Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D25589 second address: D2558D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D09907 second address: D0990B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D246F0 second address: D246F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D24ABF second address: D24AC5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D24C55 second address: D24C5E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D24C5E second address: D24C70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FA944B213E6h 0x0000000a popad 0x0000000b pushad 0x0000000c push eax 0x0000000d pop eax 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D275B0 second address: D275B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D27706 second address: D2770B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D2774A second address: D277B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jo 00007FA944C70C86h 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f push ecx 0x00000010 jmp 00007FA944C70C8Eh 0x00000015 pop esi 0x00000016 push 00000000h 0x00000018 push 00000000h 0x0000001a push esi 0x0000001b call 00007FA944C70C88h 0x00000020 pop esi 0x00000021 mov dword ptr [esp+04h], esi 0x00000025 add dword ptr [esp+04h], 00000017h 0x0000002d inc esi 0x0000002e push esi 0x0000002f ret 0x00000030 pop esi 0x00000031 ret 0x00000032 jmp 00007FA944C70C8Ch 0x00000037 call 00007FA944C70C89h 0x0000003c push esi 0x0000003d jmp 00007FA944C70C8Eh 0x00000042 pop esi 0x00000043 push eax 0x00000044 push eax 0x00000045 push eax 0x00000046 push edx 0x00000047 jp 00007FA944C70C86h 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D278A6 second address: D278AF instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D279E3 second address: D27A44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 xor dword ptr [esp], 797FB39Eh 0x0000000d and ecx, 32639180h 0x00000013 push 00000003h 0x00000015 push 00000000h 0x00000017 push esi 0x00000018 call 00007FA944C70C88h 0x0000001d pop esi 0x0000001e mov dword ptr [esp+04h], esi 0x00000022 add dword ptr [esp+04h], 00000015h 0x0000002a inc esi 0x0000002b push esi 0x0000002c ret 0x0000002d pop esi 0x0000002e ret 0x0000002f mov dword ptr [ebp+122D1FF1h], ecx 0x00000035 push 00000000h 0x00000037 mov esi, dword ptr [ebp+122D2C8Eh] 0x0000003d mov ecx, dword ptr [ebp+122D2C4Eh] 0x00000043 push 00000003h 0x00000045 call 00007FA944C70C8Bh 0x0000004a mov edi, ebx 0x0000004c pop esi 0x0000004d push A3718943h 0x00000052 push eax 0x00000053 push edx 0x00000054 push edi 0x00000055 push edx 0x00000056 pop edx 0x00000057 pop edi 0x00000058 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D27A44 second address: D27A4A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D27A4A second address: D27AAE instructions: 0x00000000 rdtsc 0x00000002 jns 00007FA944C70C86h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c add dword ptr [esp], 1C8E76BDh 0x00000013 mov esi, dword ptr [ebp+122D2B9Eh] 0x00000019 call 00007FA944C70C8Fh 0x0000001e jbe 00007FA944C70C8Ch 0x00000024 mov dword ptr [ebp+122D1F79h], esi 0x0000002a pop esi 0x0000002b lea ebx, dword ptr [ebp+124524DAh] 0x00000031 call 00007FA944C70C8Ah 0x00000036 and esi, dword ptr [ebp+122D2073h] 0x0000003c pop edi 0x0000003d push ebx 0x0000003e jns 00007FA944C70C89h 0x00000044 pop ecx 0x00000045 xchg eax, ebx 0x00000046 pushad 0x00000047 push edi 0x00000048 js 00007FA944C70C86h 0x0000004e pop edi 0x0000004f push ecx 0x00000050 push eax 0x00000051 push edx 0x00000052 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D3A064 second address: D3A078 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jl 00007FA944B213F0h 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D1C13F second address: D1C151 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push ecx 0x00000006 jo 00007FA944C70C86h 0x0000000c pop ecx 0x0000000d popad 0x0000000e push esi 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D45C5E second address: D45C68 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007FA944B213E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D45C68 second address: D45C85 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jbe 00007FA944C70C8Ch 0x0000000e je 00007FA944C70C86h 0x00000014 pop edx 0x00000015 pop eax 0x00000016 push edi 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D45C85 second address: D45C89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D45EDD second address: D45F24 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FA944C70CA8h 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FA944C70C99h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D45F24 second address: D45F28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D45F28 second address: D45F2C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D4634D second address: D46396 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA944B213F6h 0x00000008 jmp 00007FA944B213F0h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FA944B213EEh 0x00000016 pushad 0x00000017 jmp 00007FA944B213EAh 0x0000001c jmp 00007FA944B213F2h 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D46396 second address: D4639D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D4639D second address: D463A2 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D463A2 second address: D463B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FA944C70C86h 0x0000000a pop edi 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D46505 second address: D46532 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213ECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FA944B213F8h 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D46532 second address: D46538 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D46538 second address: D46564 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FA944B213E6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ebx 0x0000000d pushad 0x0000000e popad 0x0000000f jnp 00007FA944B213E6h 0x00000015 pop ebx 0x00000016 pushad 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 jmp 00007FA944B213EFh 0x0000001e push ebx 0x0000001f pop ebx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D46989 second address: D469B5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944C70C97h 0x00000007 jmp 00007FA944C70C8Dh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D46CC2 second address: D46D03 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d jg 00007FA944B213E6h 0x00000013 popad 0x00000014 jng 00007FA944B21418h 0x0000001a jmp 00007FA944B213ECh 0x0000001f pushad 0x00000020 jmp 00007FA944B213F8h 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D46D03 second address: D46D09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D1DB85 second address: D1DB8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D1DB8F second address: D1DBB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FA944C70C93h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push edi 0x0000000f pop edi 0x00000010 jns 00007FA944C70C86h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D1DBB3 second address: D1DBBD instructions: 0x00000000 rdtsc 0x00000002 js 00007FA944B213E6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D46FA9 second address: D46FB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FA944C70C86h 0x0000000a push edx 0x0000000b pop edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D46FB7 second address: D46FC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D46FC1 second address: D46FDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA944C70C94h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D47697 second address: D4769D instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D4769D second address: D476C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 je 00007FA944C70C8Ch 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FA944C70C8Ah 0x00000014 pushad 0x00000015 pushad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D476C1 second address: D476CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FA944B213E6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D476CC second address: D476D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D4785A second address: D4785F instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D4C187 second address: D4C18B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D4C18B second address: D4C19D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov eax, dword ptr [eax] 0x00000008 push eax 0x00000009 push edx 0x0000000a jns 00007FA944B213E8h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D4C19D second address: D4C1B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA944C70C97h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D4C1B8 second address: D4C1D4 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FA944B213E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp+04h], eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushad 0x00000014 popad 0x00000015 jnc 00007FA944B213E6h 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D171D1 second address: D171D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D53282 second address: D5328B instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5328B second address: D53291 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D53AA4 second address: D53AC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 jmp 00007FA944B213F6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D53AC3 second address: D53AD9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FA944C70C86h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d pushad 0x0000000e jo 00007FA944C70C86h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D54714 second address: D54718 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D550EC second address: D550F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5521A second address: D55220 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D55220 second address: D55224 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D55313 second address: D5536A instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FA944B213E8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d call 00007FA944B213F9h 0x00000012 mov si, cx 0x00000015 pop edi 0x00000016 xchg eax, ebx 0x00000017 jmp 00007FA944B213F8h 0x0000001c push eax 0x0000001d push eax 0x0000001e push edx 0x0000001f push edi 0x00000020 jmp 00007FA944B213EDh 0x00000025 pop edi 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5536A second address: D55370 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D55825 second address: D55887 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jmp 00007FA944B213F3h 0x00000010 nop 0x00000011 jmp 00007FA944B213F1h 0x00000016 mov esi, ecx 0x00000018 push 00000000h 0x0000001a push 00000000h 0x0000001c push ebx 0x0000001d call 00007FA944B213E8h 0x00000022 pop ebx 0x00000023 mov dword ptr [esp+04h], ebx 0x00000027 add dword ptr [esp+04h], 00000017h 0x0000002f inc ebx 0x00000030 push ebx 0x00000031 ret 0x00000032 pop ebx 0x00000033 ret 0x00000034 push 00000000h 0x00000036 add edi, 0391B17Ah 0x0000003c xchg eax, ebx 0x0000003d push eax 0x0000003e push edx 0x0000003f push eax 0x00000040 push edx 0x00000041 push edi 0x00000042 pop edi 0x00000043 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D55887 second address: D558A1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944C70C96h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5620A second address: D56210 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D580A0 second address: D580A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D59ACA second address: D59AFB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213F3h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FA944B213F0h 0x00000010 push eax 0x00000011 push edx 0x00000012 jo 00007FA944B213E6h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5AA9C second address: D5AAA2 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5B4DC second address: D5B4E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5B4E2 second address: D5B4FB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jnp 00007FA944C70CA1h 0x00000011 push eax 0x00000012 push edx 0x00000013 jl 00007FA944C70C86h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5B7F3 second address: D5B7FD instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FA944B213ECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5C2F1 second address: D5C317 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007FA944C70C86h 0x00000009 jmp 00007FA944C70C95h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 pushad 0x00000013 push ecx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5C317 second address: D5C31F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5C083 second address: D5C092 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5C092 second address: D5C0A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jnp 00007FA944B213ECh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D156AB second address: D156BF instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007FA944C70C8Dh 0x00000008 pop esi 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D156BF second address: D156C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D623CB second address: D623D5 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA944C70C8Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D642D0 second address: D642E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jmp 00007FA944B213F2h 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D642E9 second address: D64307 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA944C70C99h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D64307 second address: D64324 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FA944B213E6h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 pushad 0x00000011 pushad 0x00000012 popad 0x00000013 jl 00007FA944B213E6h 0x00000019 push esi 0x0000001a pop esi 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D64324 second address: D64338 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jno 00007FA944C70C88h 0x0000000b pushad 0x0000000c push edx 0x0000000d pop edx 0x0000000e push edi 0x0000000f pop edi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D668F0 second address: D66920 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA944B213F9h 0x00000009 jmp 00007FA944B213F3h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D64A71 second address: D64A80 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push esi 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D66920 second address: D66926 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D66EB9 second address: D66EBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D68E9D second address: D68EA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D68EA2 second address: D68EE1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d adc di, AE37h 0x00000012 push 00000000h 0x00000014 mov edi, 6345C2E8h 0x00000019 push 00000000h 0x0000001b push 00000000h 0x0000001d push ebp 0x0000001e call 00007FA944C70C88h 0x00000023 pop ebp 0x00000024 mov dword ptr [esp+04h], ebp 0x00000028 add dword ptr [esp+04h], 00000015h 0x00000030 inc ebp 0x00000031 push ebp 0x00000032 ret 0x00000033 pop ebp 0x00000034 ret 0x00000035 mov bh, EFh 0x00000037 xchg eax, esi 0x00000038 pushad 0x00000039 pushad 0x0000003a push eax 0x0000003b push edx 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D68EE1 second address: D68EE7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D69E30 second address: D69E34 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D69E34 second address: D69E3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D6A047 second address: D6A06F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push eax 0x00000007 pop eax 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jmp 00007FA944C70C97h 0x00000013 push esi 0x00000014 pop esi 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D6AFF5 second address: D6AFFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D6CECE second address: D6CED4 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D6A14B second address: D6A14F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D6CED4 second address: D6CEDB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D6DCAF second address: D6DCB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D6FCE8 second address: D6FD54 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push esi 0x00000004 pop esi 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push 00000000h 0x0000000b push ebx 0x0000000c call 00007FA944C70C88h 0x00000011 pop ebx 0x00000012 mov dword ptr [esp+04h], ebx 0x00000016 add dword ptr [esp+04h], 0000001Dh 0x0000001e inc ebx 0x0000001f push ebx 0x00000020 ret 0x00000021 pop ebx 0x00000022 ret 0x00000023 push 00000000h 0x00000025 mov dword ptr [ebp+122D1F86h], eax 0x0000002b push 00000000h 0x0000002d xor di, 7E5Ah 0x00000032 mov bx, si 0x00000035 xchg eax, esi 0x00000036 jo 00007FA944C70C98h 0x0000003c jmp 00007FA944C70C92h 0x00000041 push eax 0x00000042 jp 00007FA944C70C98h 0x00000048 push eax 0x00000049 push edx 0x0000004a jmp 00007FA944C70C8Ah 0x0000004f rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D6EF24 second address: D6EF2A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D6EF2A second address: D6EF61 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944C70C98h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA944C70C96h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D6EF61 second address: D6EF66 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D70E43 second address: D70E47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D71EB2 second address: D71F04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 push eax 0x00000007 jmp 00007FA944B213EAh 0x0000000c nop 0x0000000d mov dword ptr [ebp+122D2F9Fh], esi 0x00000013 push 00000000h 0x00000015 cld 0x00000016 xor dword ptr [ebp+122D212Fh], eax 0x0000001c push 00000000h 0x0000001e mov edi, dword ptr [ebp+122D1F86h] 0x00000024 js 00007FA944B213ECh 0x0000002a push eax 0x0000002b pushad 0x0000002c jno 00007FA944B213ECh 0x00000032 push eax 0x00000033 push edx 0x00000034 jmp 00007FA944B213EDh 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D71040 second address: D7104B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FA944C70C86h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D7104B second address: D71050 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D71050 second address: D7106C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FA944C70C92h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D72F7F second address: D72F83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D72F83 second address: D72FEB instructions: 0x00000000 rdtsc 0x00000002 jp 00007FA944C70C86h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b push eax 0x0000000c jmp 00007FA944C70C93h 0x00000011 nop 0x00000012 push 00000000h 0x00000014 push ebp 0x00000015 call 00007FA944C70C88h 0x0000001a pop ebp 0x0000001b mov dword ptr [esp+04h], ebp 0x0000001f add dword ptr [esp+04h], 00000014h 0x00000027 inc ebp 0x00000028 push ebp 0x00000029 ret 0x0000002a pop ebp 0x0000002b ret 0x0000002c sub dword ptr [ebp+122D3069h], ebx 0x00000032 push 00000000h 0x00000034 mov dword ptr [ebp+122D1F62h], eax 0x0000003a mov bl, 52h 0x0000003c push 00000000h 0x0000003e mov dword ptr [ebp+122D203Dh], edi 0x00000044 xchg eax, esi 0x00000045 push eax 0x00000046 push edx 0x00000047 jmp 00007FA944C70C91h 0x0000004c rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D72FEB second address: D7301A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213F4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jmp 00007FA944B213F2h 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D7301A second address: D73020 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D7B540 second address: D7B560 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213F0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e pop esi 0x0000000f pop esi 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D7B560 second address: D7B583 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA944C70C92h 0x00000009 jng 00007FA944C70C86h 0x0000000f ja 00007FA944C70C86h 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D7B583 second address: D7B59B instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FA944B213F2h 0x00000008 push eax 0x00000009 push edx 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D7AC8D second address: D7AC91 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D7AC91 second address: D7ACD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA944B213F1h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jmp 00007FA944B213F2h 0x00000010 pop ebx 0x00000011 jnp 00007FA944B213FEh 0x00000017 jno 00007FA944B213EAh 0x0000001d push edx 0x0000001e js 00007FA944B213E6h 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D86148 second address: D8614E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D867EB second address: D867F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D867F6 second address: D867FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D867FA second address: D86807 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D86A86 second address: D86A8A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D86A8A second address: D86AAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jbe 00007FA944B213FFh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D86AAF second address: D86AB4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8C5EF second address: D8C5F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8B0DB second address: D8B0EA instructions: 0x00000000 rdtsc 0x00000002 jne 00007FA944C70C86h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8B5D5 second address: D8B5EE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213EAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jno 00007FA944B213EEh 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8B8CC second address: D8B8E9 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FA944C70C91h 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8B8E9 second address: D8B908 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213F2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a jnl 00007FA944B213E6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8BBCB second address: D8BC05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007FA944C70C96h 0x0000000b push edx 0x0000000c pop edx 0x0000000d popad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 jnc 00007FA944C70C8Ah 0x00000017 jnc 00007FA944C70C8Eh 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8BC05 second address: D8BC0A instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8BD75 second address: D8BD90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA944C70C97h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8BD90 second address: D8BDA6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 pop eax 0x00000009 pop edi 0x0000000a popad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f pop eax 0x00000010 jnl 00007FA944B213E6h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8BDA6 second address: D8BDB4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jne 00007FA944C70C86h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8C026 second address: D8C049 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213EAh 0x00000007 jns 00007FA944B213EEh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 pushad 0x00000013 popad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8C049 second address: D8C04E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8C04E second address: D8C05B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 js 00007FA944B213E6h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8C44A second address: D8C46A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944C70C92h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jnp 00007FA944C70C86h 0x00000011 push eax 0x00000012 pop eax 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8C46A second address: D8C46E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8C46E second address: D8C479 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8AC74 second address: D8AC7E instructions: 0x00000000 rdtsc 0x00000002 jc 00007FA944B213ECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8AC7E second address: D8AC85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D8AC85 second address: D8ACA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 jo 00007FA944B213E6h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jp 00007FA944B213EEh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D96B39 second address: D96B3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D96B3E second address: D96B76 instructions: 0x00000000 rdtsc 0x00000002 js 00007FA944B213FDh 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007FA944B213F5h 0x0000000f pushad 0x00000010 jng 00007FA944B213E6h 0x00000016 jmp 00007FA944B213EEh 0x0000001b pushad 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5D4AB second address: D5D528 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 jmp 00007FA944C70C99h 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push ecx 0x0000000f call 00007FA944C70C88h 0x00000014 pop ecx 0x00000015 mov dword ptr [esp+04h], ecx 0x00000019 add dword ptr [esp+04h], 00000017h 0x00000021 inc ecx 0x00000022 push ecx 0x00000023 ret 0x00000024 pop ecx 0x00000025 ret 0x00000026 mov dword ptr [ebp+122D20FFh], edi 0x0000002c mov cx, dx 0x0000002f mov ecx, 0F8D13F1h 0x00000034 lea eax, dword ptr [ebp+12488230h] 0x0000003a sbb dx, F51Dh 0x0000003f mov dword ptr [ebp+122D1CFAh], ecx 0x00000045 nop 0x00000046 pushad 0x00000047 pushad 0x00000048 pushad 0x00000049 popad 0x0000004a jnl 00007FA944C70C86h 0x00000050 popad 0x00000051 jng 00007FA944C70C8Ch 0x00000057 popad 0x00000058 push eax 0x00000059 push esi 0x0000005a push eax 0x0000005b push edx 0x0000005c push eax 0x0000005d push edx 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5D528 second address: D5D52C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5D5BA second address: D5D5C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5D5C0 second address: D5D5C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5D97E second address: D5D984 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5DC25 second address: D5DC2B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5DC2B second address: D5DC4D instructions: 0x00000000 rdtsc 0x00000002 ja 00007FA944C70C88h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA944C70C93h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5DC4D second address: D5DC52 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5DC52 second address: D5DC6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a adc edx, 1E5C8685h 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 jne 00007FA944C70C88h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5DEE1 second address: D5DF2D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ebx 0x0000000b call 00007FA944B213E8h 0x00000010 pop ebx 0x00000011 mov dword ptr [esp+04h], ebx 0x00000015 add dword ptr [esp+04h], 00000017h 0x0000001d inc ebx 0x0000001e push ebx 0x0000001f ret 0x00000020 pop ebx 0x00000021 ret 0x00000022 mov edi, dword ptr [ebp+122D2916h] 0x00000028 add dword ptr [ebp+12464306h], esi 0x0000002e push 00000004h 0x00000030 jg 00007FA944B213ECh 0x00000036 nop 0x00000037 je 00007FA944B213F0h 0x0000003d push eax 0x0000003e push edx 0x0000003f push eax 0x00000040 pop eax 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5E21F second address: D5E224 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5E4CA second address: D5E51F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FA944B213EDh 0x0000000a popad 0x0000000b mov eax, dword ptr [eax] 0x0000000d pushad 0x0000000e jmp 00007FA944B213F7h 0x00000013 push esi 0x00000014 jmp 00007FA944B213F1h 0x00000019 pop esi 0x0000001a popad 0x0000001b mov dword ptr [esp+04h], eax 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007FA944B213EEh 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5E620 second address: D5E62A instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA944C70C86h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5E62A second address: D5E687 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push edi 0x0000000f call 00007FA944B213E8h 0x00000014 pop edi 0x00000015 mov dword ptr [esp+04h], edi 0x00000019 add dword ptr [esp+04h], 00000019h 0x00000021 inc edi 0x00000022 push edi 0x00000023 ret 0x00000024 pop edi 0x00000025 ret 0x00000026 lea eax, dword ptr [ebp+12488230h] 0x0000002c mov ch, dh 0x0000002e push eax 0x0000002f jng 00007FA944B2140Bh 0x00000035 push eax 0x00000036 push edx 0x00000037 jmp 00007FA944B213F9h 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5E687 second address: D5E68B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D5E68B second address: D3DEBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 call dword ptr [ebp+122D20F8h] 0x0000000f push eax 0x00000010 push edx 0x00000011 jng 00007FA944B213EEh 0x00000017 push ebx 0x00000018 pop ebx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D3DEBF second address: D3DEC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D96E3B second address: D96E60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 push ebx 0x00000007 ja 00007FA944B213E8h 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FA944B213F4h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D96E60 second address: D96E64 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D97247 second address: D9724B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D9724B second address: D97257 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D9D20D second address: D9D23E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213F7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a pushad 0x0000000b jnl 00007FA944B213E6h 0x00000011 pushad 0x00000012 popad 0x00000013 jnc 00007FA944B213E6h 0x00000019 popad 0x0000001a pushad 0x0000001b push ecx 0x0000001c pop ecx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D9D23E second address: D9D244 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D9C0E3 second address: D9C10A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jp 00007FA944B213E6h 0x00000010 push eax 0x00000011 pop eax 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D9C2BC second address: D9C2C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007FA944C70C86h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D9C565 second address: D9C569 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D9C569 second address: D9C58D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jns 00007FA944C70C86h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ebx 0x0000000d jmp 00007FA944C70C8Fh 0x00000012 jg 00007FA944C70C8Ch 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D9C6C0 second address: D9C6C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D9C6C4 second address: D9C6C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D9C961 second address: D9C9AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FA944B213E6h 0x0000000a jmp 00007FA944B213EEh 0x0000000f jmp 00007FA944B213F4h 0x00000014 popad 0x00000015 push eax 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FA944B213F8h 0x0000001d push esi 0x0000001e pop esi 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D9CF65 second address: D9CF71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FA944C70C86h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D9CF71 second address: D9CF79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DA0D41 second address: DA0D5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FA944C70C86h 0x0000000a jnl 00007FA944C70C86h 0x00000010 popad 0x00000011 push ecx 0x00000012 jne 00007FA944C70C86h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DA0D5B second address: DA0D76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 push edi 0x00000008 jmp 00007FA944B213F2h 0x0000000d pop edi 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DA0D76 second address: DA0D87 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA944C70C8Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DA0D87 second address: DA0D8D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DA30A5 second address: DA30AF instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FA944C70C86h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DA30AF second address: DA30DE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 jbe 00007FA944B213E6h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jl 00007FA944B2141Eh 0x00000014 jmp 00007FA944B213F7h 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DA30DE second address: DA30E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DA846F second address: DA848A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA944B213F5h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DA848A second address: DA84A4 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 pop edi 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jc 00007FA944C70CA8h 0x00000010 push eax 0x00000011 push edx 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 jbe 00007FA944C70C86h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DA935E second address: DA9362 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DAC539 second address: DAC53F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DAC53F second address: DAC543 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DAC543 second address: DAC549 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DABCCC second address: DABCD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DABFA2 second address: DABFAE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jne 00007FA944C70C86h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DAC2B8 second address: DAC2BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB10DD second address: DB10F8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944C70C94h 0x00000007 pushad 0x00000008 push edx 0x00000009 pop edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB037E second address: DB0390 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push esi 0x00000007 pop esi 0x00000008 push edi 0x00000009 pop edi 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d pop ebx 0x0000000e pushad 0x0000000f push esi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB04F6 second address: DB0505 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FA944C70C86h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB0A59 second address: DB0A5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB0A5D second address: DB0A7C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FA944C70C8Bh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jo 00007FA944C70C8Eh 0x00000011 push esi 0x00000012 pop esi 0x00000013 jg 00007FA944C70C86h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB0A7C second address: DB0A81 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB0A81 second address: DB0A99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FA944C70C8Dh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB0A99 second address: DB0A9D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB0C07 second address: DB0C0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB0C0B second address: DB0C2A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213F1h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b js 00007FA944B213E8h 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB757F second address: DB7598 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944C70C94h 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB7598 second address: DB75C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA944B213ECh 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push ecx 0x0000000e push edx 0x0000000f pop edx 0x00000010 jmp 00007FA944B213F2h 0x00000015 pop ecx 0x00000016 pushad 0x00000017 push ebx 0x00000018 pop ebx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB7715 second address: DB7734 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944C70C8Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jo 00007FA944C70C9Ch 0x0000000f pushad 0x00000010 jo 00007FA944C70C86h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB7FDA second address: DB7FE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB7FE0 second address: DB7FE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB7FE4 second address: DB7FE8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB82CC second address: DB82ED instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FA944C70C99h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB82ED second address: DB82F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DB8F2F second address: DB8F35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DBF04F second address: DBF062 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 jo 00007FA944B21404h 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DBF062 second address: DBF068 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DBF068 second address: DBF06C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DBF06C second address: DBF070 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC2C80 second address: DC2CA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ecx 0x00000007 push edi 0x00000008 pushad 0x00000009 popad 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007FA944B213F4h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC205C second address: DC206C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jc 00007FA944C70C8Eh 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC206C second address: DC207A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 jp 00007FA944B213E6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC207A second address: DC2080 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC2194 second address: DC219D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC231C second address: DC2329 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FA944C70C86h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC2329 second address: DC232F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC232F second address: DC2352 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007FA944C70C86h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA944C70C96h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC2352 second address: DC235C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC235C second address: DC2360 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC2360 second address: DC2366 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC24C5 second address: DC24C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC24C9 second address: DC24CD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC24CD second address: DC24D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC24D9 second address: DC24FB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pushad 0x0000000b jno 00007FA944B213E8h 0x00000011 pushad 0x00000012 popad 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC24FB second address: DC2501 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DCB3BC second address: DCB3C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DCB3C2 second address: DCB3CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DCB3CB second address: DCB3CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC9B6B second address: DC9B84 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FA944C70C91h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC9CD9 second address: DC9D02 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213ECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA944B213F6h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC9D02 second address: DC9D06 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC9E63 second address: DC9E75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA944B213EEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC9FC2 second address: DC9FD5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FA944C70C86h 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jnl 00007FA944C70C86h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC9FD5 second address: DC9FDF instructions: 0x00000000 rdtsc 0x00000002 jc 00007FA944B213E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DCA179 second address: DCA183 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FA944C70C86h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DCA183 second address: DCA1A6 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jne 00007FA944B213E6h 0x00000009 pop edi 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA944B213F7h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DC9050 second address: DC9056 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DD16C5 second address: DD16DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA944B213F4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DD16DD second address: DD16EC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 je 00007FA944C70C86h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DD16EC second address: DD16F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DD16F1 second address: DD1705 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 jo 00007FA944C70C86h 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DD1705 second address: DD1709 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DD196C second address: DD1970 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DD346B second address: DD3471 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DD3471 second address: DD3477 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DD3477 second address: DD3481 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DD3481 second address: DD349C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944C70C97h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DDDBD0 second address: DDDBDB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jp 00007FA944B213E6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DDDBDB second address: DDDBE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DE44FE second address: DE4516 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213EDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pushad 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DE4516 second address: DE451F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DE451F second address: DE4523 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DE4523 second address: DE4527 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DE4527 second address: DE454E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA944B213F7h 0x0000000b push eax 0x0000000c push edx 0x0000000d jp 00007FA944B213E6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DE454E second address: DE4552 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DE6900 second address: DE6913 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 jno 00007FA944B213ECh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DE6913 second address: DE6931 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jmp 00007FA944C70C98h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DE6931 second address: DE6964 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jmp 00007FA944B213F3h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DE6AB4 second address: DE6ABA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DE6ABA second address: DE6AC0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DE6AC0 second address: DE6AC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DE6AC6 second address: DE6ACA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D0E9A6 second address: D0E9B0 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FA944C70C86h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D0E9B0 second address: D0E9BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DF301F second address: DF3040 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 jmp 00007FA944C70C92h 0x0000000b push edi 0x0000000c pop edi 0x0000000d jp 00007FA944C70C86h 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DF3040 second address: DF3062 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA944B213EDh 0x00000009 jmp 00007FA944B213F1h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DF6B14 second address: DF6B1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DFD5C4 second address: DFD5E5 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jmp 00007FA944B213F9h 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DFD5E5 second address: DFD5E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DFD5E9 second address: DFD5ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DFD753 second address: DFD757 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DFD757 second address: DFD784 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA944B213F9h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b ja 00007FA944B213E8h 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 push eax 0x00000014 push edx 0x00000015 push esi 0x00000016 pop esi 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DFD784 second address: DFD78E instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FA944C70C86h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DFDC0C second address: DFDC24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA944B213EDh 0x00000009 jc 00007FA944B213E6h 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DFDC24 second address: DFDC38 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FA944C70C8Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: DFEAC7 second address: DFEACB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E038AD second address: E038B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E038B1 second address: E038C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007FA944B213E8h 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 jnc 00007FA944B213E6h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E038C7 second address: E038CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E1D86C second address: E1D88B instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007FA944B213F8h 0x00000008 pop edi 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E21F18 second address: E21F1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E21F1C second address: E21F20 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E21F20 second address: E21F5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 jng 00007FA944C70C86h 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 jnc 00007FA944C70C8Ah 0x0000001a jno 00007FA944C70C9Fh 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E261DB second address: E261DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E3914E second address: E39152 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E39152 second address: E39158 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E39158 second address: E3915E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E39AC1 second address: E39AEE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA944B213F4h 0x00000008 jmp 00007FA944B213F2h 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E39D97 second address: E39DE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FA944C70C94h 0x0000000b popad 0x0000000c pushad 0x0000000d jmp 00007FA944C70C92h 0x00000012 jmp 00007FA944C70C99h 0x00000017 push edx 0x00000018 pop edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E39DE2 second address: E39E0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FA944B213EAh 0x0000000a popad 0x0000000b push edi 0x0000000c jne 00007FA944B213F2h 0x00000012 push eax 0x00000013 push edx 0x00000014 je 00007FA944B213E6h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E3A0F8 second address: E3A0FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E3A0FD second address: E3A10D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FA944B213E6h 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E3A10D second address: E3A12F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA944C70C8Dh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f jnl 00007FA944C70C86h 0x00000015 pop ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E3A12F second address: E3A135 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E3A135 second address: E3A139 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E3A139 second address: E3A13D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E3A13D second address: E3A145 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E3A145 second address: E3A150 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007FA944B213E6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E3A150 second address: E3A156 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E3B99B second address: E3B9B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FA944B213F1h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E3B9B2 second address: E3B9B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D1203E second address: D12042 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D12042 second address: D12046 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D12046 second address: D1204C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D1204C second address: D12052 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D12052 second address: D12058 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D12058 second address: D120A0 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA944C70C96h 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 jmp 00007FA944C70C92h 0x00000016 pop edx 0x00000017 jl 00007FA944C70C8Eh 0x0000001d jns 00007FA944C70C86h 0x00000023 push ebx 0x00000024 pop ebx 0x00000025 push edx 0x00000026 pushad 0x00000027 popad 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E3F952 second address: E3F95F instructions: 0x00000000 rdtsc 0x00000002 jno 00007FA944B213E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E3FF08 second address: E3FF31 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b mov edx, dword ptr [ebp+122D2D86h] 0x00000011 push dword ptr [ebp+122D2B2Ah] 0x00000017 stc 0x00000018 push 19D7C251h 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 jp 00007FA944C70C86h 0x00000026 push ecx 0x00000027 pop ecx 0x00000028 popad 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E3FF31 second address: E3FF37 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E3FF37 second address: E3FF3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E3FF3B second address: E3FF3F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E41944 second address: E41949 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E41949 second address: E41953 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007FA944B213E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E413F2 second address: E4142D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944C70C95h 0x00000007 jnl 00007FA944C70C86h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push ecx 0x00000010 jmp 00007FA944C70C94h 0x00000015 jno 00007FA944C70C86h 0x0000001b pop ecx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E4142D second address: E4145A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jmp 00007FA944B213F3h 0x00000008 jmp 00007FA944B213F3h 0x0000000d pop eax 0x0000000e push ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E4145A second address: E4147B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA944C70C8Ah 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007FA944C70C8Bh 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E4147B second address: E4147F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E4147F second address: E41483 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: E43418 second address: E4341C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: D57209 second address: D57213 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FA944C70C86h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F02D4 second address: 52F02DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F02DA second address: 52F02DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F02DE second address: 52F02E2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F02E2 second address: 52F02F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F02F1 second address: 52F030A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213F5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F030A second address: 52F031A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA944C70C8Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F031A second address: 52F0383 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b jmp 00007FA944B213F7h 0x00000010 mov ebp, esp 0x00000012 jmp 00007FA944B213F6h 0x00000017 mov edx, dword ptr [ebp+0Ch] 0x0000001a jmp 00007FA944B213F0h 0x0000001f mov ecx, dword ptr [ebp+08h] 0x00000022 push eax 0x00000023 push edx 0x00000024 jmp 00007FA944B213F7h 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F0383 second address: 52F0389 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F0389 second address: 52F038D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F03A0 second address: 52F03A6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5310549 second address: 531056D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA944B213ECh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 531056D second address: 531057F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA944C70C8Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 531057F second address: 53105B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov esi, 0F0722BFh 0x00000011 pushfd 0x00000012 jmp 00007FA944B213F4h 0x00000017 or ax, 8DA8h 0x0000001c jmp 00007FA944B213EBh 0x00000021 popfd 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53105B7 second address: 53105D0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov cx, di 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FA944C70C8Ah 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53105D0 second address: 53105D6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53105D6 second address: 53105DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53105DA second address: 5310617 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 jmp 00007FA944B213F6h 0x0000000e mov dword ptr [esp], ecx 0x00000011 pushad 0x00000012 push ecx 0x00000013 mov si, dx 0x00000016 pop edx 0x00000017 mov ecx, 48CFB375h 0x0000001c popad 0x0000001d xchg eax, esi 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007FA944B213EAh 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5310617 second address: 5310626 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944C70C8Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5310626 second address: 5310667 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov dx, si 0x0000000e popad 0x0000000f xchg eax, esi 0x00000010 jmp 00007FA944B213F4h 0x00000015 lea eax, dword ptr [ebp-04h] 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5310667 second address: 531066D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 531066D second address: 53106A7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213F4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a jmp 00007FA944B213F0h 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FA944B213EEh 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53106A7 second address: 5310717 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FA944C70C91h 0x00000009 adc si, C8B6h 0x0000000e jmp 00007FA944C70C91h 0x00000013 popfd 0x00000014 pushfd 0x00000015 jmp 00007FA944C70C90h 0x0000001a sbb ecx, 2D3443D8h 0x00000020 jmp 00007FA944C70C8Bh 0x00000025 popfd 0x00000026 popad 0x00000027 pop edx 0x00000028 pop eax 0x00000029 nop 0x0000002a pushad 0x0000002b mov di, cx 0x0000002e jmp 00007FA944C70C90h 0x00000033 popad 0x00000034 push dword ptr [ebp+08h] 0x00000037 pushad 0x00000038 push eax 0x00000039 push edx 0x0000003a push eax 0x0000003b push edx 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5310717 second address: 531071B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53107AC second address: 53107B2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53107B2 second address: 5310800 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213F4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, esi 0x0000000b jmp 00007FA944B213F0h 0x00000010 pop esi 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov edi, 790B4C30h 0x00000019 call 00007FA944B213F9h 0x0000001e pop esi 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5310800 second address: 5300048 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944C70C8Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 leave 0x0000000a jmp 00007FA944C70C90h 0x0000000f retn 0004h 0x00000012 nop 0x00000013 sub esp, 04h 0x00000016 xor ebx, ebx 0x00000018 cmp eax, 00000000h 0x0000001b je 00007FA944C70DEAh 0x00000021 mov dword ptr [esp], 0000000Dh 0x00000028 call 00007FA9493ECE21h 0x0000002d mov edi, edi 0x0000002f jmp 00007FA944C70C96h 0x00000034 xchg eax, ebp 0x00000035 jmp 00007FA944C70C90h 0x0000003a push eax 0x0000003b jmp 00007FA944C70C8Bh 0x00000040 xchg eax, ebp 0x00000041 push eax 0x00000042 push edx 0x00000043 pushad 0x00000044 call 00007FA944C70C8Bh 0x00000049 pop eax 0x0000004a push ebx 0x0000004b pop esi 0x0000004c popad 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5300048 second address: 5300098 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213F2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov edx, 18E43EA0h 0x00000013 pushfd 0x00000014 jmp 00007FA944B213F9h 0x00000019 xor ch, FFFFFFA6h 0x0000001c jmp 00007FA944B213F1h 0x00000021 popfd 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5300098 second address: 530009D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 530009D second address: 53000D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007FA944B213EDh 0x0000000a or ah, 00000006h 0x0000000d jmp 00007FA944B213F1h 0x00000012 popfd 0x00000013 popad 0x00000014 pop edx 0x00000015 pop eax 0x00000016 sub esp, 2Ch 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53000D0 second address: 53000D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53000D4 second address: 53000DA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53000DA second address: 53000E0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53000E0 second address: 5300114 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213ECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebx 0x0000000c jmp 00007FA944B213F0h 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FA944B213EEh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5300114 second address: 5300126 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA944C70C8Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5300126 second address: 530012A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 530012A second address: 53001A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebx 0x00000009 pushad 0x0000000a push ebx 0x0000000b call 00007FA944C70C98h 0x00000010 pop eax 0x00000011 pop ebx 0x00000012 pushfd 0x00000013 jmp 00007FA944C70C90h 0x00000018 add eax, 0AADEFF8h 0x0000001e jmp 00007FA944C70C8Bh 0x00000023 popfd 0x00000024 popad 0x00000025 xchg eax, edi 0x00000026 push eax 0x00000027 push edx 0x00000028 pushad 0x00000029 pushfd 0x0000002a jmp 00007FA944C70C8Bh 0x0000002f adc ax, 3BBEh 0x00000034 jmp 00007FA944C70C99h 0x00000039 popfd 0x0000003a pushad 0x0000003b popad 0x0000003c popad 0x0000003d rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53001A5 second address: 53001AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53001AB second address: 53001AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53001AF second address: 5300250 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FA944B213F7h 0x00000013 xor si, DB2Eh 0x00000018 jmp 00007FA944B213F9h 0x0000001d popfd 0x0000001e mov bx, si 0x00000021 popad 0x00000022 xchg eax, edi 0x00000023 pushad 0x00000024 pushad 0x00000025 mov edi, ecx 0x00000027 call 00007FA944B213F2h 0x0000002c pop eax 0x0000002d popad 0x0000002e push eax 0x0000002f push edx 0x00000030 pushfd 0x00000031 jmp 00007FA944B213F1h 0x00000036 sub esi, 35EC44C6h 0x0000003c jmp 00007FA944B213F1h 0x00000041 popfd 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 530030A second address: 5300310 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5300310 second address: 5300353 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213EDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b inc ebx 0x0000000c pushad 0x0000000d movzx ecx, dx 0x00000010 mov ebx, 154ECB5Ch 0x00000015 popad 0x00000016 test al, al 0x00000018 pushad 0x00000019 mov di, 29F4h 0x0000001d mov si, di 0x00000020 popad 0x00000021 je 00007FA944B2159Eh 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007FA944B213F2h 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5300353 second address: 5300365 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA944C70C8Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5300365 second address: 5300369 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5300369 second address: 53003A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 lea ecx, dword ptr [ebp-14h] 0x0000000b jmp 00007FA944C70C97h 0x00000010 mov dword ptr [ebp-14h], edi 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FA944C70C90h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53003A2 second address: 53003B1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53003B1 second address: 53003B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53003B7 second address: 53003BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53003BB second address: 53003BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53003D8 second address: 530040E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a pushad 0x0000000b movzx esi, dx 0x0000000e call 00007FA944B213F1h 0x00000013 mov di, si 0x00000016 pop esi 0x00000017 popad 0x00000018 push eax 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c mov di, 8BCAh 0x00000020 mov cx, bx 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 530040E second address: 5300420 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, eax 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov cx, 18A3h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5300420 second address: 5300425 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53004C5 second address: 53004C9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53004C9 second address: 53004CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53004CF second address: 530054B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944C70C8Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007FA9B659EC40h 0x0000000f jmp 00007FA944C70C90h 0x00000014 mov ebx, dword ptr [ebp+08h] 0x00000017 jmp 00007FA944C70C90h 0x0000001c lea eax, dword ptr [ebp-2Ch] 0x0000001f jmp 00007FA944C70C90h 0x00000024 xchg eax, esi 0x00000025 pushad 0x00000026 mov esi, 710AA07Dh 0x0000002b pushfd 0x0000002c jmp 00007FA944C70C8Ah 0x00000031 or ecx, 7EA38358h 0x00000037 jmp 00007FA944C70C8Bh 0x0000003c popfd 0x0000003d popad 0x0000003e push eax 0x0000003f push eax 0x00000040 push edx 0x00000041 pushad 0x00000042 mov edi, eax 0x00000044 mov al, 21h 0x00000046 popad 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 530054B second address: 53005A2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213F8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov edx, 50085900h 0x00000012 pushfd 0x00000013 jmp 00007FA944B213F9h 0x00000018 or ax, 4306h 0x0000001d jmp 00007FA944B213F1h 0x00000022 popfd 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53005A2 second address: 53005B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA944C70C8Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F0E59 second address: 52F0E5D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F0E5D second address: 52F0E63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F0E63 second address: 52F0E68 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F0E68 second address: 52F0E79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov bx, ax 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F0E79 second address: 52F0E7F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F0E7F second address: 52F0EC7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944C70C93h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FA944C70C8Bh 0x00000013 or al, FFFFFFFEh 0x00000016 jmp 00007FA944C70C99h 0x0000001b popfd 0x0000001c mov dx, si 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F0EC7 second address: 52F0F02 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, 3741605Eh 0x00000008 mov dl, 24h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov ebp, esp 0x0000000f pushad 0x00000010 jmp 00007FA944B213ECh 0x00000015 mov ch, FEh 0x00000017 popad 0x00000018 push ebp 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FA944B213F9h 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F0F02 second address: 52F0F3E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bl, 13h 0x00000005 jmp 00007FA944C70C98h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp], ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007FA944C70C97h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F0F3E second address: 52F0F65 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 movsx edi, ax 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [ebp-04h], 55534552h 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FA944B213F3h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F0F65 second address: 52F0F79 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA944C70C8Fh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F0FA5 second address: 52F0FAB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 52F0FAB second address: 52F0FAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5300C11 second address: 5300CA3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, A9A2h 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xchg eax, ebp 0x0000000b jmp 00007FA944B213F4h 0x00000010 push eax 0x00000011 pushad 0x00000012 movsx edi, cx 0x00000015 push ecx 0x00000016 push edi 0x00000017 pop ecx 0x00000018 pop edx 0x00000019 popad 0x0000001a xchg eax, ebp 0x0000001b jmp 00007FA944B213F0h 0x00000020 mov ebp, esp 0x00000022 jmp 00007FA944B213F0h 0x00000027 cmp dword ptr [76C8459Ch], 05h 0x0000002e jmp 00007FA944B213F0h 0x00000033 je 00007FA9B643F171h 0x00000039 pushad 0x0000003a pushfd 0x0000003b jmp 00007FA944B213EEh 0x00000040 jmp 00007FA944B213F5h 0x00000045 popfd 0x00000046 pushad 0x00000047 push eax 0x00000048 push edx 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5300CEF second address: 5300CF3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5300CF3 second address: 5300D10 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944B213F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5300D10 second address: 5300D16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5300D16 second address: 5300D1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5300D1A second address: 5300D4A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944C70C93h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA944C70C94h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5300D4A second address: 5300D5C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA944B213EEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5300D5C second address: 5300D60 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 531088B second address: 53108BE instructions: 0x00000000 rdtsc 0x00000002 mov ebx, 4068FAE0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a xchg eax, ebp 0x0000000b jmp 00007FA944B213EFh 0x00000010 mov ebp, esp 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FA944B213F5h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53108BE second address: 53108C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53108C4 second address: 53108F2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c jmp 00007FA944B213F1h 0x00000011 jmp 00007FA944B213F0h 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53108F2 second address: 5310904 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA944C70C8Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5310904 second address: 5310940 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], esi 0x0000000b jmp 00007FA944B213F7h 0x00000010 mov esi, dword ptr [ebp+0Ch] 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FA944B213F5h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5310940 second address: 5310950 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA944C70C8Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5310950 second address: 5310966 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test esi, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA944B213EAh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5310966 second address: 531096C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 531096C second address: 5310970 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5310970 second address: 53109AE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007FA9B657E6C5h 0x0000000e pushad 0x0000000f mov eax, edx 0x00000011 call 00007FA944C70C8Bh 0x00000016 push ecx 0x00000017 pop edx 0x00000018 pop ecx 0x00000019 popad 0x0000001a cmp dword ptr [76C8459Ch], 05h 0x00000021 jmp 00007FA944C70C8Bh 0x00000026 je 00007FA9B659677Bh 0x0000002c push eax 0x0000002d push edx 0x0000002e push eax 0x0000002f push edx 0x00000030 pushad 0x00000031 popad 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53109AE second address: 53109B4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53109B4 second address: 53109BA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53109BA second address: 53109BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53109BE second address: 53109FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 jmp 00007FA944C70C90h 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007FA944C70C8Ch 0x00000018 or ax, F028h 0x0000001d jmp 00007FA944C70C8Bh 0x00000022 popfd 0x00000023 mov bx, ax 0x00000026 popad 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 53109FD second address: 5310A03 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5310A03 second address: 5310A38 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA944C70C97h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA944C70C95h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5310A38 second address: 5310A3E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5310A3E second address: 5310A42 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\P0SJULJxI0.exe | RDTSC instruction interceptor: First address: 5310AED second address: 5310B5F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FA944B213ECh 0x00000009 sbb eax, 04B640C8h 0x0000000f jmp 00007FA944B213EBh 0x00000014 popfd 0x00000015 mov di, ax 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b pop esi 0x0000001c pushad 0x0000001d mov di, cx 0x00000020 mov bx, ax 0x00000023 popad 0x00000024 pop ebp 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 pushfd 0x00000029 jmp 00007FA944B213EBh 0x0000002e add eax, 1CD497BEh 0x00000034 jmp 00007FA944B213F9h 0x00000039 popfd 0x0000003a jmp 00007FA944B213F0h 0x0000003f popad 0x00000040 rdtsc |