Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 349566 second address: 348E1E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 jmp 00007F0FE0B8ED45h 0x0000000d nop 0x0000000e cmc 0x0000000f push dword ptr [ebp+122D1549h] 0x00000015 jmp 00007F0FE0B8ED43h 0x0000001a call dword ptr [ebp+122D2183h] 0x00000020 pushad 0x00000021 sub dword ptr [ebp+122D219Dh], edi 0x00000027 xor eax, eax 0x00000029 ja 00007F0FE0B8ED3Ch 0x0000002f mov dword ptr [ebp+122D36DCh], ebx 0x00000035 mov edx, dword ptr [esp+28h] 0x00000039 mov dword ptr [ebp+122D36DCh], edx 0x0000003f mov dword ptr [ebp+122D3A0Fh], eax 0x00000045 jmp 00007F0FE0B8ED45h 0x0000004a jmp 00007F0FE0B8ED3Fh 0x0000004f mov esi, 0000003Ch 0x00000054 mov dword ptr [ebp+122D20C2h], edi 0x0000005a add esi, dword ptr [esp+24h] 0x0000005e cmc 0x0000005f lodsw 0x00000061 pushad 0x00000062 sub dword ptr [ebp+122D208Fh], esi 0x00000068 popad 0x00000069 add eax, dword ptr [esp+24h] 0x0000006d jmp 00007F0FE0B8ED3Ch 0x00000072 mov ebx, dword ptr [esp+24h] 0x00000076 pushad 0x00000077 mov eax, dword ptr [ebp+122D3CDBh] 0x0000007d mov edx, dword ptr [ebp+122D3AFFh] 0x00000083 popad 0x00000084 jmp 00007F0FE0B8ED42h 0x00000089 nop 0x0000008a push eax 0x0000008b push edx 0x0000008c push eax 0x0000008d push edx 0x0000008e push edi 0x0000008f pop edi 0x00000090 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 348E1E second address: 348E2E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B050Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BB7B6 second address: 4BB7D2 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F0FE0B8ED36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F0FE0B8ED3Fh 0x0000000f push ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BA79E second address: 4BA7B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F0FE14B050Ch 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BAA78 second address: 4BAA80 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BAA80 second address: 4BAA84 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BAA84 second address: 4BAA9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0FE0B8ED45h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BAD20 second address: 4BAD24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BAD24 second address: 4BAD34 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED3Ch 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BAD34 second address: 4BAD4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F0FE14B050Fh 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BB01D second address: 4BB049 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED48h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F0FE0B8ED3Eh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BB049 second address: 4BB04F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BD6EA second address: 4BD76F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edi 0x00000006 push eax 0x00000007 jmp 00007F0FE0B8ED3Eh 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push eax 0x00000010 call 00007F0FE0B8ED38h 0x00000015 pop eax 0x00000016 mov dword ptr [esp+04h], eax 0x0000001a add dword ptr [esp+04h], 00000015h 0x00000022 inc eax 0x00000023 push eax 0x00000024 ret 0x00000025 pop eax 0x00000026 ret 0x00000027 call 00007F0FE0B8ED47h 0x0000002c pop edi 0x0000002d push 00000000h 0x0000002f call 00007F0FE0B8ED39h 0x00000034 jmp 00007F0FE0B8ED49h 0x00000039 push eax 0x0000003a push esi 0x0000003b jmp 00007F0FE0B8ED3Bh 0x00000040 pop esi 0x00000041 mov eax, dword ptr [esp+04h] 0x00000045 push ebx 0x00000046 push edi 0x00000047 push eax 0x00000048 push edx 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BD76F second address: 4BD77B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop ebx 0x00000006 mov eax, dword ptr [eax] 0x00000008 pushad 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BD77B second address: 4BD7B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007F0FE0B8ED41h 0x0000000a popad 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f pushad 0x00000010 jmp 00007F0FE0B8ED41h 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F0FE0B8ED3Bh 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BD898 second address: 4BD8B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 jbe 00007F0FE14B050Ch 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BD8B0 second address: 4BD8B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BD906 second address: 4BD90A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BD9E9 second address: 4BD9ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BD9ED second address: 4BD9F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4BD9F3 second address: 4BDA42 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED3Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d jmp 00007F0FE0B8ED43h 0x00000012 mov eax, dword ptr [eax] 0x00000014 jg 00007F0FE0B8ED3Ah 0x0000001a mov dword ptr [esp+04h], eax 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007F0FE0B8ED47h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DD056 second address: 4DD05C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DD05C second address: 4DD070 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F0FE0B8ED3Ch 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DD070 second address: 4DD074 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DD4CA second address: 4DD4D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DD4D0 second address: 4DD4E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push edi 0x00000007 pop edi 0x00000008 jne 00007F0FE14B0506h 0x0000000e push edx 0x0000000f pop edx 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DD9C1 second address: 4DD9D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0FE0B8ED3Dh 0x00000009 pop eax 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DDCB6 second address: 4DDCBA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DDCBA second address: 4DDCCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jc 00007F0FE0B8ED36h 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DDCCA second address: 4DDCD6 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DDCD6 second address: 4DDCDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DDCDA second address: 4DDCFA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B0519h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DDCFA second address: 4DDD00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DDE50 second address: 4DDE55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DDE55 second address: 4DDE5D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DDE5D second address: 4DDE66 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DDFB1 second address: 4DDFB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DDFB7 second address: 4DDFD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0FE14B0511h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e jc 00007F0FE14B0506h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DDFD7 second address: 4DE00D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F0FE0B8ED44h 0x00000010 pushad 0x00000011 push eax 0x00000012 pop eax 0x00000013 jmp 00007F0FE0B8ED43h 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DE00D second address: 4DE013 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4A7525 second address: 4A753A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jp 00007F0FE0B8ED36h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push edi 0x00000012 pop edi 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4A753A second address: 4A7544 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F0FE14B0506h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DE7AA second address: 4DE7B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DE7B0 second address: 4DE7CD instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F0FE14B0506h 0x00000008 jmp 00007F0FE14B0513h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DEBD1 second address: 4DEBD5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4DEE6D second address: 4DEE71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4E23F5 second address: 4E2420 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED41h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F0FE0B8ED44h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4E2A47 second address: 4E2A67 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F0FE14B0508h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e push edi 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F0FE14B050Fh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4EAFFB second address: 4EAFFF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4EB29B second address: 4EB2A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4EB556 second address: 4EB55C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4EB55C second address: 4EB562 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4EB562 second address: 4EB566 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4EB566 second address: 4EB56A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4EB56A second address: 4EB578 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jbe 00007F0FE0B8ED36h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4EC5F8 second address: 4EC604 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a push esi 0x0000000b pop esi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4EC6BE second address: 4EC6C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4EC6C4 second address: 4EC6E1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xor dword ptr [esp], 5E3EA8C6h 0x0000000f movzx edi, di 0x00000012 push E5F361F5h 0x00000017 push eax 0x00000018 push edx 0x00000019 push esi 0x0000001a pushad 0x0000001b popad 0x0000001c pop esi 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4EC6E1 second address: 4EC6EB instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F0FE0B8ED3Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4EC80F second address: 4EC815 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4EC815 second address: 4EC83F instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F0FE0B8ED38h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e jmp 00007F0FE0B8ED49h 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4EC96A second address: 4EC96E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4ED1FF second address: 4ED209 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F0FE0B8ED36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4ED209 second address: 4ED223 instructions: 0x00000000 rdtsc 0x00000002 js 00007F0FE14B0510h 0x00000008 jmp 00007F0FE14B050Ah 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4ED223 second address: 4ED227 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4ED227 second address: 4ED25A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F0FE14B0514h 0x0000000b popad 0x0000000c xchg eax, ebx 0x0000000d jmp 00007F0FE14B050Eh 0x00000012 nop 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 pushad 0x00000017 popad 0x00000018 push ebx 0x00000019 pop ebx 0x0000001a popad 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4ED304 second address: 4ED308 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4ED308 second address: 4ED31B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B050Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4ED798 second address: 4ED79F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4A5A65 second address: 4A5A88 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B0519h 0x00000007 push eax 0x00000008 push edx 0x00000009 jno 00007F0FE14B0506h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4A5A88 second address: 4A5A8C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4AF904 second address: 4AF92A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jno 00007F0FE14B0506h 0x00000009 pushad 0x0000000a popad 0x0000000b pop ecx 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F0FE14B0516h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4AF92A second address: 4AF930 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4AF930 second address: 4AF936 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4AF936 second address: 4AF93A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F0931 second address: 4F0935 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F0935 second address: 4F0947 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F0FE0B8ED3Ah 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F0947 second address: 4F099B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push edi 0x0000000d call 00007F0FE14B0508h 0x00000012 pop edi 0x00000013 mov dword ptr [esp+04h], edi 0x00000017 add dword ptr [esp+04h], 0000001Dh 0x0000001f inc edi 0x00000020 push edi 0x00000021 ret 0x00000022 pop edi 0x00000023 ret 0x00000024 mov esi, 73109ED1h 0x00000029 push 00000000h 0x0000002b push 00000000h 0x0000002d sub esi, 2D6D459Eh 0x00000033 push eax 0x00000034 pushad 0x00000035 push ebx 0x00000036 jmp 00007F0FE14B050Eh 0x0000003b pop ebx 0x0000003c push eax 0x0000003d push edx 0x0000003e push ecx 0x0000003f pop ecx 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F13DA second address: 4F1430 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 mov edi, dword ptr [ebp+122D20E2h] 0x0000000f push 00000000h 0x00000011 call 00007F0FE0B8ED48h 0x00000016 pop edi 0x00000017 push 00000000h 0x00000019 push 00000000h 0x0000001b push ebp 0x0000001c call 00007F0FE0B8ED38h 0x00000021 pop ebp 0x00000022 mov dword ptr [esp+04h], ebp 0x00000026 add dword ptr [esp+04h], 0000001Bh 0x0000002e inc ebp 0x0000002f push ebp 0x00000030 ret 0x00000031 pop ebp 0x00000032 ret 0x00000033 xchg eax, ebx 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 push eax 0x00000039 pop eax 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F1430 second address: 4F1434 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F1434 second address: 4F143A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F143A second address: 4F1447 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F238F second address: 4F2393 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F2E2D second address: 4F2E32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F2E32 second address: 4F2E3C instructions: 0x00000000 rdtsc 0x00000002 jo 00007F0FE0B8ED3Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F2E3C second address: 4F2E89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push edx 0x0000000c call 00007F0FE14B0508h 0x00000011 pop edx 0x00000012 mov dword ptr [esp+04h], edx 0x00000016 add dword ptr [esp+04h], 0000001Dh 0x0000001e inc edx 0x0000001f push edx 0x00000020 ret 0x00000021 pop edx 0x00000022 ret 0x00000023 or dword ptr [ebp+122D2D09h], ecx 0x00000029 push 00000000h 0x0000002b push edi 0x0000002c push ebx 0x0000002d adc di, A0A0h 0x00000032 pop edi 0x00000033 pop esi 0x00000034 push 00000000h 0x00000036 xor dword ptr [ebp+122D27DCh], edi 0x0000003c push eax 0x0000003d pushad 0x0000003e push eax 0x0000003f push edx 0x00000040 pushad 0x00000041 popad 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F2E89 second address: 4F2E9D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED3Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F3578 second address: 4F357C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F357C second address: 4F358A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED3Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F358A second address: 4F3594 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F0FE14B050Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F3594 second address: 4F35A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F6CE7 second address: 4F6D06 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F0FE14B050Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jnp 00007F0FE14B050Ch 0x00000013 jc 00007F0FE14B0506h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F35A0 second address: 4F35A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F6D06 second address: 4F6D0B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F6D0B second address: 4F6D11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F6D11 second address: 4F6D84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push 00000000h 0x0000000c push ebx 0x0000000d call 00007F0FE14B0508h 0x00000012 pop ebx 0x00000013 mov dword ptr [esp+04h], ebx 0x00000017 add dword ptr [esp+04h], 00000017h 0x0000001f inc ebx 0x00000020 push ebx 0x00000021 ret 0x00000022 pop ebx 0x00000023 ret 0x00000024 mov dword ptr [ebp+12447775h], esi 0x0000002a push esi 0x0000002b or dword ptr [ebp+1245993Fh], ecx 0x00000031 pop edi 0x00000032 push 00000000h 0x00000034 push 00000000h 0x00000036 push esi 0x00000037 call 00007F0FE14B0508h 0x0000003c pop esi 0x0000003d mov dword ptr [esp+04h], esi 0x00000041 add dword ptr [esp+04h], 00000019h 0x00000049 inc esi 0x0000004a push esi 0x0000004b ret 0x0000004c pop esi 0x0000004d ret 0x0000004e push edi 0x0000004f pop edi 0x00000050 xchg eax, ebx 0x00000051 push eax 0x00000052 push edx 0x00000053 jnc 00007F0FE14B0514h 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F6D84 second address: 4F6D99 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jc 00007F0FE0B8ED40h 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4FA52E second address: 4FA54F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B050Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F0FE14B050Dh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F755D second address: 4F7561 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F7561 second address: 4F757B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B0516h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4FBDDE second address: 4FBDE3 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F757B second address: 4F7597 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B0511h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f pop edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F7597 second address: 4F759C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4FDF1B second address: 4FDF1F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4FDF1F second address: 4FDF25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4FDF25 second address: 4FDF2A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4FCE8D second address: 4FCE93 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4FE01E second address: 4FE03F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B0519h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edi 0x0000000c pop edi 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4FE11A second address: 4FE11E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 500037 second address: 50003C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 50003C second address: 5000C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push eax 0x0000000f call 00007F0FE0B8ED38h 0x00000014 pop eax 0x00000015 mov dword ptr [esp+04h], eax 0x00000019 add dword ptr [esp+04h], 00000018h 0x00000021 inc eax 0x00000022 push eax 0x00000023 ret 0x00000024 pop eax 0x00000025 ret 0x00000026 or edi, dword ptr [ebp+122D29ECh] 0x0000002c push 00000000h 0x0000002e push 00000000h 0x00000030 push ebp 0x00000031 call 00007F0FE0B8ED38h 0x00000036 pop ebp 0x00000037 mov dword ptr [esp+04h], ebp 0x0000003b add dword ptr [esp+04h], 00000014h 0x00000043 inc ebp 0x00000044 push ebp 0x00000045 ret 0x00000046 pop ebp 0x00000047 ret 0x00000048 jmp 00007F0FE0B8ED42h 0x0000004d push 00000000h 0x0000004f xor edi, 780CA11Ch 0x00000055 xchg eax, esi 0x00000056 push eax 0x00000057 push edx 0x00000058 pushad 0x00000059 push ecx 0x0000005a pop ecx 0x0000005b jmp 00007F0FE0B8ED45h 0x00000060 popad 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5000C2 second address: 5000C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5000C7 second address: 5000D5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4FF1B7 second address: 4FF272 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 nop 0x00000006 push dword ptr fs:[00000000h] 0x0000000d jmp 00007F0FE14B0514h 0x00000012 jmp 00007F0FE14B050Ah 0x00000017 mov dword ptr fs:[00000000h], esp 0x0000001e jmp 00007F0FE14B0515h 0x00000023 mov ebx, ecx 0x00000025 mov eax, dword ptr [ebp+122D0D39h] 0x0000002b push 00000000h 0x0000002d push eax 0x0000002e call 00007F0FE14B0508h 0x00000033 pop eax 0x00000034 mov dword ptr [esp+04h], eax 0x00000038 add dword ptr [esp+04h], 0000001Ah 0x00000040 inc eax 0x00000041 push eax 0x00000042 ret 0x00000043 pop eax 0x00000044 ret 0x00000045 mov ebx, dword ptr [ebp+12454115h] 0x0000004b push FFFFFFFFh 0x0000004d push 00000000h 0x0000004f push edi 0x00000050 call 00007F0FE14B0508h 0x00000055 pop edi 0x00000056 mov dword ptr [esp+04h], edi 0x0000005a add dword ptr [esp+04h], 00000017h 0x00000062 inc edi 0x00000063 push edi 0x00000064 ret 0x00000065 pop edi 0x00000066 ret 0x00000067 stc 0x00000068 mov ebx, dword ptr [ebp+122D27D8h] 0x0000006e nop 0x0000006f push eax 0x00000070 push edx 0x00000071 push ebx 0x00000072 jmp 00007F0FE14B0517h 0x00000077 pop ebx 0x00000078 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 50027F second address: 500285 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 500285 second address: 5002A3 instructions: 0x00000000 rdtsc 0x00000002 js 00007F0FE14B0506h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e push esi 0x0000000f jmp 00007F0FE14B050Ah 0x00000014 pop esi 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5002A3 second address: 5002A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 502213 second address: 502217 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 504FF7 second address: 504FFB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4B2E42 second address: 4B2E4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4B2E4A second address: 4B2E4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5074A5 second address: 5074E2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B0512h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp], eax 0x0000000d mov ebx, ecx 0x0000000f movsx ebx, dx 0x00000012 push 00000000h 0x00000014 xor bx, EE14h 0x00000019 push 00000000h 0x0000001b or dword ptr [ebp+122D37CDh], ebx 0x00000021 push eax 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007F0FE14B050Ch 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 50A5B8 second address: 50A5CB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED3Fh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 50A5CB second address: 50A5E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jmp 00007F0FE14B050Fh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 50A5E3 second address: 50A5F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F0FE0B8ED3Dh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 50AC11 second address: 50AC15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5041AD second address: 5041B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5041B1 second address: 5041B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5041B7 second address: 5041BC instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5041BC second address: 504222 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push ebx 0x0000000d call 00007F0FE14B0508h 0x00000012 pop ebx 0x00000013 mov dword ptr [esp+04h], ebx 0x00000017 add dword ptr [esp+04h], 00000017h 0x0000001f inc ebx 0x00000020 push ebx 0x00000021 ret 0x00000022 pop ebx 0x00000023 ret 0x00000024 movsx ebx, si 0x00000027 push dword ptr fs:[00000000h] 0x0000002e pushad 0x0000002f mov dword ptr [ebp+122D20BCh], ebx 0x00000035 popad 0x00000036 mov dword ptr fs:[00000000h], esp 0x0000003d mov di, AAA1h 0x00000041 mov eax, dword ptr [ebp+122D011Dh] 0x00000047 mov bx, cx 0x0000004a push FFFFFFFFh 0x0000004c jmp 00007F0FE14B050Bh 0x00000051 nop 0x00000052 push ebx 0x00000053 push eax 0x00000054 push edx 0x00000055 jnp 00007F0FE14B0506h 0x0000005b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 504222 second address: 504226 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 50BC28 second address: 50BC2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 50BC2C second address: 50BC7C instructions: 0x00000000 rdtsc 0x00000002 jp 00007F0FE0B8ED36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edi 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push edx 0x0000000f call 00007F0FE0B8ED38h 0x00000014 pop edx 0x00000015 mov dword ptr [esp+04h], edx 0x00000019 add dword ptr [esp+04h], 00000017h 0x00000021 inc edx 0x00000022 push edx 0x00000023 ret 0x00000024 pop edx 0x00000025 ret 0x00000026 sub dword ptr [ebp+122D227Ah], ecx 0x0000002c push 00000000h 0x0000002e movsx edi, bx 0x00000031 push 00000000h 0x00000033 pushad 0x00000034 sub dword ptr [ebp+12448DACh], edx 0x0000003a mov dword ptr [ebp+122D2ABCh], edx 0x00000040 popad 0x00000041 xchg eax, esi 0x00000042 push esi 0x00000043 jp 00007F0FE0B8ED3Ch 0x00000049 push eax 0x0000004a push edx 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 50BC7C second address: 50BC87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 508600 second address: 508604 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 50BC87 second address: 50BC8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 508604 second address: 50860A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 50860A second address: 5086B0 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007F0FE14B050Bh 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push esi 0x0000000f call 00007F0FE14B0508h 0x00000014 pop esi 0x00000015 mov dword ptr [esp+04h], esi 0x00000019 add dword ptr [esp+04h], 00000018h 0x00000021 inc esi 0x00000022 push esi 0x00000023 ret 0x00000024 pop esi 0x00000025 ret 0x00000026 sub dword ptr [ebp+12448DF3h], ecx 0x0000002c push dword ptr fs:[00000000h] 0x00000033 jmp 00007F0FE14B0517h 0x00000038 mov dword ptr fs:[00000000h], esp 0x0000003f pushad 0x00000040 jns 00007F0FE14B050Bh 0x00000046 mov edi, 15ED6D86h 0x0000004b popad 0x0000004c mov eax, dword ptr [ebp+122D11F9h] 0x00000052 push 00000000h 0x00000054 push ebp 0x00000055 call 00007F0FE14B0508h 0x0000005a pop ebp 0x0000005b mov dword ptr [esp+04h], ebp 0x0000005f add dword ptr [esp+04h], 00000017h 0x00000067 inc ebp 0x00000068 push ebp 0x00000069 ret 0x0000006a pop ebp 0x0000006b ret 0x0000006c push FFFFFFFFh 0x0000006e mov ebx, dword ptr [ebp+12458281h] 0x00000074 push eax 0x00000075 jng 00007F0FE14B0518h 0x0000007b push eax 0x0000007c push edx 0x0000007d jne 00007F0FE14B0506h 0x00000083 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 50E6D8 second address: 50E6DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 50CE3B second address: 50CE58 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0FE14B050Fh 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 50CE58 second address: 50CE5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 50CE5C second address: 50CE60 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 51456B second address: 514571 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 514571 second address: 514575 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 514575 second address: 51457A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4ADF72 second address: 4ADF97 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push esi 0x00000006 pop esi 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0FE14B050Dh 0x00000013 jl 00007F0FE14B050Ah 0x00000019 pushad 0x0000001a popad 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 513F87 second address: 513F8D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 513F8D second address: 513F97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F0FE14B0506h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 513F97 second address: 513F9D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 519A02 second address: 519A06 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 519A06 second address: 519A0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 51EE5E second address: 51EE6F instructions: 0x00000000 rdtsc 0x00000002 jp 00007F0FE14B0508h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 51E085 second address: 51E0B3 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jl 00007F0FE0B8ED36h 0x00000009 jmp 00007F0FE0B8ED44h 0x0000000e pop ebx 0x0000000f push eax 0x00000010 jnc 00007F0FE0B8ED36h 0x00000016 pushad 0x00000017 popad 0x00000018 pop eax 0x00000019 pop edx 0x0000001a pop eax 0x0000001b push esi 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 51E294 second address: 51E2C3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F0FE14B0515h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007F0FE14B0514h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 51E2C3 second address: 51E2C8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 51E2C8 second address: 51E2CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 51E2CE second address: 51E2D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 51E710 second address: 51E72A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jng 00007F0FE14B0512h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 51ECCB second address: 51ECE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 jmp 00007F0FE0B8ED44h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 51ECE6 second address: 51ECF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 51ECF4 second address: 51ECF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 51ECF8 second address: 51ECFC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 51ECFC second address: 51ED02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 524005 second address: 52400B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 52400B second address: 52402C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F0FE0B8ED36h 0x0000000a push esi 0x0000000b pop esi 0x0000000c popad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 jnc 00007F0FE0B8ED3Eh 0x00000016 pushad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 52402C second address: 524035 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 523BA7 second address: 523BF2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0FE0B8ED46h 0x00000008 jo 00007F0FE0B8ED36h 0x0000000e push edx 0x0000000f pop edx 0x00000010 popad 0x00000011 pushad 0x00000012 jmp 00007F0FE0B8ED41h 0x00000017 jmp 00007F0FE0B8ED45h 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 524AB8 second address: 524AC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F0FE14B0506h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f push edi 0x00000010 pop edi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 524AC9 second address: 524ACD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 524ED1 second address: 524EE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0FE14B0511h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 524EE6 second address: 524EFA instructions: 0x00000000 rdtsc 0x00000002 jns 00007F0FE0B8ED36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c ja 00007F0FE0B8ED36h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 524EFA second address: 524EFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F7DF6 second address: 4F7E59 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jnc 00007F0FE0B8ED36h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edi 0x00000010 jng 00007F0FE0B8ED4Dh 0x00000016 jmp 00007F0FE0B8ED47h 0x0000001b pop edi 0x0000001c nop 0x0000001d mov edx, dword ptr [ebp+122D3AF3h] 0x00000023 lea eax, dword ptr [ebp+12482BA5h] 0x00000029 jmp 00007F0FE0B8ED3Dh 0x0000002e nop 0x0000002f je 00007F0FE0B8ED44h 0x00000035 jmp 00007F0FE0B8ED3Eh 0x0000003a push eax 0x0000003b pushad 0x0000003c push eax 0x0000003d push edx 0x0000003e pushad 0x0000003f popad 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F7E59 second address: 4F7E5D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F8010 second address: 4F8021 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED3Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F83EA second address: 4F8423 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F0FE14B0508h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e jc 00007F0FE14B0512h 0x00000014 jmp 00007F0FE14B050Ch 0x00000019 mov eax, dword ptr [eax] 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007F0FE14B0511h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F8423 second address: 4F8437 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED40h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F8437 second address: 4F844C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0FE14B0511h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F844C second address: 4F84A3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c jmp 00007F0FE0B8ED47h 0x00000011 pop eax 0x00000012 push 00000000h 0x00000014 push edi 0x00000015 call 00007F0FE0B8ED38h 0x0000001a pop edi 0x0000001b mov dword ptr [esp+04h], edi 0x0000001f add dword ptr [esp+04h], 00000014h 0x00000027 inc edi 0x00000028 push edi 0x00000029 ret 0x0000002a pop edi 0x0000002b ret 0x0000002c mov cx, 7505h 0x00000030 push D3B20600h 0x00000035 jp 00007F0FE0B8ED42h 0x0000003b jl 00007F0FE0B8ED3Ch 0x00000041 push eax 0x00000042 push edx 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F8580 second address: 4F859A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0FE14B0516h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F861B second address: 4F8631 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F0FE0B8ED3Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F8631 second address: 4F8635 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F870E second address: 4F8712 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F8EE4 second address: 4F8EE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F8EE8 second address: 4F8EF6 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F0FE0B8ED36h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F90CD second address: 4D264A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 popad 0x00000008 mov dword ptr [esp], eax 0x0000000b pushad 0x0000000c mov cl, bh 0x0000000e mov dword ptr [ebp+122D2C3Dh], ecx 0x00000014 popad 0x00000015 call dword ptr [ebp+122D2DC1h] 0x0000001b pushad 0x0000001c pushad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4D264A second address: 4D265E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0FE0B8ED3Eh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4D265E second address: 4D2664 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4D2664 second address: 4D2697 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jg 00007F0FE0B8ED4Eh 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 popad 0x00000011 popad 0x00000012 jbe 00007F0FE0B8ED3Eh 0x00000018 push ebx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4B49A1 second address: 4B49B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F0FE14B0506h 0x0000000a je 00007F0FE14B050Ch 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 52B62B second address: 52B631 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 52B631 second address: 52B643 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 ja 00007F0FE14B0506h 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b pop ebx 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f push ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 52BA64 second address: 52BA7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F0FE0B8ED3Eh 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 52BBCC second address: 52BBD0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 52BD53 second address: 52BD71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 jmp 00007F0FE0B8ED3Fh 0x0000000b popad 0x0000000c js 00007F0FE0B8ED3Ch 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 52BD71 second address: 52BD7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b push edx 0x0000000c pop edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 52BD7E second address: 52BDA0 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F0FE0B8ED36h 0x00000008 jmp 00007F0FE0B8ED48h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 52BF18 second address: 52BF1E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 52BF1E second address: 52BF2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jng 00007F0FE0B8ED36h 0x0000000d push esi 0x0000000e pop esi 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 52BF2F second address: 52BF40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F0FE14B0506h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push edi 0x0000000e pop edi 0x0000000f push edi 0x00000010 pop edi 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 533C1D second address: 533C34 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 ja 00007F0FE0B8ED36h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F0FE0B8ED3Bh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 533C34 second address: 533C39 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 533D6D second address: 533D71 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 533ED4 second address: 533ED8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53419C second address: 5341A6 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F0FE0B8ED36h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5341A6 second address: 5341B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a ja 00007F0FE14B0506h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5342FD second address: 534301 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 534301 second address: 53431F instructions: 0x00000000 rdtsc 0x00000002 jno 00007F0FE14B0506h 0x00000008 jnl 00007F0FE14B0506h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jnc 00007F0FE14B050Ah 0x00000016 push eax 0x00000017 push edx 0x00000018 push ecx 0x00000019 pop ecx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53431F second address: 534323 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53446D second address: 534482 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B0511h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 534482 second address: 534488 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 534488 second address: 534494 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 534494 second address: 5344A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F0FE0B8ED36h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f js 00007F0FE0B8ED36h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5344A9 second address: 5344AD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53464D second address: 53468C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F0FE0B8ED36h 0x0000000a jl 00007F0FE0B8ED36h 0x00000010 push esi 0x00000011 pop esi 0x00000012 popad 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 je 00007F0FE0B8ED51h 0x0000001c jmp 00007F0FE0B8ED45h 0x00000021 js 00007F0FE0B8ED36h 0x00000027 push eax 0x00000028 push edx 0x00000029 je 00007F0FE0B8ED36h 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53468C second address: 5346A2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B0512h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 534809 second address: 53480D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 534D7D second address: 534D94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0FE14B0510h 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 534D94 second address: 534D99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 534D99 second address: 534DD7 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F0FE14B0508h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d jmp 00007F0FE14B0518h 0x00000012 js 00007F0FE14B0506h 0x00000018 jl 00007F0FE14B0506h 0x0000001e popad 0x0000001f jng 00007F0FE14B050Ah 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 534DD7 second address: 534DF3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0FE0B8ED48h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 534DF3 second address: 534DF7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 534DF7 second address: 534E1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0FE0B8ED42h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e jl 00007F0FE0B8ED36h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 534E1A second address: 534E20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53811B second address: 538126 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007F0FE0B8ED36h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 538126 second address: 538140 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 jnc 00007F0FE14B050Ch 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 538140 second address: 538153 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F0FE0B8ED36h 0x0000000a js 00007F0FE0B8ED36h 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53ABC4 second address: 53ABC8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53ABC8 second address: 53ABD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53ABD0 second address: 53ABDB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnc 00007F0FE14B0506h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5416FF second address: 541703 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 541703 second address: 541707 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 541707 second address: 541715 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 541715 second address: 541719 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 541719 second address: 54172A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0FE0B8ED3Bh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 54172A second address: 541744 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B0515h 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 540050 second address: 540077 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jng 00007F0FE0B8ED36h 0x00000009 jnl 00007F0FE0B8ED36h 0x0000000f popad 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 jmp 00007F0FE0B8ED42h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 540077 second address: 54009A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jo 00007F0FE14B0513h 0x0000000e jmp 00007F0FE14B050Dh 0x00000013 ja 00007F0FE14B050Ch 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 54063C second address: 540675 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F0FE0B8ED42h 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 pop eax 0x00000014 jmp 00007F0FE0B8ED48h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 540675 second address: 54069A instructions: 0x00000000 rdtsc 0x00000002 jg 00007F0FE14B0506h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F0FE14B0519h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4F8B10 second address: 4F8B1A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F0FE0B8ED36h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 540A88 second address: 540A8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5446F3 second address: 544710 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F0FE0B8ED36h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d pushad 0x0000000e popad 0x0000000f jno 00007F0FE0B8ED36h 0x00000015 pop ecx 0x00000016 pop esi 0x00000017 push ecx 0x00000018 push ebx 0x00000019 push eax 0x0000001a pop eax 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 544710 second address: 54471D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jp 00007F0FE14B0506h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 54471D second address: 544721 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 543E60 second address: 543E6A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F0FE14B0506h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 543E6A second address: 543E70 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 543E70 second address: 543E7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 543E7A second address: 543E91 instructions: 0x00000000 rdtsc 0x00000002 je 00007F0FE0B8ED36h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d jo 00007F0FE0B8ED56h 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 543E91 second address: 543E9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F0FE14B0506h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 544148 second address: 54414E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 54414E second address: 544154 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5493E9 second address: 5493F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED3Ah 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5493F7 second address: 549409 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F0FE14B050Ch 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 54887D second address: 548885 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 548885 second address: 5488A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F0FE14B0517h 0x0000000c push edx 0x0000000d pop edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5488A5 second address: 5488CE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jne 00007F0FE0B8ED3Eh 0x0000000c popad 0x0000000d pushad 0x0000000e jmp 00007F0FE0B8ED3Fh 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5488CE second address: 5488E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B0511h 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5488E8 second address: 548904 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0FE0B8ED42h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 548A6B second address: 548ABC instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007F0FE14B0516h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ebx 0x0000000c jmp 00007F0FE14B0518h 0x00000011 jo 00007F0FE14B0506h 0x00000017 pop ebx 0x00000018 pop edi 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F0FE14B0511h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 548C49 second address: 548C4F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 548E2B second address: 548E2F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 551505 second address: 55150B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 55150B second address: 551511 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 551511 second address: 551517 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 551517 second address: 551521 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F0FE14B0506h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 551521 second address: 551525 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 54FAAA second address: 54FABC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B050Ch 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 54FABC second address: 54FAC9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 54FAC9 second address: 54FACF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 54FACF second address: 54FAD3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 54FAD3 second address: 54FAEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0FE14B0513h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 55033C second address: 55035C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0FE0B8ED49h 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 55035C second address: 550380 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F0FE14B0506h 0x0000000a jmp 00007F0FE14B0513h 0x0000000f popad 0x00000010 pushad 0x00000011 pushad 0x00000012 push eax 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 550380 second address: 5503AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0FE0B8ED3Dh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0FE0B8ED47h 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 55063C second address: 550640 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 550640 second address: 55065C instructions: 0x00000000 rdtsc 0x00000002 jo 00007F0FE0B8ED36h 0x00000008 jmp 00007F0FE0B8ED42h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 550BEB second address: 550BEF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 550BEF second address: 550BF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 555C5A second address: 555C93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F0FE14B0506h 0x0000000a pop eax 0x0000000b pop edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0FE14B0517h 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F0FE14B0512h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 555C93 second address: 555CAB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED42h 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 555CAB second address: 555CB1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 555CB1 second address: 555CBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F0FE0B8ED36h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 558CFC second address: 558D00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 558D00 second address: 558D04 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 558D04 second address: 558D0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 558D0A second address: 558D10 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 558D10 second address: 558D16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 55901E second address: 559024 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 559024 second address: 559042 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B0514h 0x00000007 jng 00007F0FE14B0506h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 559042 second address: 55904E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007F0FE0B8ED36h 0x0000000a push esi 0x0000000b pop esi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 55904E second address: 559054 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 559054 second address: 55905D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5591D2 second address: 5591D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 55933A second address: 559359 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jno 00007F0FE0B8ED36h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F0FE0B8ED43h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5594DF second address: 5594E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5594E4 second address: 559500 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED46h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 559500 second address: 559504 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 55962B second address: 559631 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 559631 second address: 559644 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jno 00007F0FE14B0506h 0x0000000d jnc 00007F0FE14B0506h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4A8F5C second address: 4A8F62 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 4A8F62 second address: 4A8F73 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B050Dh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 562AAF second address: 562AD5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0FE0B8ED45h 0x00000009 pop esi 0x0000000a js 00007F0FE0B8ED3Ch 0x00000010 jne 00007F0FE0B8ED36h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5619F7 second address: 5619FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5619FD second address: 561A01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5606D5 second address: 5606DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop ebx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5606DC second address: 5606E7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007F0FE0B8ED36h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5606E7 second address: 5606ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5680E5 second address: 5680EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5680EB second address: 56810F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0FE14B0511h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jc 00007F0FE14B0506h 0x00000012 jp 00007F0FE14B0506h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 56810F second address: 568152 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED42h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F0FE0B8ED46h 0x00000010 jmp 00007F0FE0B8ED45h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 568152 second address: 568156 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 568294 second address: 568298 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 568298 second address: 5682A4 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F0FE14B0506h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 568405 second address: 56840B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 56840B second address: 56840F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 56840F second address: 568422 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F0FE0B8ED36h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push edx 0x0000000e pop edx 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 577D38 second address: 577D3C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5815D7 second address: 5815F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 jno 00007F0FE0B8ED3Eh 0x0000000d jbe 00007F0FE0B8ED3Ch 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 590015 second address: 59001B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 590314 second address: 590336 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 je 00007F0FE0B8ED4Dh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 590336 second address: 590355 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F0FE14B0517h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 590355 second address: 590359 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 590359 second address: 59036F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F0FE14B0506h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 push ecx 0x00000015 pop ecx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 59036F second address: 590373 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 590373 second address: 590379 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 590379 second address: 59038B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jns 00007F0FE0B8ED3Ch 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 59038B second address: 5903A6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0FE14B0517h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 590671 second address: 590688 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jp 00007F0FE0B8ED3Ah 0x0000000b js 00007F0FE0B8ED3Eh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 590688 second address: 5906B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F0FE14B0519h 0x0000000e jnl 00007F0FE14B050Ch 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 59083E second address: 590842 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 590974 second address: 59097A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 59097A second address: 590986 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a pop eax 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 590986 second address: 590991 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007F0FE14B0506h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5913C9 second address: 5913CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5913CD second address: 5913D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5913D1 second address: 5913E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F0FE0B8ED36h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jo 00007F0FE0B8ED38h 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5913E5 second address: 5913EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5947DE second address: 5947E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5947E4 second address: 5947EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a pop edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5947EF second address: 5947F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 597354 second address: 597361 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F0FE14B0506h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 597361 second address: 59737A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d ja 00007F0FE0B8ED36h 0x00000013 jl 00007F0FE0B8ED36h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 59708F second address: 597093 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 597093 second address: 59709F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 59709F second address: 5970A5 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 599710 second address: 59972C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0FE0B8ED3Dh 0x00000009 jmp 00007F0FE0B8ED3Bh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 59972C second address: 599730 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5A76EA second address: 5A76FE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED3Fh 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5A8EE2 second address: 5A8EE6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5A8EE6 second address: 5A8EEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5B5EBF second address: 5B5ECB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pushad 0x00000007 push edx 0x00000008 pop edx 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5CAFEC second address: 5CAFF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5CAFF2 second address: 5CB025 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 pushad 0x00000008 jmp 00007F0FE14B050Fh 0x0000000d push edi 0x0000000e pop edi 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 pop eax 0x00000016 jmp 00007F0FE14B0513h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5CB198 second address: 5CB1A7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0FE0B8ED3Bh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5CB1A7 second address: 5CB1AD instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5CB8F3 second address: 5CB915 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED46h 0x00000007 jl 00007F0FE0B8ED3Eh 0x0000000d push edx 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5CD510 second address: 5CD51B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F0FE14B0506h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5D17BA second address: 5D17E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 jnl 00007F0FE0B8ED40h 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 jo 00007F0FE0B8ED36h 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5D17E1 second address: 5D1822 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F0FE14B0519h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov eax, dword ptr [eax] 0x0000000f jmp 00007F0FE14B0510h 0x00000014 mov dword ptr [esp+04h], eax 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c js 00007F0FE14B0506h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5D1822 second address: 5D183B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED45h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5D2F45 second address: 5D2F66 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 pushad 0x00000008 popad 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0FE14B0515h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5D4F85 second address: 5D4FC2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED3Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push ecx 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007F0FE0B8ED42h 0x00000015 jmp 00007F0FE0B8ED42h 0x0000001a popad 0x0000001b pushad 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5380383 second address: 5380387 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5380387 second address: 53803C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushfd 0x00000007 jmp 00007F0FE0B8ED3Ch 0x0000000c or cx, 2518h 0x00000011 jmp 00007F0FE0B8ED3Bh 0x00000016 popfd 0x00000017 popad 0x00000018 push eax 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F0FE0B8ED44h 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53803C3 second address: 5380457 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B050Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F0FE14B0514h 0x00000011 and cx, A9D8h 0x00000016 jmp 00007F0FE14B050Bh 0x0000001b popfd 0x0000001c pushfd 0x0000001d jmp 00007F0FE14B0518h 0x00000022 xor ecx, 7CABF438h 0x00000028 jmp 00007F0FE14B050Bh 0x0000002d popfd 0x0000002e popad 0x0000002f mov ebp, esp 0x00000031 jmp 00007F0FE14B0516h 0x00000036 mov edx, dword ptr [ebp+0Ch] 0x00000039 pushad 0x0000003a call 00007F0FE14B050Eh 0x0000003f mov bx, si 0x00000042 pop eax 0x00000043 push ebx 0x00000044 push eax 0x00000045 push edx 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A05F5 second address: 53A0628 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED3Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F0FE0B8ED3Eh 0x0000000f push eax 0x00000010 jmp 00007F0FE0B8ED3Bh 0x00000015 xchg eax, ebp 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A0628 second address: 53A062C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A062C second address: 53A0647 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED47h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A0647 second address: 53A0685 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0FE14B050Fh 0x00000009 xor esi, 103A424Eh 0x0000000f jmp 00007F0FE14B0519h 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 mov ebp, esp 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A0685 second address: 53A0689 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A0689 second address: 53A068D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A068D second address: 53A0693 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A0693 second address: 53A0699 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A0699 second address: 53A06EC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED43h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ecx 0x0000000c pushad 0x0000000d pushad 0x0000000e mov ax, 8E41h 0x00000012 mov esi, 3B9ECD7Dh 0x00000017 popad 0x00000018 pushfd 0x00000019 jmp 00007F0FE0B8ED3Ah 0x0000001e sbb si, 7458h 0x00000023 jmp 00007F0FE0B8ED3Bh 0x00000028 popfd 0x00000029 popad 0x0000002a push eax 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e push edx 0x0000002f jmp 00007F0FE0B8ED3Bh 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A06EC second address: 53A06F0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A06F0 second address: 53A06F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A06F6 second address: 53A0736 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, ax 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F0FE14B0515h 0x00000013 or ecx, 6CF5F156h 0x00000019 jmp 00007F0FE14B0511h 0x0000001e popfd 0x0000001f mov si, 32C7h 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A0736 second address: 53A073C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A073C second address: 53A0740 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A0740 second address: 53A0744 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A0744 second address: 53A0781 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 pushad 0x0000000a mov ax, CA8Dh 0x0000000e call 00007F0FE14B050Ah 0x00000013 jmp 00007F0FE14B0512h 0x00000018 pop eax 0x00000019 popad 0x0000001a mov dword ptr [esp], esi 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007F0FE14B050Ch 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A0781 second address: 53A07B4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, cx 0x00000006 pushfd 0x00000007 jmp 00007F0FE0B8ED3Ah 0x0000000c or cx, 0838h 0x00000011 jmp 00007F0FE0B8ED3Bh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a lea eax, dword ptr [ebp-04h] 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 mov ebx, 6265D826h 0x00000025 pushad 0x00000026 popad 0x00000027 popad 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A07B4 second address: 53A07DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B050Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0FE14B0517h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A07DC second address: 53A07ED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cl, bh 0x00000005 mov edi, eax 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A07ED second address: 53A07F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A07F1 second address: 53A0807 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED42h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A0807 second address: 53A080C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A080C second address: 53A0835 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov cl, dh 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a pushad 0x0000000b popad 0x0000000c push dword ptr [ebp+08h] 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F0FE0B8ED48h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A0885 second address: 53A08D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov di, ax 0x00000007 popad 0x00000008 popad 0x00000009 mov esi, eax 0x0000000b pushad 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f pushfd 0x00000010 jmp 00007F0FE14B0510h 0x00000015 sub ax, A008h 0x0000001a jmp 00007F0FE14B050Bh 0x0000001f popfd 0x00000020 popad 0x00000021 mov esi, 00BB467Fh 0x00000026 popad 0x00000027 je 00007F0FE14B0575h 0x0000002d push eax 0x0000002e push edx 0x0000002f jmp 00007F0FE14B0511h 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A08D6 second address: 53A08DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A08DC second address: 53A08E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A08F2 second address: 53A0915 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F0FE0B8ED3Eh 0x0000000a and ah, FFFFFFC8h 0x0000000d jmp 00007F0FE0B8ED3Bh 0x00000012 popfd 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A0915 second address: 53A0973 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B0519h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, esi 0x0000000b jmp 00007F0FE14B050Eh 0x00000010 pop esi 0x00000011 jmp 00007F0FE14B0510h 0x00000016 leave 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a push edi 0x0000001b pop ecx 0x0000001c jmp 00007F0FE14B0519h 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A0973 second address: 53A0979 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A0979 second address: 53901BB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 retn 0004h 0x0000000b nop 0x0000000c sub esp, 04h 0x0000000f xor ebx, ebx 0x00000011 cmp eax, 00000000h 0x00000014 je 00007F0FE14B066Ah 0x0000001a mov dword ptr [esp], 0000000Dh 0x00000021 call 00007F0FE651C843h 0x00000026 mov edi, edi 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007F0FE14B0515h 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53901BB second address: 5390216 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0FE0B8ED47h 0x00000009 jmp 00007F0FE0B8ED43h 0x0000000e popfd 0x0000000f call 00007F0FE0B8ED48h 0x00000014 pop esi 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 push ebx 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F0FE0B8ED3Dh 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390216 second address: 539023D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B0511h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0FE14B050Dh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 539023D second address: 5390262 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, edx 0x00000005 mov bx, 5A6Eh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov ebp, esp 0x0000000e pushad 0x0000000f jmp 00007F0FE0B8ED3Bh 0x00000014 mov dh, cl 0x00000016 popad 0x00000017 sub esp, 2Ch 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d mov eax, ebx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390262 second address: 53902EA instructions: 0x00000000 rdtsc 0x00000002 mov edi, 32DFA7CEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushfd 0x0000000a jmp 00007F0FE14B050Fh 0x0000000f sub ecx, 5E6BA07Eh 0x00000015 jmp 00007F0FE14B0519h 0x0000001a popfd 0x0000001b popad 0x0000001c xchg eax, ebx 0x0000001d pushad 0x0000001e mov ebx, 219535DEh 0x00000023 popad 0x00000024 push eax 0x00000025 pushad 0x00000026 mov ecx, 58046A51h 0x0000002b mov bh, ah 0x0000002d popad 0x0000002e xchg eax, ebx 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 mov ah, 89h 0x00000034 pushfd 0x00000035 jmp 00007F0FE14B0517h 0x0000003a add ch, FFFFFFEEh 0x0000003d jmp 00007F0FE14B0519h 0x00000042 popfd 0x00000043 popad 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53902EA second address: 53902FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0FE0B8ED3Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53902FA second address: 53902FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390344 second address: 539035C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0FE0B8ED44h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 539035C second address: 5390383 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B050Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b sub ebx, ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F0FE14B0512h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390383 second address: 5390397 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 sub edi, edi 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov dh, ch 0x0000000f mov bx, BE32h 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390397 second address: 539044E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, si 0x00000006 pushfd 0x00000007 jmp 00007F0FE14B0512h 0x0000000c or al, 00000048h 0x0000000f jmp 00007F0FE14B050Bh 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 inc ebx 0x00000019 pushad 0x0000001a pushfd 0x0000001b jmp 00007F0FE14B0514h 0x00000020 add ax, FDA8h 0x00000025 jmp 00007F0FE14B050Bh 0x0000002a popfd 0x0000002b pushfd 0x0000002c jmp 00007F0FE14B0518h 0x00000031 xor al, 00000008h 0x00000034 jmp 00007F0FE14B050Bh 0x00000039 popfd 0x0000003a popad 0x0000003b test al, al 0x0000003d pushad 0x0000003e pushfd 0x0000003f jmp 00007F0FE14B0514h 0x00000044 sub eax, 3C4C9268h 0x0000004a jmp 00007F0FE14B050Bh 0x0000004f popfd 0x00000050 mov di, ax 0x00000053 popad 0x00000054 je 00007F0FE14B06FDh 0x0000005a push eax 0x0000005b push edx 0x0000005c pushad 0x0000005d mov cx, bx 0x00000060 popad 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 539044E second address: 539047B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED3Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 lea ecx, dword ptr [ebp-14h] 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0FE0B8ED45h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53904F8 second address: 53904FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53904FE second address: 5390502 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390502 second address: 539050E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53905C4 second address: 53905C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53905C9 second address: 5390611 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 call 00007F0FE14B0510h 0x0000000a pop ecx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jne 00007F1051BBE3BFh 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 pushfd 0x00000018 jmp 00007F0FE14B050Ah 0x0000001d jmp 00007F0FE14B0515h 0x00000022 popfd 0x00000023 mov si, D1E7h 0x00000027 popad 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390611 second address: 539062D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0FE0B8ED48h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 539062D second address: 5390658 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B050Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebx, dword ptr [ebp+08h] 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F0FE14B0515h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390658 second address: 5390668 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0FE0B8ED3Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390668 second address: 53906E5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 lea eax, dword ptr [ebp-2Ch] 0x0000000b pushad 0x0000000c movsx ebx, ax 0x0000000f push eax 0x00000010 pushfd 0x00000011 jmp 00007F0FE14B0515h 0x00000016 or eax, 5C94D676h 0x0000001c jmp 00007F0FE14B0511h 0x00000021 popfd 0x00000022 pop esi 0x00000023 popad 0x00000024 push ecx 0x00000025 pushad 0x00000026 pushad 0x00000027 push ecx 0x00000028 pop edi 0x00000029 call 00007F0FE14B0514h 0x0000002e pop eax 0x0000002f popad 0x00000030 mov bx, D286h 0x00000034 popad 0x00000035 mov dword ptr [esp], esi 0x00000038 push eax 0x00000039 push edx 0x0000003a jmp 00007F0FE14B0518h 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53906E5 second address: 5390722 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 19A953D4h 0x00000008 pushfd 0x00000009 jmp 00007F0FE0B8ED3Dh 0x0000000e jmp 00007F0FE0B8ED3Bh 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 nop 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F0FE0B8ED45h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390722 second address: 5390727 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390727 second address: 5390743 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 call 00007F0FE0B8ED3Dh 0x00000009 pop ecx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390743 second address: 5390747 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390747 second address: 539075A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED3Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 539075A second address: 539075F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 539075F second address: 53907F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F0FE0B8ED45h 0x0000000a xor cx, 4EB6h 0x0000000f jmp 00007F0FE0B8ED41h 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 nop 0x00000019 pushad 0x0000001a pushfd 0x0000001b jmp 00007F0FE0B8ED3Ch 0x00000020 jmp 00007F0FE0B8ED45h 0x00000025 popfd 0x00000026 pushfd 0x00000027 jmp 00007F0FE0B8ED40h 0x0000002c jmp 00007F0FE0B8ED45h 0x00000031 popfd 0x00000032 popad 0x00000033 xchg eax, ebx 0x00000034 push eax 0x00000035 push edx 0x00000036 jmp 00007F0FE0B8ED3Dh 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53907F0 second address: 5390800 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0FE14B050Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390800 second address: 5390804 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 539083B second address: 5390840 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390840 second address: 5390008 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE0B8ED44h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esi, eax 0x0000000b pushad 0x0000000c mov dl, cl 0x0000000e mov si, dx 0x00000011 popad 0x00000012 test esi, esi 0x00000014 pushad 0x00000015 jmp 00007F0FE0B8ED3Bh 0x0000001a mov edi, eax 0x0000001c popad 0x0000001d je 00007F105129CB19h 0x00000023 xor eax, eax 0x00000025 jmp 00007F0FE0B6846Ah 0x0000002a pop esi 0x0000002b pop edi 0x0000002c pop ebx 0x0000002d leave 0x0000002e retn 0004h 0x00000031 nop 0x00000032 sub esp, 04h 0x00000035 mov esi, eax 0x00000037 xor ebx, ebx 0x00000039 cmp esi, 00000000h 0x0000003c je 00007F0FE0B8EE75h 0x00000042 call 00007F0FE5BFAD7Ch 0x00000047 mov edi, edi 0x00000049 push eax 0x0000004a push edx 0x0000004b push eax 0x0000004c push edx 0x0000004d pushad 0x0000004e popad 0x0000004f rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390008 second address: 5390020 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B0514h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390020 second address: 5390026 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390026 second address: 539002A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 539002A second address: 5390074 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F0FE0B8ED46h 0x0000000e mov dword ptr [esp], ebp 0x00000011 jmp 00007F0FE0B8ED40h 0x00000016 mov ebp, esp 0x00000018 pushad 0x00000019 call 00007F0FE0B8ED3Eh 0x0000001e mov edi, eax 0x00000020 pop ecx 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 popad 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390074 second address: 5390118 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F0FE14B0513h 0x00000008 and cl, FFFFFF9Eh 0x0000000b jmp 00007F0FE14B0519h 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 popad 0x00000014 xchg eax, ecx 0x00000015 jmp 00007F0FE14B050Eh 0x0000001a push eax 0x0000001b jmp 00007F0FE14B050Bh 0x00000020 xchg eax, ecx 0x00000021 jmp 00007F0FE14B0516h 0x00000026 mov dword ptr [ebp-04h], 55534552h 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 mov ecx, edi 0x00000032 pushfd 0x00000033 jmp 00007F0FE14B0519h 0x00000038 xor al, FFFFFF96h 0x0000003b jmp 00007F0FE14B0511h 0x00000040 popfd 0x00000041 popad 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 539013A second address: 539013E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 539013E second address: 5390182 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F0FE14B0514h 0x00000008 or eax, 0C5A7618h 0x0000000e jmp 00007F0FE14B050Bh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 popad 0x00000017 leave 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F0FE14B0515h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390182 second address: 5390188 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390BCD second address: 5390BD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390BD1 second address: 5390BD7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390BD7 second address: 5390BDD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390BDD second address: 5390C3A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a call 00007F0FE0B8ED43h 0x0000000f pop ebx 0x00000010 mov esi, 41350B2Bh 0x00000015 popad 0x00000016 xchg eax, ebp 0x00000017 pushad 0x00000018 mov cx, B4A3h 0x0000001c pushfd 0x0000001d jmp 00007F0FE0B8ED48h 0x00000022 add ax, EDE8h 0x00000027 jmp 00007F0FE0B8ED3Bh 0x0000002c popfd 0x0000002d popad 0x0000002e mov ebp, esp 0x00000030 push eax 0x00000031 push edx 0x00000032 push eax 0x00000033 push edx 0x00000034 pushad 0x00000035 popad 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390C3A second address: 5390C3E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390C3E second address: 5390C44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390C44 second address: 5390C77 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B050Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [75AF459Ch], 05h 0x00000010 jmp 00007F0FE14B0510h 0x00000015 je 00007F1051BAE29Ch 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e push edx 0x0000001f pop ecx 0x00000020 mov esi, ebx 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390C77 second address: 5390CB3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0FE0B8ED40h 0x00000009 and ah, FFFFFFD8h 0x0000000c jmp 00007F0FE0B8ED3Bh 0x00000011 popfd 0x00000012 mov esi, 26CC148Fh 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a pop ebp 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007F0FE0B8ED3Ch 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390CB3 second address: 5390CB9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390DB0 second address: 5390DD6 instructions: 0x00000000 rdtsc 0x00000002 call 00007F0FE0B8ED41h 0x00000007 pop ecx 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov dword ptr [ebp-1Ch], esi 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F0FE0B8ED3Ah 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390DD6 second address: 5390DE8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0FE14B050Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390E15 second address: 5390E84 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, dx 0x00000006 pushfd 0x00000007 jmp 00007F0FE0B8ED43h 0x0000000c or ch, 0000005Eh 0x0000000f jmp 00007F0FE0B8ED49h 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 test al, al 0x0000001a jmp 00007F0FE0B8ED3Eh 0x0000001f je 00007F105128285Ch 0x00000025 pushad 0x00000026 mov cx, E5EDh 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007F0FE0B8ED48h 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 5390E84 second address: 5390EAE instructions: 0x00000000 rdtsc 0x00000002 mov dx, si 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 cmp dword ptr [ebp+08h], 00002000h 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 push ebx 0x00000013 pop esi 0x00000014 jmp 00007F0FE14B0515h 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A09DC second address: 53A09E2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A09E2 second address: 53A09E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A09E6 second address: 53A0AC5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 pushad 0x0000000a mov edx, 4B85C94Ch 0x0000000f call 00007F0FE0B8ED45h 0x00000014 pushfd 0x00000015 jmp 00007F0FE0B8ED40h 0x0000001a xor ecx, 1CDB2898h 0x00000020 jmp 00007F0FE0B8ED3Bh 0x00000025 popfd 0x00000026 pop esi 0x00000027 popad 0x00000028 mov ebp, esp 0x0000002a pushad 0x0000002b mov ax, bx 0x0000002e pushfd 0x0000002f jmp 00007F0FE0B8ED41h 0x00000034 adc si, CE36h 0x00000039 jmp 00007F0FE0B8ED41h 0x0000003e popfd 0x0000003f popad 0x00000040 xchg eax, esi 0x00000041 jmp 00007F0FE0B8ED3Eh 0x00000046 push eax 0x00000047 jmp 00007F0FE0B8ED3Bh 0x0000004c xchg eax, esi 0x0000004d pushad 0x0000004e pushad 0x0000004f pushfd 0x00000050 jmp 00007F0FE0B8ED42h 0x00000055 jmp 00007F0FE0B8ED45h 0x0000005a popfd 0x0000005b mov bh, al 0x0000005d popad 0x0000005e mov bx, C300h 0x00000062 popad 0x00000063 mov esi, dword ptr [ebp+0Ch] 0x00000066 push eax 0x00000067 push edx 0x00000068 jmp 00007F0FE0B8ED42h 0x0000006d rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A0AC5 second address: 53A0ADF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0FE14B050Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b pushad 0x0000000c mov al, 49h 0x0000000e push eax 0x0000000f push edx 0x00000010 mov bx, D542h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A0B7A second address: 53A0BF0 instructions: 0x00000000 rdtsc 0x00000002 mov edx, ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushfd 0x00000007 jmp 00007F0FE0B8ED44h 0x0000000c add si, C058h 0x00000011 jmp 00007F0FE0B8ED3Bh 0x00000016 popfd 0x00000017 popad 0x00000018 xchg eax, esi 0x00000019 pushad 0x0000001a mov esi, 33F9FF2Bh 0x0000001f pushad 0x00000020 call 00007F0FE0B8ED3Eh 0x00000025 pop esi 0x00000026 popad 0x00000027 popad 0x00000028 push eax 0x00000029 jmp 00007F0FE0B8ED47h 0x0000002e xchg eax, esi 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007F0FE0B8ED45h 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\6GNqkkKY0j.exe | RDTSC instruction interceptor: First address: 53A0C26 second address: 53A0C6A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0FE14B0517h 0x00000008 movzx esi, di 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop esi 0x0000000f jmp 00007F0FE14B050Bh 0x00000014 pop ebp 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F0FE14B0515h 0x0000001c rdtsc |