Source: j6ks0Fxu6t.exe, j6ks0Fxu6t.exe, 00000000.00000003.2003025402.0000000000FE7000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.2028623304.0000000000FF5000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2316240457.0000000000FF6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exe |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2003025402.0000000000FE7000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.2028623304.0000000000FF5000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2316240457.0000000000FF6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://185.215.113.16/off/def.exeocY |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2028531317.0000000000FCD000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005674000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1819133483.000000000569E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1819133483.000000000569E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2028531317.0000000000FCD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2028531317.0000000000FCD000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005674000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: j6ks0Fxu6t.exe, 00000000.00000002.2316056506.0000000000F93000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2028531317.0000000000FCD000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005674000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.com/root-r3.crl0G |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1869872872.0000000000F94000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1770270270.0000000000F94000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1848771785.0000000000F94000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1770475123.0000000000FA5000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1748117451.0000000000FA6000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1849009282.0000000000FA5000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1847646303.0000000000F92000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.microP |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1819133483.000000000569E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2028531317.0000000000FCD000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005674000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1819133483.000000000569E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1819133483.000000000569E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2028531317.0000000000FCD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTru$ |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2028531317.0000000000FCD000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005674000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1819133483.000000000569E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1819133483.000000000569E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2002768319.0000000005901000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318705101.0000000005D59000.00000002.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nsis.sf.net/NSIS_ErrorError |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1819133483.000000000569E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2028531317.0000000000FCD000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005674000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0A |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2028531317.0000000000FCD000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005674000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0C |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2028531317.0000000000FCD000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0X |
Source: j6ks0Fxu6t.exe, 00000000.00000002.2316056506.0000000000F93000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2028531317.0000000000FCD000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005674000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.globalsign.com/rootr30; |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1819133483.000000000569E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: j6ks0Fxu6t.exe, 00000000.00000002.2316056506.0000000000F93000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2028531317.0000000000FCD000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005674000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06 |
Source: Amcache.hve.6.dr | String found in binary or memory: http://upx.sf.net |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1819133483.000000000569E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1819133483.000000000569E000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1771225608.00000000056B3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: j6ks0Fxu6t.exe | String found in binary or memory: https://aui-cdn.atlassia |
Source: j6ks0Fxu6t.exe, j6ks0Fxu6t.exe, 00000000.00000003.2003025402.0000000000FE7000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.2002933101.0000000005685000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005685000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.2003050923.0000000000F92000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://aui-cdn.atlassian.com/ |
Source: j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005685000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2315726368.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005674000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.2003050923.0000000000F92000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net |
Source: j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005685000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2315726368.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005674000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.2003050923.0000000000F92000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-exp.prod-east.frontend.public.atl-paas.net |
Source: j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005685000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2315726368.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005674000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.2003050923.0000000000F92000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net |
Source: j6ks0Fxu6t.exe | String found in binary or memory: https://bbc-frontbucket-static.stg-ea |
Source: j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005685000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2315726368.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005674000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.2003050923.0000000000F92000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net |
Source: j6ks0Fxu6t.exe | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.pu |
Source: j6ks0Fxu6t.exe | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl- |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2003050923.0000000000F92000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/ |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2003050923.0000000000F92000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/; |
Source: j6ks0Fxu6t.exe | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas. |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2003050923.0000000000F92000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/ |
Source: j6ks0Fxu6t.exe | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/ |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2003050923.0000000000F92000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2316056506.0000000000F93000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2315726368.0000000000F7A000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2315726368.0000000000F88000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1- |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2003025402.0000000000FE7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com/Ft |
Source: j6ks0Fxu6t.exe, 00000000.00000002.2318204872.0000000005660000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bbuseruploads.s3.amazonaws.com:443/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3 |
Source: j6ks0Fxu6t.exe, j6ks0Fxu6t.exe, 00000000.00000003.2003025402.0000000000FE7000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2316214995.0000000000FE8000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2315726368.0000000000F52000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/ |
Source: j6ks0Fxu6t.exe, 00000000.00000002.2316056506.0000000000F93000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2315726368.0000000000F52000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe |
Source: j6ks0Fxu6t.exe, 00000000.00000002.2315488591.00000000009FA000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe.0 |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2003050923.0000000000F92000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2316056506.0000000000F93000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe: |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1820512114.000000000567D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417. |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1820512114.000000000567D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta |
Source: j6ks0Fxu6t.exe, j6ks0Fxu6t.exe, 00000000.00000003.2003025402.0000000000FE7000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.2002933101.0000000005685000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005685000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.2003050923.0000000000F92000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://cdn.cookielaw.org/ |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1771225608.00000000056B3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1771225608.00000000056B3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1771225608.00000000056B3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1820512114.000000000567D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1820512114.000000000567D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1771225608.00000000056B3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1771225608.00000000056B3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1771225608.00000000056B3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: j6ks0Fxu6t.exe, 00000000.00000002.2316101561.0000000000FE6000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.2003050923.0000000000F92000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://dz8aopenkvv6s.cloudfront.net |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1820512114.000000000567D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi |
Source: j6ks0Fxu6t.exe, 00000000.00000002.2316240457.0000000000FF6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/ |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1843812155.000000000566B000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1818676658.0000000005669000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1844090234.000000000566C000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1818911372.000000000566C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/9K |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1818708368.0000000005664000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1886858013.0000000005664000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/api |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1845521605.0000000005665000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1844162806.0000000005665000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1843812155.0000000005664000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1870132753.0000000005664000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1818708368.0000000005664000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1886858013.0000000005664000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apiL |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1843812155.0000000005664000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apilite5y |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1770330663.0000000000F7A000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/apip |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1748117451.0000000000FA6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/d |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1748117451.0000000000FA6000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/pi8 |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1869838984.0000000000FF9000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat/s |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1748117451.0000000000FE1000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://observerfry.lat:443/api |
Source: j6ks0Fxu6t.exe | String found in binary or memory: https://remote-app-switcher.prod- |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2003025402.0000000000FE7000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.2002933101.000000000566C000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.2002933101.0000000005685000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005685000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2315726368.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005674000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.prod-east.frontend.public.atl-paas.net |
Source: j6ks0Fxu6t.exe, j6ks0Fxu6t.exe, 00000000.00000003.2003025402.0000000000FE7000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.2002933101.000000000566C000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.2002933101.0000000005685000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005685000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2315726368.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005674000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1772269566.00000000056CA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.microsof |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1820160221.0000000005785000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1820160221.0000000005785000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1796055243.00000000056C1000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1772269566.00000000056C8000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1772368792.00000000056C1000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1795892019.00000000056C1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016 |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1772368792.000000000569C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1796055243.00000000056C1000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1772269566.00000000056C8000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1772368792.00000000056C1000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.1795892019.00000000056C1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17 |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1772368792.000000000569C000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install |
Source: j6ks0Fxu6t.exe | String found in binary or memory: https://web-security-reports.services.at |
Source: j6ks0Fxu6t.exe, j6ks0Fxu6t.exe, 00000000.00000003.2003025402.0000000000FE7000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.2002933101.0000000005685000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005685000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000003.2003050923.0000000000F92000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1820512114.000000000567D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94 |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1771225608.00000000056B3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1820512114.000000000567D000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219 |
Source: j6ks0Fxu6t.exe, 00000000.00000003.2028531317.0000000000FCD000.00000004.00000020.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2318223683.0000000005674000.00000004.00000800.00020000.00000000.sdmp, j6ks0Fxu6t.exe, 00000000.00000002.2316056506.0000000000F93000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.globalsign.com/repository/0 |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1771225608.00000000056B3000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1820160221.0000000005785000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2 |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1820160221.0000000005785000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1820160221.0000000005785000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1820160221.0000000005785000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: j6ks0Fxu6t.exe, 00000000.00000003.1820160221.0000000005785000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www. |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 5C92B5 second address: 5C92B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 5C92B9 second address: 5C92C3 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FA3EC8736D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 5C92C3 second address: 5C92CA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7466AB second address: 7466C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA3EC8736E0h 0x00000009 popad 0x0000000a push ebx 0x0000000b pushad 0x0000000c popad 0x0000000d pop ebx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7466C4 second address: 7466CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7466CC second address: 7466D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7466D0 second address: 7466DC instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 74586E second address: 74587F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 ja 00007FA3EC8736D6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ebx 0x0000000d pushad 0x0000000e push ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 74587F second address: 745888 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 745888 second address: 74588C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 74588C second address: 7458A6 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA3EC7880C0h 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7458A6 second address: 7458AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 745A12 second address: 745A16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 745A16 second address: 745A1A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 745A1A second address: 745A39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FA3EC7880C5h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 745A39 second address: 745A54 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FA3EC8736E1h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 745A54 second address: 745A5E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 745A5E second address: 745A62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 745CEC second address: 745D06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FA3EC7880C3h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 745D06 second address: 745D0A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 745D0A second address: 745D24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FA3EC7880C1h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7498DB second address: 7498F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA3EC8736E8h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7498F7 second address: 7498FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 749A49 second address: 749A87 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pop eax 0x00000008 push 00000000h 0x0000000a push eax 0x0000000b call 00007FA3EC8736D8h 0x00000010 pop eax 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 add dword ptr [esp+04h], 00000018h 0x0000001d inc eax 0x0000001e push eax 0x0000001f ret 0x00000020 pop eax 0x00000021 ret 0x00000022 mov edx, dword ptr [ebp+122D2C57h] 0x00000028 lea ebx, dword ptr [ebp+12454840h] 0x0000002e mov edx, 063E018Ch 0x00000033 push eax 0x00000034 push edx 0x00000035 push eax 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 749CB9 second address: 749D26 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FA3EC7880B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jnl 00007FA3EC7880B6h 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 popad 0x00000015 push eax 0x00000016 jmp 00007FA3EC7880BFh 0x0000001b mov eax, dword ptr [esp+04h] 0x0000001f pushad 0x00000020 jno 00007FA3EC7880BCh 0x00000026 jne 00007FA3EC7880C1h 0x0000002c jmp 00007FA3EC7880BBh 0x00000031 popad 0x00000032 mov eax, dword ptr [eax] 0x00000034 pushad 0x00000035 push edi 0x00000036 jmp 00007FA3EC7880C8h 0x0000003b pop edi 0x0000003c push eax 0x0000003d push edx 0x0000003e jp 00007FA3EC7880B6h 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 749D26 second address: 749D75 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b push esi 0x0000000c push eax 0x0000000d jc 00007FA3EC8736D6h 0x00000013 pop eax 0x00000014 pop esi 0x00000015 pop eax 0x00000016 push 00000000h 0x00000018 push ebx 0x00000019 call 00007FA3EC8736D8h 0x0000001e pop ebx 0x0000001f mov dword ptr [esp+04h], ebx 0x00000023 add dword ptr [esp+04h], 00000015h 0x0000002b inc ebx 0x0000002c push ebx 0x0000002d ret 0x0000002e pop ebx 0x0000002f ret 0x00000030 stc 0x00000031 lea ebx, dword ptr [ebp+12454854h] 0x00000037 and di, 24DAh 0x0000003c push eax 0x0000003d push eax 0x0000003e push edx 0x0000003f jmp 00007FA3EC8736DDh 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 75B17B second address: 75B17F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 75B17F second address: 75B189 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 75B189 second address: 75B1A6 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FA3EC7880C3h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 768389 second address: 768391 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 768391 second address: 768397 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7663E0 second address: 7663EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FA3EC8736D6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7663EA second address: 7663F4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 76652A second address: 766538 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FA3EC8736D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 766538 second address: 76654A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 je 00007FA3EC7880B6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 76654A second address: 766553 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7666E9 second address: 76670E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FA3EC7880C7h 0x0000000d jbe 00007FA3EC7880B6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7669AE second address: 7669C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jmp 00007FA3EC8736DEh 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 76748D second address: 767491 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 767491 second address: 7674A6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736E1h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7675C8 second address: 7675DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push esi 0x00000006 jmp 00007FA3EC7880BDh 0x0000000b push ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7675DE second address: 7675E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 767B2D second address: 767B3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 jl 00007FA3EC7880C6h 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 767B3D second address: 767B41 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 76823D second address: 768242 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 768242 second address: 76824B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push edx 0x00000006 pop edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 76DDAE second address: 76DDB8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007FA3EC7880B6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 76DDB8 second address: 76DDF7 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edi 0x0000000a push esi 0x0000000b jno 00007FA3EC8736D6h 0x00000011 pop esi 0x00000012 pop edi 0x00000013 mov eax, dword ptr [esp+04h] 0x00000017 jmp 00007FA3EC8736E8h 0x0000001c mov eax, dword ptr [eax] 0x0000001e pushad 0x0000001f pushad 0x00000020 jno 00007FA3EC8736D6h 0x00000026 pushad 0x00000027 popad 0x00000028 popad 0x00000029 push edi 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 76DDF7 second address: 76DE05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a push ebx 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 773D44 second address: 773D48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 773D48 second address: 773D50 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 773D50 second address: 773D54 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 773EC6 second address: 773ED6 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jp 00007FA3EC7880B6h 0x0000000e push edi 0x0000000f pop edi 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 773ED6 second address: 773EDA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 775E5C second address: 775E60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 775E60 second address: 775E64 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 775E64 second address: 775E6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 775EE9 second address: 775EFE instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FA3EC8736DAh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 775EFE second address: 775F0F instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 775F0F second address: 775F46 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736E4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a mov eax, dword ptr [eax] 0x0000000c push eax 0x0000000d push edx 0x0000000e jg 00007FA3EC8736EAh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 775F46 second address: 775F80 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c pushad 0x0000000d push eax 0x0000000e jl 00007FA3EC7880B6h 0x00000014 pop eax 0x00000015 je 00007FA3EC7880B8h 0x0000001b pushad 0x0000001c popad 0x0000001d popad 0x0000001e pop eax 0x0000001f mov di, si 0x00000022 call 00007FA3EC7880B9h 0x00000027 push ecx 0x00000028 push ecx 0x00000029 jnp 00007FA3EC7880B6h 0x0000002f pop ecx 0x00000030 pop ecx 0x00000031 push eax 0x00000032 pushad 0x00000033 pushad 0x00000034 push eax 0x00000035 push edx 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7763CB second address: 7763D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7763D1 second address: 7763D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7763D5 second address: 7763F5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jmp 00007FA3EC8736DDh 0x00000011 jns 00007FA3EC8736D6h 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7763F5 second address: 7763FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FA3EC7880B6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 776B9B second address: 776B9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 776E26 second address: 776E2C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 776E2C second address: 776E33 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 777184 second address: 777188 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 777188 second address: 7771CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push edi 0x0000000b call 00007FA3EC8736D8h 0x00000010 pop edi 0x00000011 mov dword ptr [esp+04h], edi 0x00000015 add dword ptr [esp+04h], 00000014h 0x0000001d inc edi 0x0000001e push edi 0x0000001f ret 0x00000020 pop edi 0x00000021 ret 0x00000022 mov esi, dword ptr [ebp+122D2D03h] 0x00000028 push eax 0x00000029 pushad 0x0000002a jmp 00007FA3EC8736E4h 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 popad 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 777FD3 second address: 777FE2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 777FE2 second address: 777FF7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA3EC8736E0h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 778847 second address: 77884D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77A61D second address: 77A628 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FA3EC8736D6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77A628 second address: 77A63C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA3EC7880C0h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77A63C second address: 77A64B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77A64B second address: 77A65A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77A65A second address: 77A6CA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push edi 0x0000000e call 00007FA3EC8736D8h 0x00000013 pop edi 0x00000014 mov dword ptr [esp+04h], edi 0x00000018 add dword ptr [esp+04h], 00000018h 0x00000020 inc edi 0x00000021 push edi 0x00000022 ret 0x00000023 pop edi 0x00000024 ret 0x00000025 push 00000000h 0x00000027 pushad 0x00000028 pushad 0x00000029 call 00007FA3EC8736E2h 0x0000002e pop esi 0x0000002f popad 0x00000030 mov eax, edx 0x00000032 popad 0x00000033 push 00000000h 0x00000035 mov dword ptr [ebp+122D3482h], esi 0x0000003b xchg eax, ebx 0x0000003c pushad 0x0000003d pushad 0x0000003e jnl 00007FA3EC8736D6h 0x00000044 jmp 00007FA3EC8736E3h 0x00000049 popad 0x0000004a pushad 0x0000004b pushad 0x0000004c popad 0x0000004d push eax 0x0000004e push edx 0x0000004f rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77A6CA second address: 77A6D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b pop edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77B01F second address: 77B025 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77BB7E second address: 77BB82 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77BB82 second address: 77BB88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77BB88 second address: 77BBF4 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA3EC7880B8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f jmp 00007FA3EC7880C8h 0x00000014 push 00000000h 0x00000016 push 00000000h 0x00000018 push edx 0x00000019 call 00007FA3EC7880B8h 0x0000001e pop edx 0x0000001f mov dword ptr [esp+04h], edx 0x00000023 add dword ptr [esp+04h], 0000001Dh 0x0000002b inc edx 0x0000002c push edx 0x0000002d ret 0x0000002e pop edx 0x0000002f ret 0x00000030 push eax 0x00000031 push eax 0x00000032 push edx 0x00000033 jnl 00007FA3EC7880C9h 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77BBF4 second address: 77BBF9 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77C717 second address: 77C734 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jo 00007FA3EC7880C4h 0x0000000f jmp 00007FA3EC7880BEh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77C40F second address: 77C413 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77C413 second address: 77C41C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77C41C second address: 77C422 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77F582 second address: 77F586 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77C422 second address: 77C43D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jmp 00007FA3EC8736DFh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77F586 second address: 77F594 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880BAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77C43D second address: 77C442 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77F594 second address: 77F5E3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880C5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push ebp 0x0000000f call 00007FA3EC7880B8h 0x00000014 pop ebp 0x00000015 mov dword ptr [esp+04h], ebp 0x00000019 add dword ptr [esp+04h], 00000017h 0x00000021 inc ebp 0x00000022 push ebp 0x00000023 ret 0x00000024 pop ebp 0x00000025 ret 0x00000026 sub bl, 00000028h 0x00000029 push 00000000h 0x0000002b mov bl, al 0x0000002d push 00000000h 0x0000002f cld 0x00000030 push eax 0x00000031 pushad 0x00000032 push ecx 0x00000033 push ecx 0x00000034 pop ecx 0x00000035 pop ecx 0x00000036 push eax 0x00000037 push edx 0x00000038 pushad 0x00000039 popad 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 77C442 second address: 77C458 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA3EC8736E2h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7821DE second address: 782260 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA3EC7880C2h 0x00000008 jmp 00007FA3EC7880C2h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 nop 0x00000011 push 00000000h 0x00000013 push ecx 0x00000014 call 00007FA3EC7880B8h 0x00000019 pop ecx 0x0000001a mov dword ptr [esp+04h], ecx 0x0000001e add dword ptr [esp+04h], 00000016h 0x00000026 inc ecx 0x00000027 push ecx 0x00000028 ret 0x00000029 pop ecx 0x0000002a ret 0x0000002b sub dword ptr [ebp+122D1D53h], eax 0x00000031 push 00000000h 0x00000033 mov dword ptr [ebp+122D34E0h], ecx 0x00000039 push 00000000h 0x0000003b push 00000000h 0x0000003d push edx 0x0000003e call 00007FA3EC7880B8h 0x00000043 pop edx 0x00000044 mov dword ptr [esp+04h], edx 0x00000048 add dword ptr [esp+04h], 0000001Bh 0x00000050 inc edx 0x00000051 push edx 0x00000052 ret 0x00000053 pop edx 0x00000054 ret 0x00000055 push eax 0x00000056 pushad 0x00000057 push eax 0x00000058 push edx 0x00000059 pushad 0x0000005a popad 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7814F7 second address: 781519 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736DBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA3EC8736E0h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 781519 second address: 781523 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007FA3EC7880B6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 781523 second address: 781527 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7833D0 second address: 7833D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7833D6 second address: 78344E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 push edx 0x00000007 pop edx 0x00000008 pop edi 0x00000009 popad 0x0000000a nop 0x0000000b call 00007FA3EC8736DCh 0x00000010 mov dword ptr [ebp+122D3940h], ecx 0x00000016 pop edi 0x00000017 push dword ptr fs:[00000000h] 0x0000001e mov dword ptr [ebp+122D2302h], eax 0x00000024 mov dword ptr fs:[00000000h], esp 0x0000002b push 00000000h 0x0000002d push esi 0x0000002e call 00007FA3EC8736D8h 0x00000033 pop esi 0x00000034 mov dword ptr [esp+04h], esi 0x00000038 add dword ptr [esp+04h], 0000001Ch 0x00000040 inc esi 0x00000041 push esi 0x00000042 ret 0x00000043 pop esi 0x00000044 ret 0x00000045 mov eax, dword ptr [ebp+122D0D75h] 0x0000004b mov dword ptr [ebp+122D1DC4h], edx 0x00000051 push FFFFFFFFh 0x00000053 mov ebx, 1BE5CFD9h 0x00000058 nop 0x00000059 pushad 0x0000005a pushad 0x0000005b jmp 00007FA3EC8736DAh 0x00000060 push eax 0x00000061 push edx 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78344E second address: 783471 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FA3EC7880BFh 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d popad 0x0000000e popad 0x0000000f push eax 0x00000010 js 00007FA3EC7880C0h 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78519D second address: 785216 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FA3EC8736E7h 0x00000008 jmp 00007FA3EC8736E1h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov dword ptr [esp], eax 0x00000012 push 00000000h 0x00000014 push ebp 0x00000015 call 00007FA3EC8736D8h 0x0000001a pop ebp 0x0000001b mov dword ptr [esp+04h], ebp 0x0000001f add dword ptr [esp+04h], 00000018h 0x00000027 inc ebp 0x00000028 push ebp 0x00000029 ret 0x0000002a pop ebp 0x0000002b ret 0x0000002c mov bx, C4DEh 0x00000030 mov dword ptr [ebp+122D1D58h], esi 0x00000036 push 00000000h 0x00000038 mov dword ptr [ebp+122D32F1h], edx 0x0000003e jmp 00007FA3EC8736E5h 0x00000043 push 00000000h 0x00000045 mov edi, 489B93F3h 0x0000004a mov edi, dword ptr [ebp+122D57BDh] 0x00000050 xchg eax, esi 0x00000051 pushad 0x00000052 pushad 0x00000053 push ecx 0x00000054 pop ecx 0x00000055 push eax 0x00000056 push edx 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 784480 second address: 784484 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 785216 second address: 78522A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnc 00007FA3EC8736D8h 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 784484 second address: 784490 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78522A second address: 78522E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 786195 second address: 7861AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 js 00007FA3EC7880BCh 0x0000000b jnl 00007FA3EC7880B6h 0x00000011 popad 0x00000012 push eax 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7861AD second address: 7861C8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736E3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edi 0x0000000c pop edi 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 787271 second address: 7872C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880BCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a movsx edi, cx 0x0000000d push 00000000h 0x0000000f push 00000000h 0x00000011 push ebp 0x00000012 call 00007FA3EC7880B8h 0x00000017 pop ebp 0x00000018 mov dword ptr [esp+04h], ebp 0x0000001c add dword ptr [esp+04h], 0000001Dh 0x00000024 inc ebp 0x00000025 push ebp 0x00000026 ret 0x00000027 pop ebp 0x00000028 ret 0x00000029 mov dword ptr [ebp+122D335Ah], ebx 0x0000002f push 00000000h 0x00000031 xor ebx, 196D19B5h 0x00000037 push eax 0x00000038 push edx 0x00000039 pushad 0x0000003a push ecx 0x0000003b pop ecx 0x0000003c push eax 0x0000003d push edx 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 788295 second address: 78831A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736DCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a mov dword ptr [ebp+122D3482h], edi 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push esi 0x00000015 call 00007FA3EC8736D8h 0x0000001a pop esi 0x0000001b mov dword ptr [esp+04h], esi 0x0000001f add dword ptr [esp+04h], 0000001Ch 0x00000027 inc esi 0x00000028 push esi 0x00000029 ret 0x0000002a pop esi 0x0000002b ret 0x0000002c mov ebx, dword ptr [ebp+122D2EEBh] 0x00000032 push 00000000h 0x00000034 push 00000000h 0x00000036 push esi 0x00000037 call 00007FA3EC8736D8h 0x0000003c pop esi 0x0000003d mov dword ptr [esp+04h], esi 0x00000041 add dword ptr [esp+04h], 00000017h 0x00000049 inc esi 0x0000004a push esi 0x0000004b ret 0x0000004c pop esi 0x0000004d ret 0x0000004e mov di, bx 0x00000051 push eax 0x00000052 jng 00007FA3EC8736F7h 0x00000058 push eax 0x00000059 push edx 0x0000005a jmp 00007FA3EC8736E5h 0x0000005f rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78935C second address: 789369 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jp 00007FA3EC7880BCh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78A45D second address: 78A461 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78B44F second address: 78B455 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78B455 second address: 78B4C3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push 00000000h 0x0000000d push ebp 0x0000000e call 00007FA3EC8736D8h 0x00000013 pop ebp 0x00000014 mov dword ptr [esp+04h], ebp 0x00000018 add dword ptr [esp+04h], 00000017h 0x00000020 inc ebp 0x00000021 push ebp 0x00000022 ret 0x00000023 pop ebp 0x00000024 ret 0x00000025 push edx 0x00000026 mov dword ptr [ebp+122D38E5h], edx 0x0000002c pop ebx 0x0000002d push 00000000h 0x0000002f push edx 0x00000030 jmp 00007FA3EC8736DEh 0x00000035 pop edi 0x00000036 push 00000000h 0x00000038 push 00000000h 0x0000003a push ebp 0x0000003b call 00007FA3EC8736D8h 0x00000040 pop ebp 0x00000041 mov dword ptr [esp+04h], ebp 0x00000045 add dword ptr [esp+04h], 00000015h 0x0000004d inc ebp 0x0000004e push ebp 0x0000004f ret 0x00000050 pop ebp 0x00000051 ret 0x00000052 push eax 0x00000053 push eax 0x00000054 push edx 0x00000055 jnc 00007FA3EC8736D8h 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78C4DD second address: 78C4E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78C4E1 second address: 78C4EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78A62F second address: 78A6EB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880C5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jc 00007FA3EC7880BCh 0x0000000f jbe 00007FA3EC7880B6h 0x00000015 popad 0x00000016 mov dword ptr [esp], eax 0x00000019 push 00000000h 0x0000001b push edx 0x0000001c call 00007FA3EC7880B8h 0x00000021 pop edx 0x00000022 mov dword ptr [esp+04h], edx 0x00000026 add dword ptr [esp+04h], 00000019h 0x0000002e inc edx 0x0000002f push edx 0x00000030 ret 0x00000031 pop edx 0x00000032 ret 0x00000033 jmp 00007FA3EC7880BCh 0x00000038 mov di, 9341h 0x0000003c mov dword ptr [ebp+122D1CFEh], ecx 0x00000042 push dword ptr fs:[00000000h] 0x00000049 mov dword ptr [ebp+122D28E0h], esi 0x0000004f mov dword ptr fs:[00000000h], esp 0x00000056 mov bx, 8984h 0x0000005a mov eax, dword ptr [ebp+122D0679h] 0x00000060 add dword ptr [ebp+122D365Bh], esi 0x00000066 push FFFFFFFFh 0x00000068 push 00000000h 0x0000006a push edi 0x0000006b call 00007FA3EC7880B8h 0x00000070 pop edi 0x00000071 mov dword ptr [esp+04h], edi 0x00000075 add dword ptr [esp+04h], 0000001Ch 0x0000007d inc edi 0x0000007e push edi 0x0000007f ret 0x00000080 pop edi 0x00000081 ret 0x00000082 nop 0x00000083 push eax 0x00000084 push edx 0x00000085 push eax 0x00000086 push edx 0x00000087 jmp 00007FA3EC7880BDh 0x0000008c rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78A6EB second address: 78A6F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7873CA second address: 7873CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78A6F1 second address: 78A6F7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7873CE second address: 7873D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78D408 second address: 78D481 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 nop 0x00000006 push 00000000h 0x00000008 push edx 0x00000009 call 00007FA3EC8736D8h 0x0000000e pop edx 0x0000000f mov dword ptr [esp+04h], edx 0x00000013 add dword ptr [esp+04h], 0000001Ch 0x0000001b inc edx 0x0000001c push edx 0x0000001d ret 0x0000001e pop edx 0x0000001f ret 0x00000020 mov edi, eax 0x00000022 mov ebx, edx 0x00000024 push 00000000h 0x00000026 sub bx, D33Bh 0x0000002b push 00000000h 0x0000002d push 00000000h 0x0000002f push ebp 0x00000030 call 00007FA3EC8736D8h 0x00000035 pop ebp 0x00000036 mov dword ptr [esp+04h], ebp 0x0000003a add dword ptr [esp+04h], 0000001Dh 0x00000042 inc ebp 0x00000043 push ebp 0x00000044 ret 0x00000045 pop ebp 0x00000046 ret 0x00000047 xchg eax, esi 0x00000048 jmp 00007FA3EC8736E5h 0x0000004d push eax 0x0000004e push eax 0x0000004f push edx 0x00000050 push eax 0x00000051 push edx 0x00000052 push eax 0x00000053 push edx 0x00000054 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78D481 second address: 78D485 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78B639 second address: 78B65C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736E4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jo 00007FA3EC8736E0h 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78D485 second address: 78D49D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880C4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78B65C second address: 78B6C3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 nop 0x00000007 call 00007FA3EC8736E8h 0x0000000c mov ebx, dword ptr [ebp+122D3431h] 0x00000012 pop ebx 0x00000013 push dword ptr fs:[00000000h] 0x0000001a adc edi, 74283BF2h 0x00000020 mov dword ptr fs:[00000000h], esp 0x00000027 mov bh, 21h 0x00000029 mov eax, dword ptr [ebp+122D06BDh] 0x0000002f push FFFFFFFFh 0x00000031 jmp 00007FA3EC8736E4h 0x00000036 push eax 0x00000037 push eax 0x00000038 push edx 0x00000039 push eax 0x0000003a jmp 00007FA3EC8736DAh 0x0000003f pop eax 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78E3E6 second address: 78E45E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 jmp 00007FA3EC7880BDh 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d popad 0x0000000e popad 0x0000000f nop 0x00000010 mov bx, cx 0x00000013 jmp 00007FA3EC7880C0h 0x00000018 push 00000000h 0x0000001a push 00000000h 0x0000001c push ebx 0x0000001d call 00007FA3EC7880B8h 0x00000022 pop ebx 0x00000023 mov dword ptr [esp+04h], ebx 0x00000027 add dword ptr [esp+04h], 0000001Ah 0x0000002f inc ebx 0x00000030 push ebx 0x00000031 ret 0x00000032 pop ebx 0x00000033 ret 0x00000034 mov ebx, dword ptr [ebp+122D1D06h] 0x0000003a mov ebx, dword ptr [ebp+122D2EC7h] 0x00000040 push 00000000h 0x00000042 xchg eax, esi 0x00000043 jc 00007FA3EC7880C4h 0x00000049 jmp 00007FA3EC7880BEh 0x0000004e push eax 0x0000004f pushad 0x00000050 push eax 0x00000051 push edx 0x00000052 push eax 0x00000053 push edx 0x00000054 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78E45E second address: 78E462 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78D5DE second address: 78D5E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78D5E2 second address: 78D5F0 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FA3EC8736D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 78D5F0 second address: 78D5F4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 72ED7C second address: 72ED86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FA3EC8736D6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 795C93 second address: 795C99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 795F33 second address: 795F37 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 79A33C second address: 79A35A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jnp 00007FA3EC7880B6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push edi 0x00000010 pop edi 0x00000011 popad 0x00000012 pop edi 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 popad 0x00000018 jne 00007FA3EC7880B6h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 738F31 second address: 738F35 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 79B9C6 second address: 79B9EE instructions: 0x00000000 rdtsc 0x00000002 jc 00007FA3EC7880B8h 0x00000008 push edi 0x00000009 pop edi 0x0000000a jmp 00007FA3EC7880BCh 0x0000000f pop edx 0x00000010 pop eax 0x00000011 pushad 0x00000012 jmp 00007FA3EC7880BBh 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 79B9EE second address: 79B9F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 79B9F2 second address: 79B9FB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 79CEE4 second address: 79CEE8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 79CEE8 second address: 79CEF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 79CEF3 second address: 79CEF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A00ED second address: 7A013D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a mov eax, dword ptr [eax] 0x0000000c je 00007FA3EC7880C3h 0x00000012 jmp 00007FA3EC7880BDh 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e push ebx 0x0000001f pop ebx 0x00000020 jmp 00007FA3EC7880C3h 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A013D second address: 7A0143 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A4EF6 second address: 7A4F28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA3EC7880BEh 0x00000009 pop ebx 0x0000000a pushad 0x0000000b jmp 00007FA3EC7880C5h 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 push edx 0x00000018 pop edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A4F28 second address: 7A4F3C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jg 00007FA3EC8736D6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push esi 0x0000000d jbe 00007FA3EC8736D6h 0x00000013 pop esi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A3C01 second address: 7A3C12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FA3EC7880B6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f push edx 0x00000010 pop edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A3C12 second address: 7A3C20 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FA3EC8736D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A3C20 second address: 7A3C2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FA3EC7880B6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A4319 second address: 7A431F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A431F second address: 7A433B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880C8h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A433B second address: 7A434F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FA3EC8736DBh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A434F second address: 7A4367 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA3EC7880C0h 0x00000009 popad 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A4658 second address: 7A4664 instructions: 0x00000000 rdtsc 0x00000002 js 00007FA3EC8736D6h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A4664 second address: 7A466E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnl 00007FA3EC7880B6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A466E second address: 7A46A9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736E9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007FA3EC8736E3h 0x00000011 push eax 0x00000012 push edx 0x00000013 jg 00007FA3EC8736D6h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A47D4 second address: 7A47D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A4977 second address: 7A4985 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jbe 00007FA3EC8736D6h 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A4985 second address: 7A498F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FA3EC7880B6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A4D88 second address: 7A4DA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jnc 00007FA3EC8736E2h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A9C3B second address: 7A9C45 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FA3EC7880B6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A9EC9 second address: 7A9ECD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A9ECD second address: 7A9ED7 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA3EC7880B6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A9ED7 second address: 7A9EE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jo 00007FA3EC8736D6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7A9EE7 second address: 7A9EF1 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FA3EC7880B6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7AA01F second address: 7AA058 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736E8h 0x00000007 jmp 00007FA3EC8736DCh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f jp 00007FA3EC8736DCh 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7AA058 second address: 7AA05C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7AA05C second address: 7AA060 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7AA060 second address: 7AA0A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007FA3EC7880C3h 0x0000000c jmp 00007FA3EC7880C1h 0x00000011 jmp 00007FA3EC7880C2h 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b push esi 0x0000001c pop esi 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7AA30E second address: 7AA31D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jp 00007FA3EC8736DAh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7AA31D second address: 7AA326 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7AA46D second address: 7AA48A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736E1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7AA48A second address: 7AA496 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FA3EC7880B6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7AA496 second address: 7AA49B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7AA620 second address: 7AA624 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7AA624 second address: 7AA628 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7AA781 second address: 7AA792 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880BDh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7AA792 second address: 7AA7AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA3EC8736E7h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7AA7AF second address: 7AA7B9 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FA3EC7880BCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7AA7B9 second address: 7AA7EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jmp 00007FA3EC8736DDh 0x0000000a jmp 00007FA3EC8736E8h 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 pushad 0x00000015 push edi 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7AA7EC second address: 7AA7F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 760A77 second address: 760A90 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 jne 00007FA3EC8736D6h 0x0000000b jmp 00007FA3EC8736DCh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 760A90 second address: 760A9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 je 00007FA3EC7880B6h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 760A9F second address: 760AA3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7B0497 second address: 7B049D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 73E046 second address: 73E04D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7AF6E0 second address: 7AF6E4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7B3C48 second address: 7B3C67 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 jmp 00007FA3EC8736E8h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7BAFD8 second address: 7BAFDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 774E27 second address: 774E2C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 774E2C second address: 774E43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA3EC7880BBh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 774F66 second address: 774F6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 774F6B second address: 774F90 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jl 00007FA3EC7880B6h 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c add dword ptr [esp], 2EE30376h 0x00000013 push EDC8E809h 0x00000018 pushad 0x00000019 push ebx 0x0000001a ja 00007FA3EC7880B6h 0x00000020 pop ebx 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 774F90 second address: 774F94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 775106 second address: 775110 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FA3EC7880B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 775110 second address: 775146 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736E2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a mov cx, 19DFh 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 jmp 00007FA3EC8736E4h 0x00000017 push edi 0x00000018 pop edi 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 775146 second address: 775150 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FA3EC7880B6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7757E2 second address: 7757E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 760A51 second address: 760A77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jmp 00007FA3EC7880BAh 0x0000000a jmp 00007FA3EC7880C6h 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7BA0D6 second address: 7BA0E6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jns 00007FA3EC8736D6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7BA0E6 second address: 7BA0F8 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA3EC7880B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jo 00007FA3EC7880B6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7BA68D second address: 7BA6C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jp 00007FA3EC8736D6h 0x0000000c popad 0x0000000d pushad 0x0000000e jmp 00007FA3EC8736DBh 0x00000013 pushad 0x00000014 popad 0x00000015 jmp 00007FA3EC8736E7h 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7BA6C0 second address: 7BA6E1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880C7h 0x00000007 jg 00007FA3EC7880BCh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7BA855 second address: 7BA859 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7BA859 second address: 7BA877 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jmp 00007FA3EC7880C0h 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7BA877 second address: 7BA87C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7BA9E0 second address: 7BAA21 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FA3EC7880B6h 0x00000008 jmp 00007FA3EC7880C9h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jnp 00007FA3EC7880CEh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7BAA21 second address: 7BAA49 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FA3EC8736D8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jl 00007FA3EC8736EAh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7BAA49 second address: 7BAA54 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jnl 00007FA3EC7880B6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7BABA0 second address: 7BABB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007FA3EC8736D6h 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jnp 00007FA3EC8736D6h 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7BD7AE second address: 7BD7B4 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7BFE56 second address: 7BFE5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 729DC4 second address: 729DD8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA3EC7880C0h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 729DD8 second address: 729DDC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 729DDC second address: 729DEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FA3EC7880B6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push ebx 0x00000010 push edi 0x00000011 pop edi 0x00000012 pop ebx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 729DEF second address: 729E07 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FA3EC8736E2h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7C3878 second address: 7C38CD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880C2h 0x00000007 jmp 00007FA3EC7880C2h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jmp 00007FA3EC7880BBh 0x00000013 pushad 0x00000014 push esi 0x00000015 pop esi 0x00000016 jmp 00007FA3EC7880C3h 0x0000001b push edi 0x0000001c pop edi 0x0000001d popad 0x0000001e popad 0x0000001f push eax 0x00000020 push edx 0x00000021 push ebx 0x00000022 push edi 0x00000023 pop edi 0x00000024 push edx 0x00000025 pop edx 0x00000026 pop ebx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7C39FA second address: 7C3A07 instructions: 0x00000000 rdtsc 0x00000002 je 00007FA3EC8736D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7C3B39 second address: 7C3B3D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7C3B3D second address: 7C3B43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7C7D88 second address: 7C7D8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7C7D8E second address: 7C7D92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7C7D92 second address: 7C7D9C instructions: 0x00000000 rdtsc 0x00000002 je 00007FA3EC7880B6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7C7066 second address: 7C706A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7C71D3 second address: 7C71DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FA3EC7880B6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7C7375 second address: 7C73B9 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FA3EC8736D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007FA3EC8736E9h 0x00000010 jmp 00007FA3EC8736DBh 0x00000015 jmp 00007FA3EC8736E4h 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7C73B9 second address: 7C73D1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880C0h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7C73D1 second address: 7C73D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7C77EA second address: 7C77F0 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7C77F0 second address: 7C77FC instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 pop ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7C77FC second address: 7C7800 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7CBBDB second address: 7CBBF7 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FA3EC8736E7h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7CC01D second address: 7CC021 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7CC021 second address: 7CC027 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 775633 second address: 775637 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 775637 second address: 7756C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jmp 00007FA3EC8736E2h 0x0000000d nop 0x0000000e push 00000000h 0x00000010 push esi 0x00000011 call 00007FA3EC8736D8h 0x00000016 pop esi 0x00000017 mov dword ptr [esp+04h], esi 0x0000001b add dword ptr [esp+04h], 0000001Bh 0x00000023 inc esi 0x00000024 push esi 0x00000025 ret 0x00000026 pop esi 0x00000027 ret 0x00000028 movzx edi, si 0x0000002b pushad 0x0000002c cld 0x0000002d mov bl, BCh 0x0000002f popad 0x00000030 push 00000004h 0x00000032 push 00000000h 0x00000034 push eax 0x00000035 call 00007FA3EC8736D8h 0x0000003a pop eax 0x0000003b mov dword ptr [esp+04h], eax 0x0000003f add dword ptr [esp+04h], 00000019h 0x00000047 inc eax 0x00000048 push eax 0x00000049 ret 0x0000004a pop eax 0x0000004b ret 0x0000004c mov edx, dword ptr [ebp+122D2E87h] 0x00000052 push eax 0x00000053 push eax 0x00000054 push edx 0x00000055 jo 00007FA3EC8736EFh 0x0000005b jmp 00007FA3EC8736E9h 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7CCF24 second address: 7CCF38 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FA3EC7880B6h 0x0000000a jmp 00007FA3EC7880BAh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7CCF38 second address: 7CCF48 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 pop eax 0x0000000a jne 00007FA3EC8736D6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7CCF48 second address: 7CCF4C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D2BA1 second address: 7D2BC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push edx 0x00000007 pop edx 0x00000008 jmp 00007FA3EC8736E8h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D2BC1 second address: 7D2BC7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D2BC7 second address: 7D2C01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jns 00007FA3EC8736DEh 0x0000000c push esi 0x0000000d jmp 00007FA3EC8736E6h 0x00000012 pop esi 0x00000013 popad 0x00000014 push eax 0x00000015 jnp 00007FA3EC8736D8h 0x0000001b push edx 0x0000001c pop edx 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 popad 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D35DD second address: 7D35F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jne 00007FA3EC7880B6h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jnc 00007FA3EC7880B6h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D35F2 second address: 7D35F8 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D35F8 second address: 7D35FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D38DB second address: 7D38FA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736DEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FA3EC8736DBh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D38FA second address: 7D3900 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D3900 second address: 7D3904 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D47B5 second address: 7D47BB instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D79A9 second address: 7D79C1 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FA3EC8736D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a ja 00007FA3EC8736DEh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D7C9F second address: 7D7CD1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880C7h 0x00000007 jnp 00007FA3EC7880B6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FA3EC7880BBh 0x00000017 push ebx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D7CD1 second address: 7D7CE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA3EC8736DBh 0x00000009 pop ebx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D82B4 second address: 7D82CA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880C2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D82CA second address: 7D82D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D82D2 second address: 7D82EB instructions: 0x00000000 rdtsc 0x00000002 jne 00007FA3EC7880B6h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 jnp 00007FA3EC7880B6h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D82EB second address: 7D82EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D82EF second address: 7D82F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D82F3 second address: 7D82FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D82FC second address: 7D830B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FA3EC7880B6h 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D830B second address: 7D8317 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7D8317 second address: 7D831B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7E47B8 second address: 7E47C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7E47C5 second address: 7E47E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jc 00007FA3EC7880B6h 0x0000000c popad 0x0000000d jmp 00007FA3EC7880C5h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7E47E7 second address: 7E47EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7E47EF second address: 7E47F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7E47F3 second address: 7E4814 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736E7h 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7E4814 second address: 7E4818 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7E4818 second address: 7E481E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7E298B second address: 7E298F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7E2AFB second address: 7E2B02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7E2B02 second address: 7E2B35 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA3EC7880C9h 0x00000009 jmp 00007FA3EC7880C6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7E30B5 second address: 7E30B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7E30B9 second address: 7E30E5 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FA3EC7880B6h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jnp 00007FA3EC7880B6h 0x00000014 jmp 00007FA3EC7880C8h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7E360E second address: 7E3612 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7E3612 second address: 7E3618 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7E2552 second address: 7E255E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 ja 00007FA3EC8736D6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7EA971 second address: 7EA975 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7EA975 second address: 7EA97D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7ED4E9 second address: 7ED4ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7FB5AA second address: 7FB5BB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736DDh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7FD7FA second address: 7FD80C instructions: 0x00000000 rdtsc 0x00000002 jc 00007FA3EC7880B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jg 00007FA3EC7880B6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 7FD80C second address: 7FD83E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736E5h 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA3EC8736DFh 0x00000012 jns 00007FA3EC8736D6h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 80EB61 second address: 80EB69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 80EB69 second address: 80EB92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA3EC8736E1h 0x00000009 jmp 00007FA3EC8736E2h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 812904 second address: 812921 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA3EC7880C5h 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 812921 second address: 81292D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FA3EC8736D6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 81292D second address: 812933 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 812933 second address: 812938 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 812938 second address: 812940 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 812DC8 second address: 812DCE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 812F59 second address: 812F5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 812F5F second address: 812F63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 812F63 second address: 812F83 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FA3EC7880B6h 0x00000008 jns 00007FA3EC7880B6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FA3EC7880BCh 0x00000017 push eax 0x00000018 pop eax 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 813DE1 second address: 813DEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 push edx 0x00000007 pop edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 81731D second address: 81733D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880C8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edi 0x0000000c pop edi 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 81733D second address: 817341 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 832A90 second address: 832AB9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880C7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a jmp 00007FA3EC7880BAh 0x0000000f pushad 0x00000010 popad 0x00000011 pop ebx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 72D322 second address: 72D327 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 837972 second address: 837976 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 837976 second address: 83797C instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 83797C second address: 837987 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 83781F second address: 837829 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 838F23 second address: 838F57 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880C4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jns 00007FA3EC7880CCh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 84BB19 second address: 84BB37 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA3EC8736E8h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 84BB37 second address: 84BB3E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 84BDBA second address: 84BDC0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 84BDC0 second address: 84BDC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 84BDC4 second address: 84BDF0 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FA3EC8736D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push esi 0x0000000c pushad 0x0000000d popad 0x0000000e push edi 0x0000000f pop edi 0x00000010 pop esi 0x00000011 jnc 00007FA3EC8736D8h 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FA3EC8736DFh 0x0000001e pushad 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 84C4C0 second address: 84C4FB instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pop ebx 0x00000006 pushad 0x00000007 jc 00007FA3EC7880B6h 0x0000000d push esi 0x0000000e pop esi 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 jmp 00007FA3EC7880C9h 0x0000001a jmp 00007FA3EC7880BBh 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 84C4FB second address: 84C519 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 ja 00007FA3EC8736E9h 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d jmp 00007FA3EC8736E1h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 84C660 second address: 84C664 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 84C664 second address: 84C668 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 84E274 second address: 84E278 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 85256A second address: 85256E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 8525F8 second address: 8525FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 8525FE second address: 85265B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov dword ptr [esp], eax 0x00000008 jbe 00007FA3EC8736DAh 0x0000000e push edx 0x0000000f mov dh, 9Fh 0x00000011 pop edx 0x00000012 push 00000004h 0x00000014 push 00000000h 0x00000016 push edx 0x00000017 call 00007FA3EC8736D8h 0x0000001c pop edx 0x0000001d mov dword ptr [esp+04h], edx 0x00000021 add dword ptr [esp+04h], 00000016h 0x00000029 inc edx 0x0000002a push edx 0x0000002b ret 0x0000002c pop edx 0x0000002d ret 0x0000002e mov dword ptr [ebp+122D3469h], ecx 0x00000034 mov dword ptr [ebp+122D3329h], ebx 0x0000003a push 5D939F3Bh 0x0000003f push eax 0x00000040 push edx 0x00000041 push eax 0x00000042 push edx 0x00000043 jmp 00007FA3EC8736E6h 0x00000048 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 85265B second address: 85266B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880BCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 853F03 second address: 853F0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 853F0A second address: 853F12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 855988 second address: 855992 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FA3EC8736D6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 855992 second address: 8559AB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880BDh 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e pop edi 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 8559AB second address: 8559AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 778AFD second address: 778B02 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 778E7C second address: 778E86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007FA3EC8736D6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D2045C second address: 4D204B5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007FA3EC7880C8h 0x00000008 pop ecx 0x00000009 pushfd 0x0000000a jmp 00007FA3EC7880BBh 0x0000000f jmp 00007FA3EC7880C3h 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 push eax 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c call 00007FA3EC7880C5h 0x00000021 pop ecx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D204B5 second address: 4D204E6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736E1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ah, BEh 0x0000000b popad 0x0000000c xchg eax, ebp 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FA3EC8736E6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D204E6 second address: 4D20550 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007FA3EC7880C6h 0x00000010 mov edx, dword ptr [ebp+0Ch] 0x00000013 pushad 0x00000014 mov dx, si 0x00000017 pushad 0x00000018 mov esi, 043EC37Fh 0x0000001d pushfd 0x0000001e jmp 00007FA3EC7880C4h 0x00000023 sub eax, 1A4ACB68h 0x00000029 jmp 00007FA3EC7880BBh 0x0000002e popfd 0x0000002f popad 0x00000030 popad 0x00000031 mov ecx, dword ptr [ebp+08h] 0x00000034 push eax 0x00000035 push edx 0x00000036 pushad 0x00000037 mov cx, dx 0x0000003a movsx ebx, si 0x0000003d popad 0x0000003e rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D20550 second address: 4D20556 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D20556 second address: 4D2055A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D20571 second address: 4D2058B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov si, 2A09h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ebp 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FA3EC8736DBh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50631 second address: 4D50657 instructions: 0x00000000 rdtsc 0x00000002 mov ah, 90h 0x00000004 pop edx 0x00000005 pop eax 0x00000006 movsx edi, si 0x00000009 popad 0x0000000a mov ebp, esp 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FA3EC7880C6h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50657 second address: 4D50666 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736DBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50666 second address: 4D5068A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880C9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D5068A second address: 4D50690 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50690 second address: 4D50696 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50696 second address: 4D5069A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D5069A second address: 4D506F6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007FA3EC7880C9h 0x00000010 sbb ecx, 198EE3C6h 0x00000016 jmp 00007FA3EC7880C1h 0x0000001b popfd 0x0000001c push eax 0x0000001d push edx 0x0000001e pushfd 0x0000001f jmp 00007FA3EC7880BEh 0x00000024 add ch, 00000068h 0x00000027 jmp 00007FA3EC7880BBh 0x0000002c popfd 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D506F6 second address: 4D507CF instructions: 0x00000000 rdtsc 0x00000002 mov ebx, esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, ecx 0x00000008 jmp 00007FA3EC8736E2h 0x0000000d xchg eax, esi 0x0000000e pushad 0x0000000f mov esi, 44B8EC9Dh 0x00000014 call 00007FA3EC8736DAh 0x00000019 pushfd 0x0000001a jmp 00007FA3EC8736E2h 0x0000001f or ax, 6128h 0x00000024 jmp 00007FA3EC8736DBh 0x00000029 popfd 0x0000002a pop eax 0x0000002b popad 0x0000002c push eax 0x0000002d pushad 0x0000002e pushfd 0x0000002f jmp 00007FA3EC8736E4h 0x00000034 add ax, 9388h 0x00000039 jmp 00007FA3EC8736DBh 0x0000003e popfd 0x0000003f mov di, si 0x00000042 popad 0x00000043 xchg eax, esi 0x00000044 jmp 00007FA3EC8736E2h 0x00000049 lea eax, dword ptr [ebp-04h] 0x0000004c pushad 0x0000004d call 00007FA3EC8736DEh 0x00000052 mov ch, FFh 0x00000054 pop edx 0x00000055 pushfd 0x00000056 jmp 00007FA3EC8736DCh 0x0000005b jmp 00007FA3EC8736E5h 0x00000060 popfd 0x00000061 popad 0x00000062 nop 0x00000063 push eax 0x00000064 push edx 0x00000065 jmp 00007FA3EC8736DDh 0x0000006a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D507CF second address: 4D507D5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D507D5 second address: 4D507E4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D507E4 second address: 4D507E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D507E8 second address: 4D507EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D507EC second address: 4D507F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D507F2 second address: 4D5080B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FA3EC8736DEh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D5080B second address: 4D50811 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50811 second address: 4D50815 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50815 second address: 4D50819 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50890 second address: 4D50896 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50896 second address: 4D508A6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esi, eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D508A6 second address: 4D508AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D508AA second address: 4D508BA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880BCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D508BA second address: 4D508C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D508C0 second address: 4D508C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D508C4 second address: 4D508F9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736DDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b je 00007FA3EC873744h 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FA3EC8736E8h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D508F9 second address: 4D50908 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50908 second address: 4D50920 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA3EC8736E4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50920 second address: 4D50924 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50939 second address: 4D5093F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D5093F second address: 4D50943 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50943 second address: 4D509D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, esi 0x0000000a pushad 0x0000000b mov ebx, esi 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007FA3EC8736DEh 0x00000014 add cl, 00000038h 0x00000017 jmp 00007FA3EC8736DBh 0x0000001c popfd 0x0000001d mov eax, 29397D6Fh 0x00000022 popad 0x00000023 popad 0x00000024 pop esi 0x00000025 pushad 0x00000026 pushfd 0x00000027 jmp 00007FA3EC8736E0h 0x0000002c or ecx, 452C8598h 0x00000032 jmp 00007FA3EC8736DBh 0x00000037 popfd 0x00000038 pushfd 0x00000039 jmp 00007FA3EC8736E8h 0x0000003e sbb ch, FFFFFFF8h 0x00000041 jmp 00007FA3EC8736DBh 0x00000046 popfd 0x00000047 popad 0x00000048 leave 0x00000049 push eax 0x0000004a push edx 0x0000004b push eax 0x0000004c push edx 0x0000004d jmp 00007FA3EC8736E0h 0x00000052 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D509D9 second address: 4D509DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D509DD second address: 4D509E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D509E3 second address: 4D40030 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880BEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 retn 0004h 0x0000000c nop 0x0000000d sub esp, 04h 0x00000010 xor ebx, ebx 0x00000012 cmp eax, 00000000h 0x00000015 je 00007FA3EC78821Ah 0x0000001b mov dword ptr [esp], 0000000Dh 0x00000022 call 00007FA3F0F24251h 0x00000027 mov edi, edi 0x00000029 jmp 00007FA3EC7880C4h 0x0000002e xchg eax, ebp 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007FA3EC7880C7h 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40030 second address: 4D4006F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dl, 94h 0x00000005 call 00007FA3EC8736E0h 0x0000000a pop ecx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f pushad 0x00000010 mov dx, cx 0x00000013 movzx eax, dx 0x00000016 popad 0x00000017 xchg eax, ebp 0x00000018 pushad 0x00000019 mov bh, 34h 0x0000001b mov dh, cl 0x0000001d popad 0x0000001e mov ebp, esp 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007FA3EC8736E2h 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D4006F second address: 4D40106 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880BBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub esp, 2Ch 0x0000000c jmp 00007FA3EC7880C6h 0x00000011 xchg eax, ebx 0x00000012 jmp 00007FA3EC7880C0h 0x00000017 push eax 0x00000018 jmp 00007FA3EC7880BBh 0x0000001d xchg eax, ebx 0x0000001e jmp 00007FA3EC7880C6h 0x00000023 xchg eax, edi 0x00000024 pushad 0x00000025 pushfd 0x00000026 jmp 00007FA3EC7880BEh 0x0000002b sub esi, 389FB538h 0x00000031 jmp 00007FA3EC7880BBh 0x00000036 popfd 0x00000037 push ecx 0x00000038 movsx edi, cx 0x0000003b pop eax 0x0000003c popad 0x0000003d push eax 0x0000003e pushad 0x0000003f movzx esi, di 0x00000042 mov ebx, 120874ACh 0x00000047 popad 0x00000048 xchg eax, edi 0x00000049 push eax 0x0000004a push edx 0x0000004b push eax 0x0000004c push edx 0x0000004d pushad 0x0000004e popad 0x0000004f rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40106 second address: 4D4010A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D4010A second address: 4D40110 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D401B2 second address: 4D401B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D401B8 second address: 4D401BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D401BC second address: 4D401C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40311 second address: 4D40316 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D4036D second address: 4D40373 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40373 second address: 4D40397 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jg 00007FA45D6661C7h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FA3EC7880C2h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40397 second address: 4D4039B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D4039B second address: 4D403A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D403A1 second address: 4D40403 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736DEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 js 00007FA3EC873747h 0x0000000f pushad 0x00000010 mov bh, cl 0x00000012 pushfd 0x00000013 jmp 00007FA3EC8736E3h 0x00000018 or eax, 630B206Eh 0x0000001e jmp 00007FA3EC8736E9h 0x00000023 popfd 0x00000024 popad 0x00000025 cmp dword ptr [ebp-14h], edi 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007FA3EC8736DDh 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40403 second address: 4D4046C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007FA45D666139h 0x0000000f pushad 0x00000010 mov esi, 06F2C673h 0x00000015 mov eax, 4DA956CFh 0x0000001a popad 0x0000001b mov ebx, dword ptr [ebp+08h] 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 pushfd 0x00000022 jmp 00007FA3EC7880C7h 0x00000027 and esi, 3E52988Eh 0x0000002d jmp 00007FA3EC7880C9h 0x00000032 popfd 0x00000033 movzx ecx, di 0x00000036 popad 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D4046C second address: 4D404DE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FA3EC8736E8h 0x00000009 or eax, 69E8EE38h 0x0000000f jmp 00007FA3EC8736DBh 0x00000014 popfd 0x00000015 pushad 0x00000016 popad 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a lea eax, dword ptr [ebp-2Ch] 0x0000001d jmp 00007FA3EC8736E4h 0x00000022 xchg eax, esi 0x00000023 jmp 00007FA3EC8736E0h 0x00000028 push eax 0x00000029 pushad 0x0000002a jmp 00007FA3EC8736DCh 0x0000002f popad 0x00000030 xchg eax, esi 0x00000031 push eax 0x00000032 push edx 0x00000033 pushad 0x00000034 pushad 0x00000035 popad 0x00000036 push eax 0x00000037 push edx 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D404DE second address: 4D404E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D404E3 second address: 4D405BE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736E6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007FA3EC8736DEh 0x00000011 sub ah, FFFFFF88h 0x00000014 jmp 00007FA3EC8736DBh 0x00000019 popfd 0x0000001a pushfd 0x0000001b jmp 00007FA3EC8736E8h 0x00000020 xor esi, 6BCDBEE8h 0x00000026 jmp 00007FA3EC8736DBh 0x0000002b popfd 0x0000002c popad 0x0000002d push eax 0x0000002e pushad 0x0000002f pushfd 0x00000030 jmp 00007FA3EC8736DFh 0x00000035 add esi, 0DB0962Eh 0x0000003b jmp 00007FA3EC8736E9h 0x00000040 popfd 0x00000041 mov ebx, ecx 0x00000043 popad 0x00000044 nop 0x00000045 jmp 00007FA3EC8736DAh 0x0000004a xchg eax, ebx 0x0000004b jmp 00007FA3EC8736E0h 0x00000050 push eax 0x00000051 jmp 00007FA3EC8736DBh 0x00000056 xchg eax, ebx 0x00000057 push eax 0x00000058 push edx 0x00000059 jmp 00007FA3EC8736E5h 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D405F4 second address: 4D405FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D405FA second address: 4D405FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D405FE second address: 4D30736 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test esi, esi 0x0000000a jmp 00007FA3EC7880C9h 0x0000000f je 00007FA45D6660EAh 0x00000015 xor eax, eax 0x00000017 jmp 00007FA3EC7617EAh 0x0000001c pop esi 0x0000001d pop edi 0x0000001e pop ebx 0x0000001f leave 0x00000020 retn 0004h 0x00000023 nop 0x00000024 sub esp, 04h 0x00000027 mov esi, eax 0x00000029 xor ebx, ebx 0x0000002b cmp esi, 00000000h 0x0000002e je 00007FA3EC7881F5h 0x00000034 call 00007FA3F0F147B9h 0x00000039 mov edi, edi 0x0000003b pushad 0x0000003c jmp 00007FA3EC7880BDh 0x00000041 push eax 0x00000042 mov cx, di 0x00000045 pop edi 0x00000046 popad 0x00000047 xchg eax, ebp 0x00000048 jmp 00007FA3EC7880C6h 0x0000004d push eax 0x0000004e push eax 0x0000004f push edx 0x00000050 pushad 0x00000051 pushfd 0x00000052 jmp 00007FA3EC7880BCh 0x00000057 adc cl, FFFFFFF8h 0x0000005a jmp 00007FA3EC7880BBh 0x0000005f popfd 0x00000060 pushfd 0x00000061 jmp 00007FA3EC7880C8h 0x00000066 or eax, 1F4E0E58h 0x0000006c jmp 00007FA3EC7880BBh 0x00000071 popfd 0x00000072 popad 0x00000073 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40AC6 second address: 4D40AF3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FA3EC8736DAh 0x00000009 and ax, 46C8h 0x0000000e jmp 00007FA3EC8736DBh 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 xchg eax, ebp 0x00000018 pushad 0x00000019 mov eax, 08BAC55Bh 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40AF3 second address: 4D40AF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40AF7 second address: 4D40B05 instructions: 0x00000000 rdtsc 0x00000002 mov ebx, eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40B05 second address: 4D40B09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40B09 second address: 4D40B0F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40B0F second address: 4D40B20 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, edx 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40B20 second address: 4D40B24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40B24 second address: 4D40B28 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40B28 second address: 4D40B2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40B2E second address: 4D40B67 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA3EC7880C5h 0x00000008 mov edx, ecx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov ebp, esp 0x0000000f pushad 0x00000010 mov dx, si 0x00000013 popad 0x00000014 cmp dword ptr [75C7459Ch], 05h 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007FA3EC7880BCh 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40B67 second address: 4D40B79 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA3EC8736DEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40B79 second address: 4D40B7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D40BE0 second address: 4D40BFA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736DBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push 2F80C3DFh 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 mov cx, di 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50A71 second address: 4D50A77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50A77 second address: 4D50A7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50A7B second address: 4D50AA1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC7880C3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov edx, 49502B76h 0x00000014 movsx edx, ax 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50AA1 second address: 4D50AA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50AA7 second address: 4D50AAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50AAB second address: 4D50AAF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50AAF second address: 4D50B07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FA3EC7880BEh 0x0000000e xchg eax, esi 0x0000000f jmp 00007FA3EC7880C0h 0x00000014 mov esi, dword ptr [ebp+0Ch] 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a pushfd 0x0000001b jmp 00007FA3EC7880BDh 0x00000020 sbb ax, 3E36h 0x00000025 jmp 00007FA3EC7880C1h 0x0000002a popfd 0x0000002b mov si, C627h 0x0000002f popad 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50C72 second address: 4D50CAC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA3EC8736E9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA3EC8736E8h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | RDTSC instruction interceptor: First address: 4D50CAC second address: 4D50CB2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.js | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddfffla | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifd | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnf | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.db | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.json | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpak | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |
Source: C:\Users\user\Desktop\j6ks0Fxu6t.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj | Jump to behavior |