB4E5F526h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B9B574 second address: B9B584 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007F1BB4D69EABh 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B9B584 second address: B9B5BA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4E5F531h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jbe 00007F1BB4E5F539h 0x00000011 push eax 0x00000012 push edx 0x00000013 push esi 0x00000014 pop esi 0x00000015 push eax 0x00000016 pop eax 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B9B5BA second address: B9B5C9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EABh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B9B5C9 second address: B9B5CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B9B5CF second address: B9B5FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1BB4D69EAEh 0x00000009 jmp 00007F1BB4D69EB9h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B9F1BC second address: B9F1C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B9F286 second address: B9F28C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B9F457 second address: B9F4D5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 xor dword ptr [esp], 1894DCBBh 0x0000000e push 00000000h 0x00000010 push eax 0x00000011 call 00007F1BB4E5F528h 0x00000016 pop eax 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b add dword ptr [esp+04h], 00000017h 0x00000023 inc eax 0x00000024 push eax 0x00000025 ret 0x00000026 pop eax 0x00000027 ret 0x00000028 lea ebx, dword ptr [ebp+1245A129h] 0x0000002e call 00007F1BB4E5F539h 0x00000033 call 00007F1BB4E5F52Ch 0x00000038 jmp 00007F1BB4E5F535h 0x0000003d pop ecx 0x0000003e pop esi 0x0000003f xchg eax, ebx 0x00000040 push eax 0x00000041 push edx 0x00000042 jp 00007F1BB4E5F52Ch 0x00000048 jg 00007F1BB4E5F526h 0x0000004e rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B9F4D5 second address: B9F4DC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B9F5A9 second address: B9F5D1 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F1BB4E5F533h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e pushad 0x0000000f push eax 0x00000010 ja 00007F1BB4E5F526h 0x00000016 pop eax 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a pop eax 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B9F5D1 second address: B9F695 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EAFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov eax, dword ptr [eax] 0x0000000c push edi 0x0000000d pushad 0x0000000e jmp 00007F1BB4D69EAAh 0x00000013 jnl 00007F1BB4D69EA6h 0x00000019 popad 0x0000001a pop edi 0x0000001b mov dword ptr [esp+04h], eax 0x0000001f jns 00007F1BB4D69EBEh 0x00000025 pop eax 0x00000026 movzx esi, bx 0x00000029 push 00000003h 0x0000002b mov di, ax 0x0000002e push 00000000h 0x00000030 movsx edx, bx 0x00000033 push 00000003h 0x00000035 push 00000000h 0x00000037 push ebp 0x00000038 call 00007F1BB4D69EA8h 0x0000003d pop ebp 0x0000003e mov dword ptr [esp+04h], ebp 0x00000042 add dword ptr [esp+04h], 00000016h 0x0000004a inc ebp 0x0000004b push ebp 0x0000004c ret 0x0000004d pop ebp 0x0000004e ret 0x0000004f mov dword ptr [ebp+122D1CAFh], ecx 0x00000055 call 00007F1BB4D69EA9h 0x0000005a push edx 0x0000005b jmp 00007F1BB4D69EB3h 0x00000060 pop edx 0x00000061 push eax 0x00000062 jmp 00007F1BB4D69EB7h 0x00000067 mov eax, dword ptr [esp+04h] 0x0000006b push eax 0x0000006c push edx 0x0000006d jne 00007F1BB4D69EA8h 0x00000073 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BB1407 second address: BB1416 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BB1416 second address: BB141C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBF97B second address: BBF9A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1BB4E5F539h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jbe 00007F1BB4E5F526h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBF9A3 second address: BBF9A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBF9A7 second address: BBF9B1 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F1BB4E5F526h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBF9B1 second address: BBF9E0 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007F1BB4D69EAEh 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F1BB4D69EB8h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBD90C second address: BBD912 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBD912 second address: BBD916 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBD916 second address: BBD91A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBD91A second address: BBD920 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBD920 second address: BBD939 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F1BB4E5F526h 0x0000000a jmp 00007F1BB4E5F52Fh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBDBFF second address: BBDC09 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBDC09 second address: BBDC2D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007F1BB4E5F52Ah 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jmp 00007F1BB4E5F52Ch 0x00000015 pushad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBDC2D second address: BBDC32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBE072 second address: BBE08C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1BB4E5F534h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBE08C second address: BBE090 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBE090 second address: BBE094 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBE1EC second address: BBE1F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBE8C6 second address: BBE8CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBE8CC second address: BBE8D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBE8D2 second address: BBE8D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BB5F48 second address: BB5F54 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F1BB4D69EA6h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B918C9 second address: B918DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b ja 00007F1BB4E5F526h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B918DA second address: B918F2 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F1BB4D69EA6h 0x00000008 jmp 00007F1BB4D69EAAh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBF0C1 second address: BBF0C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBF0C5 second address: BBF0F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1BB4D69EB3h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F1BB4D69EB2h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBF0F3 second address: BBF10F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4E5F537h 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBF10F second address: BBF115 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBF3E6 second address: BBF3EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBF3EC second address: BBF3F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBF3F2 second address: BBF3F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBF3F6 second address: BBF404 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnc 00007F1BB4D69EA6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBF404 second address: BBF408 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBF408 second address: BBF40E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BBF7FC second address: BBF802 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BC2114 second address: BC2119 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BC2119 second address: BC211F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BC5169 second address: BC516D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BC516D second address: BC5188 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F1BB4E5F526h 0x00000008 jns 00007F1BB4E5F526h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jg 00007F1BB4E5F528h 0x00000016 push ebx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BC5188 second address: BC518E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B8AC91 second address: B8AC9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F1BB4E5F526h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B8AC9B second address: B8ACCA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EB6h 0x00000007 js 00007F1BB4D69EA6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jmp 00007F1BB4D69EAFh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCB927 second address: BCB92D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCB92D second address: BCB938 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCB938 second address: BCB93C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCB93C second address: BCB940 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCB940 second address: BCB992 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1BB4E5F531h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push edi 0x00000010 pop edi 0x00000011 pushad 0x00000012 popad 0x00000013 pushad 0x00000014 popad 0x00000015 popad 0x00000016 pushad 0x00000017 jmp 00007F1BB4E5F535h 0x0000001c jmp 00007F1BB4E5F539h 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCAF90 second address: BCAF94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCB4F3 second address: BCB4F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCB4F7 second address: BCB511 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EB6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCB65D second address: BCB68F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1BB4E5F52Dh 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c pop edx 0x0000000d pushad 0x0000000e jng 00007F1BB4E5F538h 0x00000014 jmp 00007F1BB4E5F532h 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCB68F second address: BCB693 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCB693 second address: BCB697 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCE94B second address: BCE94F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCE94F second address: BCE959 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F1BB4E5F526h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCE959 second address: BCE95E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCF116 second address: BCF12A instructions: 0x00000000 rdtsc 0x00000002 jl 00007F1BB4E5F526h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jc 00007F1BB4E5F530h 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCF21E second address: BCF224 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCF224 second address: BCF228 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCF3B5 second address: BCF3C3 instructions: 0x00000000 rdtsc 0x00000002 js 00007F1BB4D69EA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCF3C3 second address: BCF3D5 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F1BB4E5F526h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCF3D5 second address: BCF3DB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCF4C8 second address: BCF4D2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD1F7D second address: BD1F87 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F1BB4D69EA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD1F87 second address: BD1F8D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD1F8D second address: BD1F91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD1F91 second address: BD1FB2 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F1BB4E5F526h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d js 00007F1BB4E5F539h 0x00000013 pushad 0x00000014 jmp 00007F1BB4E5F52Bh 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD1FB2 second address: BD2002 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 nop 0x00000006 push 00000000h 0x00000008 push ebx 0x00000009 call 00007F1BB4D69EA8h 0x0000000e pop ebx 0x0000000f mov dword ptr [esp+04h], ebx 0x00000013 add dword ptr [esp+04h], 00000016h 0x0000001b inc ebx 0x0000001c push ebx 0x0000001d ret 0x0000001e pop ebx 0x0000001f ret 0x00000020 pushad 0x00000021 mov dword ptr [ebp+122D1FA4h], ecx 0x00000027 mov cx, bx 0x0000002a popad 0x0000002b mov esi, dword ptr [ebp+122D2B71h] 0x00000031 push 00000000h 0x00000033 mov esi, dword ptr [ebp+122D1CDDh] 0x00000039 push 00000000h 0x0000003b cld 0x0000003c push eax 0x0000003d push eax 0x0000003e push edx 0x0000003f push esi 0x00000040 jmp 00007F1BB4D69EABh 0x00000045 pop esi 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD2002 second address: BD2007 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD2AB5 second address: BD2ABB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD2ABB second address: BD2AC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD2AC0 second address: BD2AD6 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F1BB4D69EA8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jg 00007F1BB4D69EA6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD3617 second address: BD361C instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD7255 second address: BD726D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1BB4D69EB4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD7864 second address: BD787E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1BB4E5F535h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD787E second address: BD7890 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1BB4D69EAEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD8A5F second address: BD8A69 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F1BB4E5F526h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD9B89 second address: BD9B8F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD9B8F second address: BD9BB6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F1BB4E5F539h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BDCC17 second address: BDCC21 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007F1BB4D69EA6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BDCC21 second address: BDCC8C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F1BB4E5F533h 0x0000000e nop 0x0000000f jc 00007F1BB4E5F52Ch 0x00000015 mov dword ptr [ebp+122D26C2h], edx 0x0000001b push 00000000h 0x0000001d mov dword ptr [ebp+122D2927h], esi 0x00000023 push 00000000h 0x00000025 push 00000000h 0x00000027 push eax 0x00000028 call 00007F1BB4E5F528h 0x0000002d pop eax 0x0000002e mov dword ptr [esp+04h], eax 0x00000032 add dword ptr [esp+04h], 0000001Bh 0x0000003a inc eax 0x0000003b push eax 0x0000003c ret 0x0000003d pop eax 0x0000003e ret 0x0000003f xchg eax, esi 0x00000040 push ecx 0x00000041 jnl 00007F1BB4E5F52Ch 0x00000047 pop ecx 0x00000048 push eax 0x00000049 push eax 0x0000004a push edx 0x0000004b push edx 0x0000004c push eax 0x0000004d push edx 0x0000004e rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BDCC8C second address: BDCC91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BDED42 second address: BDED46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BDDE3C second address: BDDE6B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EACh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c pop edi 0x0000000d popad 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F1BB4D69EB5h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BDED46 second address: BDED4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BDDE6B second address: BDDE71 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BDF013 second address: BDF025 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ecx 0x0000000b jne 00007F1BB4E5F526h 0x00000011 pop ecx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BDF025 second address: BDF02B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BDF02B second address: BDF02F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BDF02F second address: BDF033 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE1C9F second address: BE1CA3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE1CA3 second address: BE1CB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 pushad 0x00000008 popad 0x00000009 pop esi 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE1CB6 second address: BE1CBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE1CBB second address: BE1CC0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE2BD2 second address: BE2BD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE5E22 second address: BE5E2C instructions: 0x00000000 rdtsc 0x00000002 jg 00007F1BB4D69EA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE5E2C second address: BE5E32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE1DEC second address: BE1DF6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F1BB4D69EA6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE2D22 second address: BE2DA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop esi 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push eax 0x0000000c call 00007F1BB4E5F528h 0x00000011 pop eax 0x00000012 mov dword ptr [esp+04h], eax 0x00000016 add dword ptr [esp+04h], 00000019h 0x0000001e inc eax 0x0000001f push eax 0x00000020 ret 0x00000021 pop eax 0x00000022 ret 0x00000023 mov bl, D2h 0x00000025 push dword ptr fs:[00000000h] 0x0000002c mov dword ptr [ebp+122D34C6h], esi 0x00000032 mov dword ptr fs:[00000000h], esp 0x00000039 mov ebx, dword ptr [ebp+122D365Eh] 0x0000003f mov eax, dword ptr [ebp+122D0D99h] 0x00000045 sub dword ptr [ebp+122D32A5h], eax 0x0000004b push FFFFFFFFh 0x0000004d push 00000000h 0x0000004f push ebp 0x00000050 call 00007F1BB4E5F528h 0x00000055 pop ebp 0x00000056 mov dword ptr [esp+04h], ebp 0x0000005a add dword ptr [esp+04h], 0000001Ch 0x00000062 inc ebp 0x00000063 push ebp 0x00000064 ret 0x00000065 pop ebp 0x00000066 ret 0x00000067 push ebx 0x00000068 mov dword ptr [ebp+122D3349h], esi 0x0000006e pop ebx 0x0000006f push eax 0x00000070 push eax 0x00000071 push edx 0x00000072 push eax 0x00000073 push edx 0x00000074 pushad 0x00000075 popad 0x00000076 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE3D45 second address: BE3D49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE2DA9 second address: BE2DB3 instructions: 0x00000000 rdtsc 0x00000002 je 00007F1BB4E5F526h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE3D49 second address: BE3D5E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jng 00007F1BB4D69EACh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE2DB3 second address: BE2DB8 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE3D5E second address: BE3D7A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1BB4D69EB8h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE7E2A second address: BE7E53 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4E5F52Fh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop eax 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F1BB4E5F52Eh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE3D7A second address: BE3D7E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE7E53 second address: BE7E57 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE7E57 second address: BE7E5B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BE6075 second address: BE6079 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BEDB1E second address: BEDB24 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BEDB24 second address: BEDB2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F1BB4E5F526h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BEDB2E second address: BEDB32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BEF1ED second address: BEF270 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1BB4E5F52Bh 0x00000009 pushad 0x0000000a popad 0x0000000b jbe 00007F1BB4E5F526h 0x00000011 popad 0x00000012 jmp 00007F1BB4E5F535h 0x00000017 push edi 0x00000018 jmp 00007F1BB4E5F532h 0x0000001d jmp 00007F1BB4E5F537h 0x00000022 pop edi 0x00000023 jnp 00007F1BB4E5F52Ah 0x00000029 pushad 0x0000002a popad 0x0000002b push edx 0x0000002c pop edx 0x0000002d popad 0x0000002e push eax 0x0000002f push edx 0x00000030 pushad 0x00000031 jmp 00007F1BB4E5F535h 0x00000036 jl 00007F1BB4E5F526h 0x0000003c push eax 0x0000003d push edx 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BEF270 second address: BEF277 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B89128 second address: B8912E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B8912E second address: B89146 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 push esi 0x00000007 js 00007F1BB4D69EA6h 0x0000000d pop esi 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 pushad 0x00000012 popad 0x00000013 pop edx 0x00000014 push eax 0x00000015 push edx 0x00000016 push ebx 0x00000017 pop ebx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B8C7CA second address: B8C7CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BF3006 second address: BF300B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BF300B second address: BF3011 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BF317F second address: BF3189 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F1BB4D69EA6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BF3189 second address: BF319E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007F1BB4E5F52Bh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BF319E second address: BF31A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BF31A4 second address: BF31A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B8411F second address: B8412C instructions: 0x00000000 rdtsc 0x00000002 jg 00007F1BB4D69EA6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B8412C second address: B84135 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BF8405 second address: BF8409 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BF8409 second address: BF8425 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4E5F532h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BF8425 second address: BF842A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BF842A second address: BF844D instructions: 0x00000000 rdtsc 0x00000002 jp 00007F1BB4E5F528h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 jmp 00007F1BB4E5F52Bh 0x00000015 mov eax, dword ptr [eax] 0x00000017 push eax 0x00000018 push edx 0x00000019 push esi 0x0000001a pushad 0x0000001b popad 0x0000001c pop esi 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BF844D second address: BF8458 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 js 00007F1BB4D69EA6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BF8458 second address: BF8468 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BF854F second address: BF8555 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BF8555 second address: BF8559 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BFDD58 second address: BFDD71 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EB3h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BFDD71 second address: BFDD80 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BFDD80 second address: BFDD84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BFDFFE second address: BFE004 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BFE004 second address: BFE037 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a jmp 00007F1BB4D69EB1h 0x0000000f jmp 00007F1BB4D69EB4h 0x00000014 popad 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BFE197 second address: BFE19E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop esi 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BFE19E second address: BFE1C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 ja 00007F1BB4D69EA6h 0x00000009 jp 00007F1BB4D69EA6h 0x0000000f pop eax 0x00000010 jmp 00007F1BB4D69EADh 0x00000015 pop edx 0x00000016 pop eax 0x00000017 pushad 0x00000018 jo 00007F1BB4D69EBBh 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BFE346 second address: BFE34A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BFE34A second address: BFE350 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BFE4D0 second address: BFE4D5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BFE4D5 second address: BFE4DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BFE778 second address: BFE786 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F1BB4E5F526h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BFE786 second address: BFE79C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EB2h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C04BA6 second address: C04BC3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F1BB4E5F537h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C04BC3 second address: C04BCE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jl 00007F1BB4D69EA6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C04BCE second address: C04BDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F1BB4E5F526h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C037CA second address: C037DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jc 00007F1BB4D69EA6h 0x0000000f push eax 0x00000010 pop eax 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C037DB second address: C037ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a ja 00007F1BB4E5F526h 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C03A9A second address: C03ABC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F1BB4D69EA6h 0x0000000a jmp 00007F1BB4D69EB2h 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C03ABC second address: C03AC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C03AC0 second address: C03AE3 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push ebx 0x00000008 pushad 0x00000009 jp 00007F1BB4D69EA6h 0x0000000f jmp 00007F1BB4D69EADh 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C03AE3 second address: C03AE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C0414E second address: C04160 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jc 00007F1BB4D69EACh 0x0000000c je 00007F1BB4D69EA6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C04160 second address: C04172 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F1BB4E5F52Ah 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C04172 second address: C04176 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C04176 second address: C0417A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD1D33 second address: BD1D37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C042E1 second address: C0430F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F1BB4E5F538h 0x0000000b pushad 0x0000000c ja 00007F1BB4E5F526h 0x00000012 push ebx 0x00000013 pop ebx 0x00000014 popad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 push edi 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C0430F second address: C04315 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C04315 second address: C04337 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jng 00007F1BB4E5F53Dh 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007F1BB4E5F535h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C045CC second address: C045D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C045D2 second address: C045D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C0715D second address: C07161 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C0B35D second address: C0B364 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C0B364 second address: C0B36F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C0B36F second address: C0B3AD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4E5F52Dh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jg 00007F1BB4E5F537h 0x00000015 pushad 0x00000016 jp 00007F1BB4E5F526h 0x0000001c jne 00007F1BB4E5F526h 0x00000022 push esi 0x00000023 pop esi 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCD117 second address: BCD11B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCD9D9 second address: BCDA39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push eax 0x00000007 pop eax 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b popad 0x0000000c nop 0x0000000d push 00000004h 0x0000000f push 00000000h 0x00000011 push ebp 0x00000012 call 00007F1BB4E5F528h 0x00000017 pop ebp 0x00000018 mov dword ptr [esp+04h], ebp 0x0000001c add dword ptr [esp+04h], 0000001Bh 0x00000024 inc ebp 0x00000025 push ebp 0x00000026 ret 0x00000027 pop ebp 0x00000028 ret 0x00000029 or dword ptr [ebp+122D28C1h], ecx 0x0000002f nop 0x00000030 push edi 0x00000031 jo 00007F1BB4E5F531h 0x00000037 jmp 00007F1BB4E5F52Bh 0x0000003c pop edi 0x0000003d push eax 0x0000003e push eax 0x0000003f push edx 0x00000040 jmp 00007F1BB4E5F531h 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCDA39 second address: BCDA3F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C0AA19 second address: C0AA27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jnp 00007F1BB4E5F526h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C0AEDF second address: C0AEEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 pushad 0x00000008 jbe 00007F1BB4D69EA6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B9501A second address: B9501E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C0FA25 second address: C0FA2B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C0FA2B second address: C0FA31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C0FA31 second address: C0FA38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C0FA38 second address: C0FA40 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C0FA40 second address: C0FA44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C1015D second address: C1017D instructions: 0x00000000 rdtsc 0x00000002 jc 00007F1BB4E5F526h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007F1BB4E5F532h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C1017D second address: C10190 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EAFh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C10460 second address: C1046B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007F1BB4E5F526h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C1046B second address: C10482 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1BB4D69EB1h 0x00000009 push eax 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C10482 second address: C10488 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C10488 second address: C10491 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C10491 second address: C104C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1BB4E5F537h 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F1BB4E5F52Ch 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 push esi 0x00000017 pop esi 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C104C4 second address: C104C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C13369 second address: C13373 instructions: 0x00000000 rdtsc 0x00000002 je 00007F1BB4E5F526h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C13373 second address: C13383 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F1BB4D69EB2h 0x00000008 jns 00007F1BB4D69EA6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B96A7D second address: B96A89 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 jns 00007F1BB4E5F526h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C166CD second address: C166D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C166D5 second address: C16722 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1BB4E5F538h 0x00000009 jmp 00007F1BB4E5F537h 0x0000000e jmp 00007F1BB4E5F534h 0x00000013 popad 0x00000014 push esi 0x00000015 push edx 0x00000016 pop edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B85C11 second address: B85C17 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B85C17 second address: B85C21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 pop eax 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B85C21 second address: B85C3C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007F1BB4D69EB6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B85C3C second address: B85C45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push esi 0x00000008 pop esi 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: B85C45 second address: B85C4B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C18AD4 second address: C18AD8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C18702 second address: C18710 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F1BB4D69EA6h 0x0000000a popad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C1B47C second address: C1B4A6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4E5F538h 0x00000007 jng 00007F1BB4E5F526h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 je 00007F1BB4E5F526h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C21C62 second address: C21C66 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C21C66 second address: C21C8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1BB4E5F531h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edx 0x0000000c jmp 00007F1BB4E5F52Bh 0x00000011 pushad 0x00000012 popad 0x00000013 pop edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C21C8C second address: C21C9C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1BB4D69EAAh 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C20852 second address: C2086F instructions: 0x00000000 rdtsc 0x00000002 je 00007F1BB4E5F537h 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C2086F second address: C20883 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1BB4D69EB0h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C20C6E second address: C20C83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1BB4E5F530h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C20C83 second address: C20C9B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EB1h 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCDBF9 second address: BCDC64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push eax 0x0000000a call 00007F1BB4E5F528h 0x0000000f pop eax 0x00000010 mov dword ptr [esp+04h], eax 0x00000014 add dword ptr [esp+04h], 00000017h 0x0000001c inc eax 0x0000001d push eax 0x0000001e ret 0x0000001f pop eax 0x00000020 ret 0x00000021 mov dword ptr [ebp+122D2E23h], ecx 0x00000027 mov dword ptr [ebp+1246AFE8h], edx 0x0000002d push 00000004h 0x0000002f push 00000000h 0x00000031 push esi 0x00000032 call 00007F1BB4E5F528h 0x00000037 pop esi 0x00000038 mov dword ptr [esp+04h], esi 0x0000003c add dword ptr [esp+04h], 0000001Ch 0x00000044 inc esi 0x00000045 push esi 0x00000046 ret 0x00000047 pop esi 0x00000048 ret 0x00000049 push ecx 0x0000004a mov ecx, esi 0x0000004c pop edx 0x0000004d nop 0x0000004e push eax 0x0000004f push edx 0x00000050 jg 00007F1BB4E5F52Ch 0x00000056 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C24B66 second address: C24B7B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F1BB4D69EB0h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C24D0F second address: C24D33 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F1BB4E5F52Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F1BB4E5F52Ah 0x00000011 jp 00007F1BB4E5F52Eh 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C24D33 second address: C24D39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C24D39 second address: C24D4F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4E5F531h 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C252E7 second address: C25303 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F1BB4D69EAEh 0x0000000a pop esi 0x0000000b jo 00007F1BB4D69EACh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C28BBF second address: C28BC5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C28BC5 second address: C28BD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jns 00007F1BB4D69EA8h 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C28D2D second address: C28D32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C28D32 second address: C28D42 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1BB4D69EACh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C28E8E second address: C28EB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 je 00007F1BB4E5F526h 0x0000000d jmp 00007F1BB4E5F536h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C3054A second address: C30550 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C30550 second address: C30554 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCCF45 second address: BCCF49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BCCF49 second address: BB5F48 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push edx 0x0000000c call 00007F1BB4E5F528h 0x00000011 pop edx 0x00000012 mov dword ptr [esp+04h], edx 0x00000016 add dword ptr [esp+04h], 00000017h 0x0000001e inc edx 0x0000001f push edx 0x00000020 ret 0x00000021 pop edx 0x00000022 ret 0x00000023 mov dword ptr [ebp+122D2209h], esi 0x00000029 call dword ptr [ebp+122D21A7h] 0x0000002f push eax 0x00000030 push edx 0x00000031 push eax 0x00000032 push edx 0x00000033 push ecx 0x00000034 pop ecx 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C2F107 second address: C2F122 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jng 00007F1BB4D69EA6h 0x00000009 jc 00007F1BB4D69EA6h 0x0000000f jo 00007F1BB4D69EA6h 0x00000015 push esi 0x00000016 pop esi 0x00000017 popad 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C2F122 second address: C2F128 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C2F96B second address: C2F99A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F1BB4D69EB6h 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f jmp 00007F1BB4D69EAFh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C2F99A second address: C2F99E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C2FC5D second address: C2FC6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 je 00007F1BB4D69EAEh 0x0000000c push eax 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C2FC6D second address: C2FC74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C2FF1C second address: C2FF29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C2FF29 second address: C2FF38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ecx 0x00000006 pushad 0x00000007 jc 00007F1BB4E5F532h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C2FF38 second address: C2FF3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C2FF3E second address: C2FF45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C327F6 second address: C327FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C327FA second address: C32834 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4E5F52Eh 0x00000007 jmp 00007F1BB4E5F539h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F1BB4E5F52Dh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C357A2 second address: C35811 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F1BB4D69EB1h 0x0000000b jmp 00007F1BB4D69EB2h 0x00000010 popad 0x00000011 pushad 0x00000012 jmp 00007F1BB4D69EB8h 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a pop edx 0x0000001b pushad 0x0000001c pushad 0x0000001d popad 0x0000001e jmp 00007F1BB4D69EB2h 0x00000023 popad 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007F1BB4D69EB0h 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C3595B second address: C35965 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C35AEC second address: C35B0B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EB5h 0x00000007 push eax 0x00000008 push edx 0x00000009 jnc 00007F1BB4D69EA6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C35C6A second address: C35C7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop esi 0x00000007 jo 00007F1BB4E5F532h 0x0000000d jp 00007F1BB4E5F526h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C35C7F second address: C35CA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push esi 0x00000007 jmp 00007F1BB4D69EB9h 0x0000000c push edx 0x0000000d pop edx 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C35CA8 second address: C35CAC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C35E18 second address: C35E28 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EACh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C35E28 second address: C35E2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C35FAD second address: C35FB1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C35FB1 second address: C35FB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C35FB7 second address: C35FBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C35FBD second address: C35FC3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C362B4 second address: C362BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C362BA second address: C362C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C404E5 second address: C40512 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EB7h 0x00000007 jmp 00007F1BB4D69EACh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 pop eax 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C4069C second address: C406BB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4E5F536h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C406BB second address: C406C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C40983 second address: C40995 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 jmp 00007F1BB4E5F52Ah 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C40995 second address: C409C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F1BB4D69EB8h 0x0000000b push edx 0x0000000c pop edx 0x0000000d pushad 0x0000000e popad 0x0000000f jns 00007F1BB4D69EA6h 0x00000015 popad 0x00000016 jp 00007F1BB4D69EACh 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C40B12 second address: C40B16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C40B16 second address: C40B45 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 jmp 00007F1BB4D69EAAh 0x0000000c pop ebx 0x0000000d popad 0x0000000e pushad 0x0000000f push edx 0x00000010 jnp 00007F1BB4D69EA6h 0x00000016 pop edx 0x00000017 jns 00007F1BB4D69EAEh 0x0000001d pushad 0x0000001e push ecx 0x0000001f pop ecx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C40B45 second address: C40B4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C4109B second address: C410B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 jnl 00007F1BB4D69EA6h 0x0000000f push eax 0x00000010 pop eax 0x00000011 push edx 0x00000012 pop edx 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 pop eax 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C410B3 second address: C410C4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4E5F52Bh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C41337 second address: C4133D instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C41A2A second address: C41A2E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C41A2E second address: C41A34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C41A34 second address: C41A3B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C3FFFE second address: C40003 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C40003 second address: C40034 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F1BB4E5F52Fh 0x00000008 jnp 00007F1BB4E5F526h 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 jg 00007F1BB4E5F526h 0x00000017 jmp 00007F1BB4E5F530h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C40034 second address: C40048 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b jo 00007F1BB4D69EA6h 0x00000011 pushad 0x00000012 popad 0x00000013 pop edi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C40048 second address: C40051 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push esi 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C40051 second address: C40071 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1BB4D69EADh 0x00000009 popad 0x0000000a pushad 0x0000000b jmp 00007F1BB4D69EABh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C47B39 second address: C47B55 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4E5F52Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a push eax 0x0000000b pushad 0x0000000c popad 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C4ACD0 second address: C4ACDA instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F1BB4D69EA6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C4A75A second address: C4A760 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C57762 second address: C5776D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C578BE second address: C578C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C73F53 second address: C73F69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1BB4D69EB2h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C73F69 second address: C73F6D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C73F6D second address: C73F99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jnp 00007F1BB4D69EA6h 0x0000000d jns 00007F1BB4D69EA6h 0x00000013 popad 0x00000014 pop esi 0x00000015 jne 00007F1BB4D69EBCh 0x0000001b pushad 0x0000001c jmp 00007F1BB4D69EACh 0x00000021 push edx 0x00000022 pop edx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C74F26 second address: C74F3A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F1BB4E5F52Fh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C7A317 second address: C7A31B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C7A31B second address: C7A34A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1BB4E5F533h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F1BB4E5F534h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C85097 second address: C8509B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C8509B second address: C850A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C850A1 second address: C850D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F1BB4D69EAFh 0x0000000b pushad 0x0000000c jmp 00007F1BB4D69EB7h 0x00000011 pushad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C84EE1 second address: C84EF6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1BB4E5F531h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C84EF6 second address: C84EFA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C84EFA second address: C84F1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1BB4E5F537h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C84F1B second address: C84F25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F1BB4D69EA6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C8805A second address: C88076 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007F1BB4E5F52Dh 0x0000000a push eax 0x0000000b push edx 0x0000000c jno 00007F1BB4E5F526h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C88076 second address: C8807A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C82A9A second address: C82AB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 jmp 00007F1BB4E5F536h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C98975 second address: C98982 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 js 00007F1BB4D69EB2h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C98982 second address: C9898C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F1BB4E5F526h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C9898C second address: C98994 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C984D0 second address: C98509 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F1BB4E5F538h 0x0000000b pop ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F1BB4E5F536h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C98509 second address: C98534 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EB1h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F1BB4D69EB0h 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C98534 second address: C98538 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C98538 second address: C98540 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C98692 second address: C98696 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C98696 second address: C9869C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C9869C second address: C986DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007F1BB4E5F52Ch 0x0000000c jno 00007F1BB4E5F526h 0x00000012 push ecx 0x00000013 push esi 0x00000014 pop esi 0x00000015 jns 00007F1BB4E5F526h 0x0000001b pop ecx 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 push esi 0x00000021 pop esi 0x00000022 pushad 0x00000023 popad 0x00000024 popad 0x00000025 pushad 0x00000026 push edi 0x00000027 pop edi 0x00000028 jmp 00007F1BB4E5F535h 0x0000002d popad 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C986DA second address: C986E0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C986E0 second address: C986E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: C986E6 second address: C986EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CAC674 second address: CAC67A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CAC67A second address: CAC67E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CAC803 second address: CAC80B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CAC80B second address: CAC827 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1BB4D69EB7h 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CAC827 second address: CAC82F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CAC99E second address: CAC9A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CACF8D second address: CACF93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CACF93 second address: CACFCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F1BB4D69EACh 0x00000009 popad 0x0000000a pushad 0x0000000b jmp 00007F1BB4D69EB7h 0x00000010 jmp 00007F1BB4D69EACh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CAD258 second address: CAD263 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 pushad 0x00000007 popad 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop ebx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CAD3C4 second address: CAD3C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CB1831 second address: CB1835 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CB1835 second address: CB184F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EB6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CB184F second address: CB1855 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CB1855 second address: CB1859 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CB2FE1 second address: CB302A instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 jmp 00007F1BB4E5F534h 0x0000000a pop edi 0x0000000b pushad 0x0000000c jne 00007F1BB4E5F526h 0x00000012 jmp 00007F1BB4E5F52Ah 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 jmp 00007F1BB4E5F52Bh 0x0000001e popad 0x0000001f pop edx 0x00000020 pop eax 0x00000021 push eax 0x00000022 push edx 0x00000023 je 00007F1BB4E5F528h 0x00000029 pushad 0x0000002a popad 0x0000002b push eax 0x0000002c push edx 0x0000002d pushad 0x0000002e popad 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CB302A second address: CB302E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CB302E second address: CB3034 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CB3034 second address: CB3049 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1BB4D69EB1h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CB3049 second address: CB304D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: CB4DE1 second address: CB4E3D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F1BB4D69EB7h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jns 00007F1BB4D69EB2h 0x00000011 push esi 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F1BB4D69EB2h 0x00000019 jmp 00007F1BB4D69EB8h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD1231 second address: BD1235 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: BD13D1 second address: BD13DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007F1BB4D69EA6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E703DC second address: 4E703EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1BB4E5F52Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E703EE second address: 4E70403 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F1BB4D69EAAh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E70403 second address: 4E70426 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, edi 0x00000005 mov eax, edi 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov ebp, esp 0x0000000c jmp 00007F1BB4E5F52Fh 0x00000011 mov edx, dword ptr [ebp+0Ch] 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E70426 second address: 4E7044C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov si, C74Dh 0x0000000a popad 0x0000000b mov ecx, dword ptr [ebp+08h] 0x0000000e pushad 0x0000000f mov si, 9305h 0x00000013 push eax 0x00000014 push edx 0x00000015 call 00007F1BB4D69EB0h 0x0000001a pop ecx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E7048D second address: 4E70491 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E905A7 second address: 4E905CA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edx, ax 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F1BB4D69EB2h 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E905CA second address: 4E905CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E905CE second address: 4E905D4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E905D4 second address: 4E90658 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4E5F52Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F1BB4E5F536h 0x0000000f mov ebp, esp 0x00000011 pushad 0x00000012 mov ecx, 641B982Dh 0x00000017 pushfd 0x00000018 jmp 00007F1BB4E5F52Ah 0x0000001d sub ax, 60C8h 0x00000022 jmp 00007F1BB4E5F52Bh 0x00000027 popfd 0x00000028 popad 0x00000029 xchg eax, ecx 0x0000002a pushad 0x0000002b pushfd 0x0000002c jmp 00007F1BB4E5F534h 0x00000031 and si, E328h 0x00000036 jmp 00007F1BB4E5F52Bh 0x0000003b popfd 0x0000003c mov di, si 0x0000003f popad 0x00000040 push eax 0x00000041 push eax 0x00000042 push edx 0x00000043 pushad 0x00000044 mov edx, esi 0x00000046 pushad 0x00000047 popad 0x00000048 popad 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90658 second address: 4E906F3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EB9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a jmp 00007F1BB4D69EAEh 0x0000000f xchg eax, esi 0x00000010 pushad 0x00000011 mov bl, ah 0x00000013 pushad 0x00000014 pushfd 0x00000015 jmp 00007F1BB4D69EB9h 0x0000001a xor eax, 5EDC1E06h 0x00000020 jmp 00007F1BB4D69EB1h 0x00000025 popfd 0x00000026 movzx ecx, di 0x00000029 popad 0x0000002a popad 0x0000002b push eax 0x0000002c pushad 0x0000002d mov eax, 306464AFh 0x00000032 mov dx, cx 0x00000035 popad 0x00000036 xchg eax, esi 0x00000037 pushad 0x00000038 push esi 0x00000039 mov cx, dx 0x0000003c pop edx 0x0000003d mov di, cx 0x00000040 popad 0x00000041 lea eax, dword ptr [ebp-04h] 0x00000044 jmp 00007F1BB4D69EAEh 0x00000049 nop 0x0000004a push eax 0x0000004b push edx 0x0000004c pushad 0x0000004d pushad 0x0000004e popad 0x0000004f mov edx, 7922A29Eh 0x00000054 popad 0x00000055 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E906F3 second address: 4E90730 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F1BB4E5F532h 0x00000009 xor cx, 6168h 0x0000000e jmp 00007F1BB4E5F52Bh 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push eax 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F1BB4E5F52Eh 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90730 second address: 4E90734 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90734 second address: 4E9073A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E9073A second address: 4E9076D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EAEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push ebx 0x0000000e pop eax 0x0000000f call 00007F1BB4D69EB9h 0x00000014 pop eax 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E9076D second address: 4E90773 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90834 second address: 4E90843 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90843 second address: 4E9084A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E9084A second address: 4E90860 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, esi 0x00000009 pushad 0x0000000a mov ch, bl 0x0000000c mov ah, CAh 0x0000000e popad 0x0000000f pop esi 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90860 second address: 4E90864 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90864 second address: 4E9086A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E9086A second address: 4E90880 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1BB4E5F532h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90880 second address: 4E90884 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90884 second address: 4E80120 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 leave 0x00000009 pushad 0x0000000a mov edx, 717AC810h 0x0000000f call 00007F1BB4E5F539h 0x00000014 pushfd 0x00000015 jmp 00007F1BB4E5F530h 0x0000001a sbb cx, BB88h 0x0000001f jmp 00007F1BB4E5F52Bh 0x00000024 popfd 0x00000025 pop ecx 0x00000026 popad 0x00000027 retn 0004h 0x0000002a nop 0x0000002b sub esp, 04h 0x0000002e xor ebx, ebx 0x00000030 cmp eax, 00000000h 0x00000033 je 00007F1BB4E5F68Ah 0x00000039 mov dword ptr [esp], 0000000Dh 0x00000040 call 00007F1BB92EB7D9h 0x00000045 mov edi, edi 0x00000047 push eax 0x00000048 push edx 0x00000049 push eax 0x0000004a push edx 0x0000004b push eax 0x0000004c push edx 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E80120 second address: 4E80124 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E80124 second address: 4E8012A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E8012A second address: 4E80143 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov bx, cx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F1BB4D69EABh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E80143 second address: 4E8016B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4E5F539h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov bl, ch 0x0000000f mov bx, 17CAh 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E8016B second address: 4E801A3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F1BB4D69EAEh 0x00000008 pop ecx 0x00000009 mov di, 2146h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 xchg eax, ebp 0x00000011 jmp 00007F1BB4D69EADh 0x00000016 mov ebp, esp 0x00000018 pushad 0x00000019 mov dl, ah 0x0000001b mov esi, ebx 0x0000001d popad 0x0000001e sub esp, 2Ch 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E801A3 second address: 4E801A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E801A7 second address: 4E801AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E801AB second address: 4E801B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E802B2 second address: 4E802C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EABh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E803B6 second address: 4E803BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E803BC second address: 4E803C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E803C0 second address: 4E803F9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4E5F534h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b js 00007F1BB4E5F5AFh 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F1BB4E5F537h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E803F9 second address: 4E803FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E803FF second address: 4E80474 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 cmp dword ptr [ebp-14h], edi 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007F1BB4E5F52Dh 0x00000012 and eax, 13279A06h 0x00000018 jmp 00007F1BB4E5F531h 0x0000001d popfd 0x0000001e mov edx, eax 0x00000020 popad 0x00000021 jne 00007F1C2693D58Dh 0x00000027 pushad 0x00000028 pushfd 0x00000029 jmp 00007F1BB4E5F52Fh 0x0000002e and cl, 0000003Eh 0x00000031 jmp 00007F1BB4E5F539h 0x00000036 popfd 0x00000037 popad 0x00000038 mov ebx, dword ptr [ebp+08h] 0x0000003b push eax 0x0000003c push edx 0x0000003d pushad 0x0000003e mov di, 06AAh 0x00000042 popad 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E80474 second address: 4E8047A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E8047A second address: 4E804B5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 lea eax, dword ptr [ebp-2Ch] 0x0000000b jmp 00007F1BB4E5F536h 0x00000010 xchg eax, esi 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F1BB4E5F537h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E804B5 second address: 4E8056D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EB9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F1BB4D69EB1h 0x0000000f xchg eax, esi 0x00000010 pushad 0x00000011 jmp 00007F1BB4D69EACh 0x00000016 pushfd 0x00000017 jmp 00007F1BB4D69EB2h 0x0000001c sub ecx, 2FF61FB8h 0x00000022 jmp 00007F1BB4D69EABh 0x00000027 popfd 0x00000028 popad 0x00000029 nop 0x0000002a jmp 00007F1BB4D69EB6h 0x0000002f push eax 0x00000030 pushad 0x00000031 mov di, 7FC4h 0x00000035 mov ax, bx 0x00000038 popad 0x00000039 nop 0x0000003a pushad 0x0000003b mov eax, 025647C7h 0x00000040 popad 0x00000041 xchg eax, ebx 0x00000042 jmp 00007F1BB4D69EAAh 0x00000047 push eax 0x00000048 jmp 00007F1BB4D69EABh 0x0000004d xchg eax, ebx 0x0000004e push eax 0x0000004f push edx 0x00000050 push eax 0x00000051 push edx 0x00000052 jmp 00007F1BB4D69EB0h 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E8056D second address: 4E80571 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E80571 second address: 4E80577 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E805A8 second address: 4E805AE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E805AE second address: 4E805B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E805B2 second address: 4E805DA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esi, eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov eax, 7468165Fh 0x00000012 call 00007F1BB4E5F534h 0x00000017 pop ecx 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E805DA second address: 4E805F5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1BB4D69EB7h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E805F5 second address: 4E805F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E805F9 second address: 4E80011 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test esi, esi 0x0000000a pushad 0x0000000b movsx edx, cx 0x0000000e mov esi, 0C2D94C3h 0x00000013 popad 0x00000014 je 00007F1C26847EEEh 0x0000001a xor eax, eax 0x0000001c jmp 00007F1BB4D435DAh 0x00000021 pop esi 0x00000022 pop edi 0x00000023 pop ebx 0x00000024 leave 0x00000025 retn 0004h 0x00000028 nop 0x00000029 sub esp, 04h 0x0000002c mov esi, eax 0x0000002e xor ebx, ebx 0x00000030 cmp esi, 00000000h 0x00000033 je 00007F1BB4D69FE5h 0x00000039 call 00007F1BB91F5EECh 0x0000003e mov edi, edi 0x00000040 push eax 0x00000041 push edx 0x00000042 jmp 00007F1BB4D69EADh 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E80011 second address: 4E80017 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E80017 second address: 4E8001B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E8001B second address: 4E8002F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov di, DCD4h 0x00000010 movsx ebx, cx 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E8002F second address: 4E80035 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E80035 second address: 4E80039 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E80039 second address: 4E8005A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b pushad 0x0000000c call 00007F1BB4D69EB3h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E8005A second address: 4E8006A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 mov eax, edx 0x00000007 popad 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E8006A second address: 4E8006E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E8006E second address: 4E80074 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E80074 second address: 4E8007A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E8007A second address: 4E8007E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E8007E second address: 4E800BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebp 0x00000009 pushad 0x0000000a mov ebx, esi 0x0000000c mov ecx, 51BD0071h 0x00000011 popad 0x00000012 mov dword ptr [esp], ecx 0x00000015 pushad 0x00000016 mov bx, cx 0x00000019 mov cx, 0A65h 0x0000001d popad 0x0000001e mov dword ptr [ebp-04h], 55534552h 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007F1BB4D69EB7h 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E800BC second address: 4E800C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E800C2 second address: 4E800C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E800C6 second address: 4E800CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E809F1 second address: 4E809F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov ax, bx 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E809F9 second address: 4E809FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E809FF second address: 4E80A03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E80A03 second address: 4E80AA0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4E5F52Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d jmp 00007F1BB4E5F530h 0x00000012 cmp dword ptr [769B459Ch], 05h 0x00000019 pushad 0x0000001a pushfd 0x0000001b jmp 00007F1BB4E5F52Eh 0x00000020 sub cx, 4548h 0x00000025 jmp 00007F1BB4E5F52Bh 0x0000002a popfd 0x0000002b pushfd 0x0000002c jmp 00007F1BB4E5F538h 0x00000031 add esi, 721B07A8h 0x00000037 jmp 00007F1BB4E5F52Bh 0x0000003c popfd 0x0000003d popad 0x0000003e je 00007F1C2692D4A8h 0x00000044 jmp 00007F1BB4E5F536h 0x00000049 pop ebp 0x0000004a push eax 0x0000004b push edx 0x0000004c push eax 0x0000004d push edx 0x0000004e pushad 0x0000004f popad 0x00000050 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E80AA0 second address: 4E80ABD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4D69EB9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E908EA second address: 4E90971 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F1BB4E5F52Eh 0x00000009 xor al, 00000018h 0x0000000c jmp 00007F1BB4E5F52Bh 0x00000011 popfd 0x00000012 pushfd 0x00000013 jmp 00007F1BB4E5F538h 0x00000018 or cl, 00000078h 0x0000001b jmp 00007F1BB4E5F52Bh 0x00000020 popfd 0x00000021 popad 0x00000022 pop edx 0x00000023 pop eax 0x00000024 xchg eax, ebp 0x00000025 jmp 00007F1BB4E5F536h 0x0000002a push eax 0x0000002b jmp 00007F1BB4E5F52Bh 0x00000030 xchg eax, ebp 0x00000031 push eax 0x00000032 push edx 0x00000033 jmp 00007F1BB4E5F535h 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90971 second address: 4E90977 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90977 second address: 4E909B9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a jmp 00007F1BB4E5F52Fh 0x0000000f xchg eax, esi 0x00000010 jmp 00007F1BB4E5F536h 0x00000015 push eax 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F1BB4E5F52Dh 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E909B9 second address: 4E909BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E909BF second address: 4E90A7D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4E5F52Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a jmp 00007F1BB4E5F530h 0x0000000f mov esi, dword ptr [ebp+0Ch] 0x00000012 pushad 0x00000013 pushad 0x00000014 mov si, 87B3h 0x00000018 pushfd 0x00000019 jmp 00007F1BB4E5F538h 0x0000001e or cx, 29B8h 0x00000023 jmp 00007F1BB4E5F52Bh 0x00000028 popfd 0x00000029 popad 0x0000002a pushfd 0x0000002b jmp 00007F1BB4E5F538h 0x00000030 adc ecx, 261BE418h 0x00000036 jmp 00007F1BB4E5F52Bh 0x0000003b popfd 0x0000003c popad 0x0000003d test esi, esi 0x0000003f push eax 0x00000040 push edx 0x00000041 pushad 0x00000042 push edi 0x00000043 pop esi 0x00000044 pushfd 0x00000045 jmp 00007F1BB4E5F537h 0x0000004a or ah, FFFFFF8Eh 0x0000004d jmp 00007F1BB4E5F539h 0x00000052 popfd 0x00000053 popad 0x00000054 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90A7D second address: 4E90A8D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F1BB4D69EACh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90A8D second address: 4E90ABB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4E5F52Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b je 00007F1C2691CE3Fh 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F1BB4E5F535h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90ABB second address: 4E90AF7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, 5FBEE3B2h 0x00000008 jmp 00007F1BB4D69EB3h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 cmp dword ptr [769B459Ch], 05h 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007F1BB4D69EB5h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90AF7 second address: 4E90AFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90AFD second address: 4E90B01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90B01 second address: 4E90B46 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007F1C26934EB4h 0x0000000e jmp 00007F1BB4E5F52Fh 0x00000013 xchg eax, esi 0x00000014 jmp 00007F1BB4E5F536h 0x00000019 push eax 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F1BB4E5F52Eh 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90C56 second address: 4E90C5C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90C5C second address: 4E90C60 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90C60 second address: 4E90C6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fnCae9FQhg.exe | RDTSC instruction interceptor: First address: 4E90C6F second address: 4E90C87 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1BB4E5F534h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |