Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000E8600 | 0_2_000E8600 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000FD003 | 0_2_000FD003 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00164019 | 0_2_00164019 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C4004 | 0_2_001C4004 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000ED021 | 0_2_000ED021 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0018F02B | 0_2_0018F02B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014605F | 0_2_0014605F |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014905F | 0_2_0014905F |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014B074 | 0_2_0014B074 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00154063 | 0_2_00154063 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00147068 | 0_2_00147068 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016306B | 0_2_0016306B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016D094 | 0_2_0016D094 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A309E | 0_2_001A309E |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0010C09E | 0_2_0010C09E |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0015A083 | 0_2_0015A083 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0015608D | 0_2_0015608D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001950B9 | 0_2_001950B9 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B50D1 | 0_2_001B50D1 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001760DB | 0_2_001760DB |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001980C8 | 0_2_001980C8 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C80C5 | 0_2_001C80C5 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0010A0CA | 0_2_0010A0CA |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014E0C8 | 0_2_0014E0C8 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000F60E9 | 0_2_000F60E9 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C50F0 | 0_2_001C50F0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C20ED | 0_2_001C20ED |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A20EF | 0_2_001A20EF |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0010C0E6 | 0_2_0010C0E6 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016F11A | 0_2_0016F11A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000EB100 | 0_2_000EB100 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00160137 | 0_2_00160137 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00190136 | 0_2_00190136 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00182129 | 0_2_00182129 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001AC15B | 0_2_001AC15B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00137154 | 0_2_00137154 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001BF150 | 0_2_001BF150 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0010C09E | 0_2_0010C09E |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A014C | 0_2_001A014C |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016E149 | 0_2_0016E149 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019C146 | 0_2_0019C146 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000F8169 | 0_2_000F8169 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001BB176 | 0_2_001BB176 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000E6160 | 0_2_000E6160 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00179163 | 0_2_00179163 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_002A6154 | 0_2_002A6154 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C6162 | 0_2_001C6162 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C919D | 0_2_001C919D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0010E180 | 0_2_0010E180 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001BA18C | 0_2_001BA18C |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0011F18B | 0_2_0011F18B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001091AE | 0_2_001091AE |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001AD1D6 | 0_2_001AD1D6 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001081CC | 0_2_001081CC |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001781F2 | 0_2_001781F2 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0017B1F2 | 0_2_0017B1F2 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001651E6 | 0_2_001651E6 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014F235 | 0_2_0014F235 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000F1227 | 0_2_000F1227 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000FE220 | 0_2_000FE220 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00195252 | 0_2_00195252 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016B247 | 0_2_0016B247 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0017024A | 0_2_0017024A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C027C | 0_2_001C027C |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_002AB24B | 0_2_002AB24B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001BE271 | 0_2_001BE271 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B4268 | 0_2_001B4268 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00142263 | 0_2_00142263 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000E4270 | 0_2_000E4270 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A829C | 0_2_001A829C |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014D29A | 0_2_0014D29A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00119280 | 0_2_00119280 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0018A28C | 0_2_0018A28C |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B72B0 | 0_2_001B72B0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001042D0 | 0_2_001042D0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001962C1 | 0_2_001962C1 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001452CA | 0_2_001452CA |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001992F0 | 0_2_001992F0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001772FC | 0_2_001772FC |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C32F7 | 0_2_001C32F7 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001732FB | 0_2_001732FB |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001802E7 | 0_2_001802E7 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A7311 | 0_2_001A7311 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0017930E | 0_2_0017930E |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00188301 | 0_2_00188301 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000E9310 | 0_2_000E9310 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B633A | 0_2_001B633A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0015333D | 0_2_0015333D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0018435C | 0_2_0018435C |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019D35C | 0_2_0019D35C |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00186351 | 0_2_00186351 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0017F35B | 0_2_0017F35B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00181354 | 0_2_00181354 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00101340 | 0_2_00101340 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00172343 | 0_2_00172343 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0010D34A | 0_2_0010D34A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0018C343 | 0_2_0018C343 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0010F377 | 0_2_0010F377 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00143366 | 0_2_00143366 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C4369 | 0_2_001C4369 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00141393 | 0_2_00141393 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0013739A | 0_2_0013739A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001593BE | 0_2_001593BE |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C63B0 | 0_2_001C63B0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001553A6 | 0_2_001553A6 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001083D8 | 0_2_001083D8 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001943D2 | 0_2_001943D2 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000EF3C0 | 0_2_000EF3C0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001513C4 | 0_2_001513C4 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001493C0 | 0_2_001493C0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000E73D0 | 0_2_000E73D0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016A3F1 | 0_2_0016A3F1 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019A3F3 | 0_2_0019A3F3 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001483EE | 0_2_001483EE |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0017E3EC | 0_2_0017E3EC |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0018341B | 0_2_0018341B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00164410 | 0_2_00164410 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0017A411 | 0_2_0017A411 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001AE412 | 0_2_001AE412 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00174419 | 0_2_00174419 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B040F | 0_2_001B040F |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00168400 | 0_2_00168400 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A940C | 0_2_001A940C |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B242E | 0_2_001B242E |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0018742F | 0_2_0018742F |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016242A | 0_2_0016242A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A345E | 0_2_001A345E |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00107440 | 0_2_00107440 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0011A440 | 0_2_0011A440 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A2440 | 0_2_001A2440 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00120460 | 0_2_00120460 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000F747D | 0_2_000F747D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001AA49D | 0_2_001AA49D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014C49D | 0_2_0014C49D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0029E4BF | 0_2_0029E4BF |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001574B5 | 0_2_001574B5 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001474B5 | 0_2_001474B5 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001854BB | 0_2_001854BB |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001544BC | 0_2_001544BC |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016F4BB | 0_2_0016F4BB |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B14AF | 0_2_001B14AF |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014A4C6 | 0_2_0014A4C6 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001004C6 | 0_2_001004C6 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014B4CD | 0_2_0014B4CD |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014E4F4 | 0_2_0014E4F4 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001824FF | 0_2_001824FF |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001024E0 | 0_2_001024E0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B54EA | 0_2_001B54EA |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000ED4F3 | 0_2_000ED4F3 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0010C53C | 0_2_0010C53C |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C5532 | 0_2_001C5532 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0029C51B | 0_2_0029C51B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019152D | 0_2_0019152D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0015F52D | 0_2_0015F52D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0020651B | 0_2_0020651B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001AD550 | 0_2_001AD550 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C254B | 0_2_001C254B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0017654C | 0_2_0017654C |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C8541 | 0_2_001C8541 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00163577 | 0_2_00163577 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001BA572 | 0_2_001BA572 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00104560 | 0_2_00104560 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019A568 | 0_2_0019A568 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00173565 | 0_2_00173565 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016B56D | 0_2_0016B56D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C9590 | 0_2_001C9590 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019C588 | 0_2_0019C588 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00165580 | 0_2_00165580 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001BE585 | 0_2_001BE585 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0017C5B4 | 0_2_0017C5B4 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019E5B0 | 0_2_0019E5B0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0011C5A0 | 0_2_0011C5A0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001985D9 | 0_2_001985D9 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0011A5D4 | 0_2_0011A5D4 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A55D3 | 0_2_001A55D3 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001AC5D3 | 0_2_001AC5D3 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C45CE | 0_2_001C45CE |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000E65F0 | 0_2_000E65F0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001905E7 | 0_2_001905E7 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000EF60D | 0_2_000EF60D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00192612 | 0_2_00192612 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000F961B | 0_2_000F961B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0018F63C | 0_2_0018F63C |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014F620 | 0_2_0014F620 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00195626 | 0_2_00195626 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000FE630 | 0_2_000FE630 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00118650 | 0_2_00118650 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0018C657 | 0_2_0018C657 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00142647 | 0_2_00142647 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B4646 | 0_2_001B4646 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016E674 | 0_2_0016E674 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001BB660 | 0_2_001BB660 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000EE687 | 0_2_000EE687 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_002A46BE | 0_2_002A46BE |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B76BB | 0_2_001B76BB |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0017B6BF | 0_2_0017B6BF |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001996B6 | 0_2_001996B6 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001976A1 | 0_2_001976A1 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001526A9 | 0_2_001526A9 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001046D0 | 0_2_001046D0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A66D9 | 0_2_001A66D9 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B66D0 | 0_2_001B66D0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001206F0 | 0_2_001206F0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001966EA | 0_2_001966EA |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0018D6E2 | 0_2_0018D6E2 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0018171B | 0_2_0018171B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019D739 | 0_2_0019D739 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00109739 | 0_2_00109739 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0015873F | 0_2_0015873F |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00145738 | 0_2_00145738 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0017175B | 0_2_0017175B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00107740 | 0_2_00107740 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00172747 | 0_2_00172747 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0029F771 | 0_2_0029F771 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000F2750 | 0_2_000F2750 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00148774 | 0_2_00148774 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00151774 | 0_2_00151774 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00142772 | 0_2_00142772 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C3799 | 0_2_001C3799 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019279F | 0_2_0019279F |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000E9780 | 0_2_000E9780 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0018A797 | 0_2_0018A797 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019F78B | 0_2_0019F78B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016978A | 0_2_0016978A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001687B6 | 0_2_001687B6 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014C7B3 | 0_2_0014C7B3 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C77B2 | 0_2_001C77B2 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A87A2 | 0_2_001A87A2 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019B7A0 | 0_2_0019B7A0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001557DF | 0_2_001557DF |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001837D3 | 0_2_001837D3 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0015E7DB | 0_2_0015E7DB |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C67D2 | 0_2_001C67D2 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000F57C0 | 0_2_000F57C0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001677F2 | 0_2_001677F2 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0015C7F2 | 0_2_0015C7F2 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014D816 | 0_2_0014D816 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019481A | 0_2_0019481A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0015A81F | 0_2_0015A81F |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016480E | 0_2_0016480E |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000ED83C | 0_2_000ED83C |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B0826 | 0_2_001B0826 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000EC840 | 0_2_000EC840 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001AF842 | 0_2_001AF842 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B287D | 0_2_001B287D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A3873 | 0_2_001A3873 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A9870 | 0_2_001A9870 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0018B86F | 0_2_0018B86F |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0027E85A | 0_2_0027E85A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00196867 | 0_2_00196867 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019C880 | 0_2_0019C880 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0018F882 | 0_2_0018F882 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001188B0 | 0_2_001188B0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019A8B4 | 0_2_0019A8B4 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001388BD | 0_2_001388BD |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001768B9 | 0_2_001768B9 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000FC8A0 | 0_2_000FC8A0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001898AA | 0_2_001898AA |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001408A7 | 0_2_001408A7 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001628AB | 0_2_001628AB |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001958A4 | 0_2_001958A4 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001138D0 | 0_2_001138D0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000E38C0 | 0_2_000E38C0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_002848FE | 0_2_002848FE |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001AA8C0 | 0_2_001AA8C0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0017D8CA | 0_2_0017D8CA |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014A8F5 | 0_2_0014A8F5 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A58F1 | 0_2_001A58F1 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001568E5 | 0_2_001568E5 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001658E3 | 0_2_001658E3 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000FB8F6 | 0_2_000FB8F6 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001948E6 | 0_2_001948E6 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00106910 | 0_2_00106910 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0017F913 | 0_2_0017F913 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0018091F | 0_2_0018091F |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B3913 | 0_2_001B3913 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001AB916 | 0_2_001AB916 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000E5900 | 0_2_000E5900 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001BE90B | 0_2_001BE90B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016D903 | 0_2_0016D903 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_002AE902 | 0_2_002AE902 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001BA932 | 0_2_001BA932 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016F928 | 0_2_0016F928 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016094C | 0_2_0016094C |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001AD970 | 0_2_001AD970 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000FE960 | 0_2_000FE960 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001AC991 | 0_2_001AC991 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00186989 | 0_2_00186989 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019898D | 0_2_0019898D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00154982 | 0_2_00154982 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C4985 | 0_2_001C4985 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B79BC | 0_2_001B79BC |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001BC9BC | 0_2_001BC9BC |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001039B9 | 0_2_001039B9 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001999A0 | 0_2_001999A0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001909A3 | 0_2_001909A3 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0017C9C4 | 0_2_0017C9C4 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B49FF | 0_2_001B49FF |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001459E4 | 0_2_001459E4 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001209E0 | 0_2_001209E0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0010C9EB | 0_2_0010C9EB |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C59E2 | 0_2_001C59E2 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0011FA20 | 0_2_0011FA20 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C0A28 | 0_2_001C0A28 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016EA2E | 0_2_0016EA2E |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00163A28 | 0_2_00163A28 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00150A56 | 0_2_00150A56 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0011CA40 | 0_2_0011CA40 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00144A40 | 0_2_00144A40 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0011DA4D | 0_2_0011DA4D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00115A4F | 0_2_00115A4F |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0017BA67 | 0_2_0017BA67 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014DA9D | 0_2_0014DA9D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00142A84 | 0_2_00142A84 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00119A80 | 0_2_00119A80 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001BDA83 | 0_2_001BDA83 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019DAB9 | 0_2_0019DAB9 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00184ABA | 0_2_00184ABA |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014BABF | 0_2_0014BABF |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00108ABC | 0_2_00108ABC |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B0AD9 | 0_2_001B0AD9 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014FAD1 | 0_2_0014FAD1 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00191AD2 | 0_2_00191AD2 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00140AD8 | 0_2_00140AD8 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00171AC3 | 0_2_00171AC3 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B3ACF | 0_2_001B3ACF |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000F9AD0 | 0_2_000F9AD0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00170AC8 | 0_2_00170AC8 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019EAF3 | 0_2_0019EAF3 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001BFAF5 | 0_2_001BFAF5 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0011FB10 | 0_2_0011FB10 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019AB18 | 0_2_0019AB18 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A1B1D | 0_2_001A1B1D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000F8B12 | 0_2_000F8B12 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C8B03 | 0_2_001C8B03 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A6B3B | 0_2_001A6B3B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00174B3D | 0_2_00174B3D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00151B3E | 0_2_00151B3E |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000EAB40 | 0_2_000EAB40 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B1B7D | 0_2_001B1B7D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016BB66 | 0_2_0016BB66 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00181B6A | 0_2_00181B6A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016EB6A | 0_2_0016EB6A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00199B65 | 0_2_00199B65 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000FEB80 | 0_2_000FEB80 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019FB88 | 0_2_0019FB88 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00163B82 | 0_2_00163B82 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016CBB7 | 0_2_0016CBB7 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00165BB1 | 0_2_00165BB1 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00167BBC | 0_2_00167BBC |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016ABBD | 0_2_0016ABBD |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000E4BA0 | 0_2_000E4BA0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00179BD8 | 0_2_00179BD8 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0018BBC9 | 0_2_0018BBC9 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00169BF9 | 0_2_00169BF9 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00148BED | 0_2_00148BED |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00113C10 | 0_2_00113C10 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C7C15 | 0_2_001C7C15 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00178C01 | 0_2_00178C01 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0018CC00 | 0_2_0018CC00 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00153C0B | 0_2_00153C0B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00180C32 | 0_2_00180C32 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00155C23 | 0_2_00155C23 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00158C50 | 0_2_00158C50 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00197C53 | 0_2_00197C53 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0015DC71 | 0_2_0015DC71 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001ADC62 | 0_2_001ADC62 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00166C69 | 0_2_00166C69 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00164C9A | 0_2_00164C9A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A9C8E | 0_2_001A9C8E |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001ABCBA | 0_2_001ABCBA |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C4CB1 | 0_2_001C4CB1 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000F4CA0 | 0_2_000F4CA0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00160CAF | 0_2_00160CAF |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016DCC7 | 0_2_0016DCC7 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00111CF0 | 0_2_00111CF0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0017FCF6 | 0_2_0017FCF6 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B2CFF | 0_2_001B2CFF |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_002A7CC1 | 0_2_002A7CC1 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B9CEB | 0_2_001B9CEB |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016FCED | 0_2_0016FCED |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00101D00 | 0_2_00101D00 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0017CD02 | 0_2_0017CD02 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00119D30 | 0_2_00119D30 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000F1D2B | 0_2_000F1D2B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00182D3E | 0_2_00182D3E |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00120D20 | 0_2_00120D20 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019AD2B | 0_2_0019AD2B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B5D2C | 0_2_001B5D2C |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019FD22 | 0_2_0019FD22 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00106D2E | 0_2_00106D2E |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014ED5D | 0_2_0014ED5D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00165D5F | 0_2_00165D5F |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0010CD5E | 0_2_0010CD5E |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C6D53 | 0_2_001C6D53 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00193D4A | 0_2_00193D4A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B0D4D | 0_2_001B0D4D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0010CD4C | 0_2_0010CD4C |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0011FD70 | 0_2_0011FD70 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00156D7A | 0_2_00156D7A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014ADB4 | 0_2_0014ADB4 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00168DB6 | 0_2_00168DB6 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001BBDB4 | 0_2_001BBDB4 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00143DA5 | 0_2_00143DA5 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A4DAB | 0_2_001A4DAB |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00117DA9 | 0_2_00117DA9 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_002ACDEF | 0_2_002ACDEF |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00157DDD | 0_2_00157DDD |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00173DF7 | 0_2_00173DF7 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0011CDF0 | 0_2_0011CDF0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A8E1B | 0_2_001A8E1B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0015CE16 | 0_2_0015CE16 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00189E1B | 0_2_00189E1B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00178E18 | 0_2_00178E18 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0011FE00 | 0_2_0011FE00 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00150E0B | 0_2_00150E0B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0015EE2F | 0_2_0015EE2F |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B3E27 | 0_2_001B3E27 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00159E5D | 0_2_00159E5D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000ECE45 | 0_2_000ECE45 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C2E4F | 0_2_001C2E4F |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00175E40 | 0_2_00175E40 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00140E4A | 0_2_00140E4A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0010FE74 | 0_2_0010FE74 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00190E7F | 0_2_00190E7F |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00160E67 | 0_2_00160E67 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0010EE63 | 0_2_0010EE63 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00100E6C | 0_2_00100E6C |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00102E6D | 0_2_00102E6D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019EE9A | 0_2_0019EE9A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A0E9E | 0_2_001A0E9E |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00146EB1 | 0_2_00146EB1 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014BEBC | 0_2_0014BEBC |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001BFEAB | 0_2_001BFEAB |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00118EA0 | 0_2_00118EA0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A7EA3 | 0_2_001A7EA3 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000E2EB0 | 0_2_000E2EB0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000FAEB0 | 0_2_000FAEB0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B0EC9 | 0_2_001B0EC9 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001BDEC8 | 0_2_001BDEC8 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B5EC5 | 0_2_001B5EC5 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014CEF0 | 0_2_0014CEF0 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0018DEFD | 0_2_0018DEFD |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B7F1B | 0_2_001B7F1B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A1F1B | 0_2_001A1F1B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001C8F1A | 0_2_001C8F1A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00105F1B | 0_2_00105F1B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016BF1A | 0_2_0016BF1A |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00142F03 | 0_2_00142F03 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00144F03 | 0_2_00144F03 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0014FF38 | 0_2_0014FF38 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00171F5E | 0_2_00171F5E |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00181F53 | 0_2_00181F53 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00197F40 | 0_2_00197F40 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001AAF41 | 0_2_001AAF41 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001B6F40 | 0_2_001B6F40 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000F6F52 | 0_2_000F6F52 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_000FDF50 | 0_2_000FDF50 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00198F6F | 0_2_00198F6F |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0016AF6C | 0_2_0016AF6C |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001AFF9B | 0_2_001AFF9B |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00170F9D | 0_2_00170F9D |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019CF93 | 0_2_0019CF93 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0019BF94 | 0_2_0019BF94 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00179F86 | 0_2_00179F86 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0018CF8C | 0_2_0018CF8C |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_001A3FB8 | 0_2_001A3FB8 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00176FA4 | 0_2_00176FA4 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00180FDD | 0_2_00180FDD |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00167FC8 | 0_2_00167FC8 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00184FF7 | 0_2_00184FF7 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_0015AFE3 | 0_2_0015AFE3 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00164FEF | 0_2_00164FEF |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | Code function: 0_2_00199FE7 | 0_2_00199FE7 |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 138F64 second address: 138F6E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F8CACC719E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 138F6E second address: 138F72 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B3785 second address: 2B37BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jno 00007F8CACC719EAh 0x0000000b push ebx 0x0000000c jmp 00007F8CACC719F6h 0x00000011 pop ebx 0x00000012 popad 0x00000013 pushad 0x00000014 pushad 0x00000015 pushad 0x00000016 popad 0x00000017 je 00007F8CACC719E6h 0x0000001d push edi 0x0000001e pop edi 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B37BB second address: 2B37EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 ja 00007F8CACB12CCEh 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jc 00007F8CACB12CB6h 0x00000014 pushad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2A5BA8 second address: 2A5BB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2A5BB1 second address: 2A5BB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2A5BB5 second address: 2A5BE3 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F8CACC719E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F8CACC719EAh 0x00000011 jmp 00007F8CACC719F8h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2A5BE3 second address: 2A5C1C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F8CACB12CBBh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jnc 00007F8CACB12CBCh 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F8CACB12CC7h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2A5C1C second address: 2A5C20 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2A5C20 second address: 2A5C26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2A5C26 second address: 2A5C2B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2A5C2B second address: 2A5C37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F8CACB12CB6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B27CB second address: 2B27D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B27D3 second address: 2B27D7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B27D7 second address: 2B27ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007F8CACC719ECh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B2BE9 second address: 2B2BED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B2BED second address: 2B2BF3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B2BF3 second address: 2B2BF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B2BF9 second address: 2B2C0E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8CACC719EBh 0x00000009 jc 00007F8CACC719E6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B2C0E second address: 2B2C43 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACB12CBAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jnp 00007F8CACB12CB6h 0x00000014 push edi 0x00000015 pop edi 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b jmp 00007F8CACB12CC5h 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B2C43 second address: 2B2C49 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B2DBA second address: 2B2DE0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F8CACB12CC9h 0x0000000e popad 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B2F31 second address: 2B2F3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B2F3B second address: 2B2F42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B593E second address: 2B5990 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACC719EEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F8CACC719F5h 0x0000000f mov eax, dword ptr [esp+04h] 0x00000013 jo 00007F8CACC719F2h 0x00000019 js 00007F8CACC719ECh 0x0000001f jng 00007F8CACC719E6h 0x00000025 mov eax, dword ptr [eax] 0x00000027 push ebx 0x00000028 push eax 0x00000029 push edx 0x0000002a jmp 00007F8CACC719EFh 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B5990 second address: 1387C9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b push ebx 0x0000000c jnc 00007F8CACB12CC0h 0x00000012 pop ebx 0x00000013 pop eax 0x00000014 and dx, F082h 0x00000019 push dword ptr [ebp+122D1115h] 0x0000001f or di, 6F8Fh 0x00000024 call dword ptr [ebp+122D1862h] 0x0000002a pushad 0x0000002b cmc 0x0000002c xor eax, eax 0x0000002e jnc 00007F8CACB12CC2h 0x00000034 mov edx, dword ptr [esp+28h] 0x00000038 jmp 00007F8CACB12CC0h 0x0000003d mov dword ptr [ebp+122D27CDh], eax 0x00000043 sub dword ptr [ebp+122D3635h], edx 0x00000049 mov esi, 0000003Ch 0x0000004e pushad 0x0000004f push edx 0x00000050 jmp 00007F8CACB12CBDh 0x00000055 pop edx 0x00000056 sub dword ptr [ebp+122D2560h], ecx 0x0000005c popad 0x0000005d add esi, dword ptr [esp+24h] 0x00000061 jo 00007F8CACB12CBCh 0x00000067 mov dword ptr [ebp+122D2560h], edi 0x0000006d lodsw 0x0000006f sub dword ptr [ebp+122D3635h], ebx 0x00000075 add eax, dword ptr [esp+24h] 0x00000079 cld 0x0000007a mov ebx, dword ptr [esp+24h] 0x0000007e mov dword ptr [ebp+122D1F22h], ecx 0x00000084 nop 0x00000085 jne 00007F8CACB12CC0h 0x0000008b push eax 0x0000008c push edx 0x0000008d push eax 0x0000008e push edx 0x0000008f pushad 0x00000090 popad 0x00000091 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B5A0C second address: 2B5AAF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACC719EAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jnp 00007F8CACC719E6h 0x00000010 jmp 00007F8CACC719EDh 0x00000015 popad 0x00000016 popad 0x00000017 xor dword ptr [esp], 7D426105h 0x0000001e push ebx 0x0000001f jmp 00007F8CACC719F9h 0x00000024 pop esi 0x00000025 push 00000003h 0x00000027 mov ecx, dword ptr [ebp+122D2025h] 0x0000002d adc dh, FFFFFFBAh 0x00000030 push 00000000h 0x00000032 jmp 00007F8CACC719F2h 0x00000037 push 00000003h 0x00000039 mov ecx, dword ptr [ebp+122D2B11h] 0x0000003f movzx ecx, cx 0x00000042 call 00007F8CACC719E9h 0x00000047 pushad 0x00000048 jo 00007F8CACC719ECh 0x0000004e push edx 0x0000004f jmp 00007F8CACC719EEh 0x00000054 pop edx 0x00000055 popad 0x00000056 push eax 0x00000057 ja 00007F8CACC719F0h 0x0000005d pushad 0x0000005e pushad 0x0000005f popad 0x00000060 push eax 0x00000061 push edx 0x00000062 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B5AAF second address: 2B5AE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov eax, dword ptr [esp+04h] 0x00000009 pushad 0x0000000a push eax 0x0000000b jmp 00007F8CACB12CC4h 0x00000010 pop eax 0x00000011 pushad 0x00000012 jmp 00007F8CACB12CBFh 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B5AE1 second address: 2B5AF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov eax, dword ptr [eax] 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b jg 00007F8CACC719E6h 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B5AF5 second address: 2B5B1B instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007F8CACB12CC2h 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jg 00007F8CACB12CB8h 0x00000017 push esi 0x00000018 pop esi 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B5B1B second address: 2B5B55 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop eax 0x0000000b mov ch, 40h 0x0000000d lea ebx, dword ptr [ebp+12450896h] 0x00000013 jno 00007F8CACC719ECh 0x00000019 sub dword ptr [ebp+122D1AA9h], ecx 0x0000001f push eax 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 jmp 00007F8CACC719F4h 0x00000028 pushad 0x00000029 popad 0x0000002a popad 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B5B55 second address: 2B5B5F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F8CACB12CB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B5B5F second address: 2B5B63 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B5BC3 second address: 2B5BD7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACB12CBBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ebx 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B5BD7 second address: 2B5C18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop ebx 0x00000006 nop 0x00000007 cmc 0x00000008 push 00000000h 0x0000000a and dx, A9D6h 0x0000000f jnl 00007F8CACC719F1h 0x00000015 push 4B24AC14h 0x0000001a jnp 00007F8CACC71A06h 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007F8CACC719F4h 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B5C18 second address: 2B5D0A instructions: 0x00000000 rdtsc 0x00000002 jl 00007F8CACB12CB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a xor dword ptr [esp], 4B24AC94h 0x00000011 jmp 00007F8CACB12CC2h 0x00000016 mov dword ptr [ebp+122D18BEh], edi 0x0000001c push 00000003h 0x0000001e mov dword ptr [ebp+122D26ADh], ecx 0x00000024 push 00000000h 0x00000026 mov dword ptr [ebp+122D36DBh], ebx 0x0000002c push 00000003h 0x0000002e jmp 00007F8CACB12CC8h 0x00000033 call 00007F8CACB12CB9h 0x00000038 pushad 0x00000039 jmp 00007F8CACB12CBCh 0x0000003e push edi 0x0000003f jmp 00007F8CACB12CC9h 0x00000044 pop edi 0x00000045 popad 0x00000046 push eax 0x00000047 pushad 0x00000048 jmp 00007F8CACB12CC5h 0x0000004d jg 00007F8CACB12CBCh 0x00000053 popad 0x00000054 mov eax, dword ptr [esp+04h] 0x00000058 pushad 0x00000059 pushad 0x0000005a pushad 0x0000005b popad 0x0000005c jmp 00007F8CACB12CBBh 0x00000061 popad 0x00000062 jnl 00007F8CACB12CC8h 0x00000068 popad 0x00000069 mov eax, dword ptr [eax] 0x0000006b jmp 00007F8CACB12CC1h 0x00000070 mov dword ptr [esp+04h], eax 0x00000074 push ebx 0x00000075 push eax 0x00000076 push edx 0x00000077 pushad 0x00000078 popad 0x00000079 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2B5D0A second address: 2B5D53 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F8CACC719E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b pop eax 0x0000000c adc ecx, 46575542h 0x00000012 lea ebx, dword ptr [ebp+1245089Fh] 0x00000018 pushad 0x00000019 push eax 0x0000001a call 00007F8CACC719EAh 0x0000001f pop ebx 0x00000020 pop eax 0x00000021 call 00007F8CACC719F4h 0x00000026 sub edx, 102312DDh 0x0000002c pop edi 0x0000002d popad 0x0000002e xchg eax, ebx 0x0000002f push eax 0x00000030 push edx 0x00000031 push edx 0x00000032 pushad 0x00000033 popad 0x00000034 pop edx 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2A92B1 second address: 2A92BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2A92BB second address: 2A932E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8CACC719EEh 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c jmp 00007F8CACC719EFh 0x00000011 pushad 0x00000012 jmp 00007F8CACC719ECh 0x00000017 pushad 0x00000018 popad 0x00000019 jmp 00007F8CACC719ECh 0x0000001e popad 0x0000001f popad 0x00000020 pushad 0x00000021 jmp 00007F8CACC719F9h 0x00000026 jmp 00007F8CACC719F0h 0x0000002b jo 00007F8CACC719EEh 0x00000031 push eax 0x00000032 push edx 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D5380 second address: 2D5384 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D5384 second address: 2D538A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D54B1 second address: 2D54BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F8CACB12CB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D5626 second address: 2D562A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D562A second address: 2D5649 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F8CACB12CB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007F8CACB12CC2h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D5903 second address: 2D5959 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007F8CACC719E6h 0x00000009 jmp 00007F8CACC719F0h 0x0000000e jl 00007F8CACC719E6h 0x00000014 jnc 00007F8CACC719E6h 0x0000001a popad 0x0000001b push edx 0x0000001c pushad 0x0000001d popad 0x0000001e push ecx 0x0000001f pop ecx 0x00000020 pop edx 0x00000021 pop edx 0x00000022 pop eax 0x00000023 pushad 0x00000024 jmp 00007F8CACC719F5h 0x00000029 push eax 0x0000002a push edx 0x0000002b jmp 00007F8CACC719F0h 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D5DB9 second address: 2D5DD9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 js 00007F8CACB12CBAh 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F8CACB12CBDh 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D5DD9 second address: 2D5DDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D5DDD second address: 2D5DE1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D5DE1 second address: 2D5E3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 je 00007F8CACC71A39h 0x0000000f jnp 00007F8CACC71A10h 0x00000015 pushad 0x00000016 jmp 00007F8CACC719F7h 0x0000001b pushad 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D5FC1 second address: 2D5FCD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jns 00007F8CACB12CB6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D5FCD second address: 2D5FD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D5FD1 second address: 2D5FD5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D5FD5 second address: 2D5FE3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D5FE3 second address: 2D5FED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F8CACB12CB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D5FED second address: 2D6002 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACC719ECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D6002 second address: 2D600F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 jp 00007F8CACB12CB6h 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D6170 second address: 2D6176 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D6176 second address: 2D617C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D62C3 second address: 2D62C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D62C7 second address: 2D62D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D6DCA second address: 2D6DD7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jc 00007F8CACC719E6h 0x00000009 push esi 0x0000000a pop esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2DA9EA second address: 2DAA08 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACB12CBCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d jo 00007F8CACB12CC4h 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2DAA08 second address: 2DAA0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2DAA0C second address: 2DAA31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov eax, dword ptr [eax] 0x00000008 jmp 00007F8CACB12CC3h 0x0000000d mov dword ptr [esp+04h], eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push esi 0x00000016 pop esi 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2DAA31 second address: 2DAA35 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2DAA35 second address: 2DAA3B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2DAA3B second address: 2DAA40 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D98F7 second address: 2D9915 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F8CACB12CBCh 0x00000008 jg 00007F8CACB12CB6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F8CACB12CBAh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D9915 second address: 2D9919 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2D9919 second address: 2D9922 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2DCF93 second address: 2DCF97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2AE3D8 second address: 2AE3DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E1009 second address: 2E1020 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 jmp 00007F8CACC719F1h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E16D0 second address: 2E16E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8CACB12CBCh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E16E7 second address: 2E16EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E16EB second address: 2E1705 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007F8CACB12CC4h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E1862 second address: 2E1880 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACC719F8h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E1880 second address: 2E188A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F8CACB12CB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E188A second address: 2E188E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E188E second address: 2E18A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jng 00007F8CACB12CDDh 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E4EA1 second address: 2E4EC4 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F8CACC719E8h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e jmp 00007F8CACC719EDh 0x00000013 push eax 0x00000014 push edx 0x00000015 js 00007F8CACC719E6h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E4EC4 second address: 2E4EED instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACB12CC7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 jc 00007F8CACB12CB6h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E4EED second address: 2E4F06 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 mov eax, dword ptr [eax] 0x00000009 pushad 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f popad 0x00000010 pushad 0x00000011 jnp 00007F8CACC719E6h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E4F06 second address: 2E4F6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a jns 00007F8CACB12CD2h 0x00000010 pop eax 0x00000011 push 00000000h 0x00000013 push ebx 0x00000014 call 00007F8CACB12CB8h 0x00000019 pop ebx 0x0000001a mov dword ptr [esp+04h], ebx 0x0000001e add dword ptr [esp+04h], 00000019h 0x00000026 inc ebx 0x00000027 push ebx 0x00000028 ret 0x00000029 pop ebx 0x0000002a ret 0x0000002b or esi, dword ptr [ebp+122D2686h] 0x00000031 push 9C2F29B3h 0x00000036 je 00007F8CACB12CC2h 0x0000003c jc 00007F8CACB12CBCh 0x00000042 push eax 0x00000043 push edx 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E5574 second address: 2E558C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACC719F4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E5658 second address: 2E5662 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jng 00007F8CACB12CB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E5C49 second address: 2E5C4E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E5E92 second address: 2E5E99 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E5F84 second address: 2E5F89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E6EE7 second address: 2E6F61 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F8CACB12CB8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c pushad 0x0000000d push eax 0x0000000e pop eax 0x0000000f push edx 0x00000010 pop edx 0x00000011 popad 0x00000012 jmp 00007F8CACB12CC6h 0x00000017 popad 0x00000018 nop 0x00000019 push 00000000h 0x0000001b push edx 0x0000001c call 00007F8CACB12CB8h 0x00000021 pop edx 0x00000022 mov dword ptr [esp+04h], edx 0x00000026 add dword ptr [esp+04h], 00000014h 0x0000002e inc edx 0x0000002f push edx 0x00000030 ret 0x00000031 pop edx 0x00000032 ret 0x00000033 push 00000000h 0x00000035 mov si, dx 0x00000038 push 00000000h 0x0000003a push 00000000h 0x0000003c push esi 0x0000003d call 00007F8CACB12CB8h 0x00000042 pop esi 0x00000043 mov dword ptr [esp+04h], esi 0x00000047 add dword ptr [esp+04h], 0000001Ah 0x0000004f inc esi 0x00000050 push esi 0x00000051 ret 0x00000052 pop esi 0x00000053 ret 0x00000054 push eax 0x00000055 pushad 0x00000056 push eax 0x00000057 push esi 0x00000058 pop esi 0x00000059 pop eax 0x0000005a push edx 0x0000005b push eax 0x0000005c push edx 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E6D46 second address: 2E6D4A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E6D4A second address: 2E6D50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E6D50 second address: 2E6D56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E6D56 second address: 2E6D5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E8EBE second address: 2E8EDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007F8CACC719EDh 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 jng 00007F8CACC719E6h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E9F77 second address: 2E9F90 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACB12CC5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E9F90 second address: 2E9FF4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 jmp 00007F8CACC719F2h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp], eax 0x00000010 push 00000000h 0x00000012 mov dword ptr [ebp+122D25FAh], edx 0x00000018 push 00000000h 0x0000001a push 00000000h 0x0000001c push ebp 0x0000001d call 00007F8CACC719E8h 0x00000022 pop ebp 0x00000023 mov dword ptr [esp+04h], ebp 0x00000027 add dword ptr [esp+04h], 00000019h 0x0000002f inc ebp 0x00000030 push ebp 0x00000031 ret 0x00000032 pop ebp 0x00000033 ret 0x00000034 mov edi, 4A7A3086h 0x00000039 push eax 0x0000003a push edi 0x0000003b push eax 0x0000003c push edx 0x0000003d jmp 00007F8CACC719F3h 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2EAA67 second address: 2EAA6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2EAA6E second address: 2EAAFD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8CACC719F2h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp], eax 0x00000010 push 00000000h 0x00000012 push 00000000h 0x00000014 push edx 0x00000015 call 00007F8CACC719E8h 0x0000001a pop edx 0x0000001b mov dword ptr [esp+04h], edx 0x0000001f add dword ptr [esp+04h], 0000001Ah 0x00000027 inc edx 0x00000028 push edx 0x00000029 ret 0x0000002a pop edx 0x0000002b ret 0x0000002c movzx esi, bx 0x0000002f mov di, 8523h 0x00000033 push 00000000h 0x00000035 push 00000000h 0x00000037 push esi 0x00000038 call 00007F8CACC719E8h 0x0000003d pop esi 0x0000003e mov dword ptr [esp+04h], esi 0x00000042 add dword ptr [esp+04h], 00000017h 0x0000004a inc esi 0x0000004b push esi 0x0000004c ret 0x0000004d pop esi 0x0000004e ret 0x0000004f mov edi, dword ptr [ebp+122D1DFBh] 0x00000055 jmp 00007F8CACC719F5h 0x0000005a push eax 0x0000005b push eax 0x0000005c push edx 0x0000005d push eax 0x0000005e jnc 00007F8CACC719E6h 0x00000064 pop eax 0x00000065 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2EB5F7 second address: 2EB5FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2EEC4D second address: 2EEC51 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2EEC51 second address: 2EEC63 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jmp 00007F8CACB12CBAh 0x0000000c pop edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2EEC63 second address: 2EEC83 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jne 00007F8CACC719E6h 0x00000009 ja 00007F8CACC719E6h 0x0000000f pop edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F8CACC719EEh 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2EEC83 second address: 2EEC87 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2F147E second address: 2F1484 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2F1484 second address: 2F1488 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2F42CD second address: 2F434F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 js 00007F8CACC719E6h 0x0000000d pushad 0x0000000e popad 0x0000000f popad 0x00000010 popad 0x00000011 nop 0x00000012 mov edi, dword ptr [ebp+122D287Dh] 0x00000018 push 00000000h 0x0000001a push 00000000h 0x0000001c push edx 0x0000001d call 00007F8CACC719E8h 0x00000022 pop edx 0x00000023 mov dword ptr [esp+04h], edx 0x00000027 add dword ptr [esp+04h], 0000001Ah 0x0000002f inc edx 0x00000030 push edx 0x00000031 ret 0x00000032 pop edx 0x00000033 ret 0x00000034 mov ebx, dword ptr [ebp+1247A441h] 0x0000003a push 00000000h 0x0000003c push 00000000h 0x0000003e push eax 0x0000003f call 00007F8CACC719E8h 0x00000044 pop eax 0x00000045 mov dword ptr [esp+04h], eax 0x00000049 add dword ptr [esp+04h], 0000001Ah 0x00000051 inc eax 0x00000052 push eax 0x00000053 ret 0x00000054 pop eax 0x00000055 ret 0x00000056 jmp 00007F8CACC719ECh 0x0000005b xor bx, 5958h 0x00000060 xchg eax, esi 0x00000061 push eax 0x00000062 push edx 0x00000063 jnl 00007F8CACC719E8h 0x00000069 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2F434F second address: 2F4378 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACB12CC4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F8CACB12CBEh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2F52A9 second address: 2F52B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2F52B1 second address: 2F5301 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push ecx 0x0000000c call 00007F8CACB12CB8h 0x00000011 pop ecx 0x00000012 mov dword ptr [esp+04h], ecx 0x00000016 add dword ptr [esp+04h], 00000019h 0x0000001e inc ecx 0x0000001f push ecx 0x00000020 ret 0x00000021 pop ecx 0x00000022 ret 0x00000023 adc edi, 4CD883A0h 0x00000029 jc 00007F8CACB12CBCh 0x0000002f mov edi, dword ptr [ebp+122D282Dh] 0x00000035 push 00000000h 0x00000037 mov edi, 1B680646h 0x0000003c push 00000000h 0x0000003e add bx, 2FE5h 0x00000043 push eax 0x00000044 pushad 0x00000045 push eax 0x00000046 push edx 0x00000047 pushad 0x00000048 popad 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2F5301 second address: 2F531B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F8CACC719F2h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2F242B second address: 2F2431 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2F2431 second address: 2F2435 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2F5572 second address: 2F5583 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F8CACB12CB8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push esi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2F661E second address: 2F6623 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2F9284 second address: 2F928A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2F928A second address: 2F928E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2FA1A3 second address: 2FA1A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2FB3E5 second address: 2FB3EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2FD102 second address: 2FD108 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2FD108 second address: 2FD10C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2FF1DB second address: 2FF1DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2FF1DF second address: 2FF1F5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACC719F2h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2FF1F5 second address: 2FF200 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pushad 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2FD325 second address: 2FD350 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACC719F5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F8CACC719ECh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2FF200 second address: 2FF206 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2FD350 second address: 2FD356 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2FF206 second address: 2FF225 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F8CACB12CC7h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3024DC second address: 302501 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F8CACC719F8h 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f pushad 0x00000010 popad 0x00000011 pop ecx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 302501 second address: 302507 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 302507 second address: 30250B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 302731 second address: 302764 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8CACB12CC8h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F8CACB12CC0h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 303594 second address: 30359A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 30AC44 second address: 30AC63 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F8CACB12CBFh 0x0000000f jns 00007F8CACB12CB6h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 30A69C second address: 30A6A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 30A6A1 second address: 30A6B8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACB12CBAh 0x00000007 pushad 0x00000008 push esi 0x00000009 pop esi 0x0000000a ja 00007F8CACB12CB6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 30D151 second address: 30D15E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jc 00007F8CACC719E6h 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 30D15E second address: 30D173 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pop edx 0x00000005 jmp 00007F8CACB12CBBh 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 310682 second address: 310686 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3173D5 second address: 31740B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jg 00007F8CACB12CC2h 0x0000000b pushad 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 jmp 00007F8CACB12CC0h 0x00000018 popad 0x00000019 pushad 0x0000001a pushad 0x0000001b pushad 0x0000001c popad 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 31740B second address: 31742C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jne 00007F8CACC719EEh 0x0000000b jng 00007F8CACC719F2h 0x00000011 jne 00007F8CACC719E6h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 316671 second address: 316675 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 316675 second address: 316692 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8CACC719F7h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 316692 second address: 316696 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 316696 second address: 31669A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 31669A second address: 3166A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3166A0 second address: 3166AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3166AE second address: 3166B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3166B4 second address: 3166BE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop ecx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3166BE second address: 3166D5 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F8CACB12CBCh 0x00000008 jnl 00007F8CACB12CB6h 0x0000000e push ecx 0x0000000f jo 00007F8CACB12CB6h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 316999 second address: 3169A3 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F8CACC719E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3169A3 second address: 3169CD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACB12CC7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F8CACB12CBDh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3169CD second address: 3169FB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8CACC719EFh 0x00000008 push eax 0x00000009 pop eax 0x0000000a jne 00007F8CACC719E6h 0x00000010 jmp 00007F8CACC719EFh 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3169FB second address: 316A01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 316A01 second address: 316A05 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 316CB6 second address: 316CBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 316F8D second address: 316F91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 316F91 second address: 316F97 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 316F97 second address: 316F9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 316F9D second address: 316FA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007F8CACB12CB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 316FA7 second address: 316FC6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACC719F1h 0x00000007 jo 00007F8CACC719E6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 316FC6 second address: 316FCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 31725F second address: 317263 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 317263 second address: 317269 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 31BD6A second address: 31BD6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 31BD6F second address: 31BD77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E38BE second address: 2E38DB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8CACC719EAh 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e jc 00007F8CACC719F4h 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 pop eax 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E38DB second address: 2E38DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E3C84 second address: 2E3C88 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E3D64 second address: 2E3D7D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACB12CBEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E3D7D second address: 2E3D83 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E3D83 second address: 2E3D89 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E3D89 second address: 2E3D8D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E3E50 second address: 2E3E54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E3E54 second address: 2E3E5A instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E3E5A second address: 2E3ED9 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F8CACB12CB8h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 jnl 00007F8CACB12CBAh 0x00000016 mov eax, dword ptr [eax] 0x00000018 push esi 0x00000019 push ecx 0x0000001a pushad 0x0000001b popad 0x0000001c pop ecx 0x0000001d pop esi 0x0000001e mov dword ptr [esp+04h], eax 0x00000022 pushad 0x00000023 jg 00007F8CACB12CBCh 0x00000029 push eax 0x0000002a push edi 0x0000002b pop edi 0x0000002c pop eax 0x0000002d popad 0x0000002e pop eax 0x0000002f push 00000000h 0x00000031 push ebx 0x00000032 call 00007F8CACB12CB8h 0x00000037 pop ebx 0x00000038 mov dword ptr [esp+04h], ebx 0x0000003c add dword ptr [esp+04h], 00000014h 0x00000044 inc ebx 0x00000045 push ebx 0x00000046 ret 0x00000047 pop ebx 0x00000048 ret 0x00000049 mov dword ptr [ebp+122D1887h], edx 0x0000004f pushad 0x00000050 or dword ptr [ebp+122D36AFh], eax 0x00000056 mov dword ptr [ebp+122D2B76h], eax 0x0000005c popad 0x0000005d push 05713020h 0x00000062 push eax 0x00000063 push edx 0x00000064 jmp 00007F8CACB12CBFh 0x00000069 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E3ED9 second address: 2E3EF5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8CACC719F8h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E4054 second address: 2E4059 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E417F second address: 2E4184 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E438F second address: 2E4393 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E4393 second address: 2E43AA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACC719EAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jnl 00007F8CACC719E6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E43AA second address: 2E43BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 jo 00007F8CACB12CDBh 0x0000000d push eax 0x0000000e push edx 0x0000000f jnl 00007F8CACB12CB6h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E43BF second address: 2E4416 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACC719F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a and edx, dword ptr [ebp+122D36BEh] 0x00000010 push 00000004h 0x00000012 push 00000000h 0x00000014 push ebx 0x00000015 call 00007F8CACC719E8h 0x0000001a pop ebx 0x0000001b mov dword ptr [esp+04h], ebx 0x0000001f add dword ptr [esp+04h], 00000019h 0x00000027 inc ebx 0x00000028 push ebx 0x00000029 ret 0x0000002a pop ebx 0x0000002b ret 0x0000002c push eax 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007F8CACC719EBh 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E4416 second address: 2E441C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E441C second address: 2E442D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8CACC719ECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E4766 second address: 2E4770 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007F8CACB12CB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 2E4B3F second address: 2E4B87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 mov dword ptr [esp], eax 0x00000009 mov edi, dword ptr [ebp+122D2677h] 0x0000000f lea eax, dword ptr [ebp+1247E540h] 0x00000015 push 00000000h 0x00000017 push edi 0x00000018 call 00007F8CACC719E8h 0x0000001d pop edi 0x0000001e mov dword ptr [esp+04h], edi 0x00000022 add dword ptr [esp+04h], 00000019h 0x0000002a inc edi 0x0000002b push edi 0x0000002c ret 0x0000002d pop edi 0x0000002e ret 0x0000002f nop 0x00000030 push eax 0x00000031 push edx 0x00000032 jmp 00007F8CACC719EFh 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 321075 second address: 32107A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3214CC second address: 3214D6 instructions: 0x00000000 rdtsc 0x00000002 je 00007F8CACC719E6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3214D6 second address: 3214E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edi 0x00000008 pop edi 0x00000009 jne 00007F8CACB12CB6h 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3214E6 second address: 3214EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3214EC second address: 3214F0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 32160E second address: 321635 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 pushad 0x00000008 jnl 00007F8CACC719E6h 0x0000000e jmp 00007F8CACC719F7h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3249A0 second address: 3249DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007F8CACB12CC2h 0x0000000a push edx 0x0000000b jno 00007F8CACB12CB6h 0x00000011 pop edx 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 jmp 00007F8CACB12CC9h 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3249DE second address: 3249E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 32A283 second address: 32A291 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F8CACB12CB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 32A291 second address: 32A2A1 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F8CACC719E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push esi 0x0000000d pop esi 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 32A2A1 second address: 32A2A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 328ECE second address: 328EE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8CACC719EFh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 328EE6 second address: 328EEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 328EEA second address: 328EEE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 328EEE second address: 328EFA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F8CACB12CB6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 328EFA second address: 328F30 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push edi 0x00000004 pop edi 0x00000005 jmp 00007F8CACC719F5h 0x0000000a pop esi 0x0000000b jnp 00007F8CACC719E8h 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 push ebx 0x00000016 jmp 00007F8CACC719EDh 0x0000001b pop ebx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3291DD second address: 3291E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F8CACB12CB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3291E7 second address: 3291EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3291EB second address: 3291F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 32954E second address: 329552 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3296D4 second address: 3296DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3296DE second address: 3296E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3296E3 second address: 329712 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jp 00007F8CACB12CB6h 0x00000009 pushad 0x0000000a popad 0x0000000b jmp 00007F8CACB12CC1h 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushad 0x00000014 jg 00007F8CACB12CBCh 0x0000001a jbe 00007F8CACB12CB6h 0x00000020 push edi 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3299CF second address: 3299EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8CACC719F9h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 329F36 second address: 329F40 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F8CACB12CBCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 329F40 second address: 329F48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 329F48 second address: 329F4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 32B87C second address: 32B8A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F8CACC719E6h 0x0000000a jno 00007F8CACC719E6h 0x00000010 popad 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 jmp 00007F8CACC719F5h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3311BF second address: 3311D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jbe 00007F8CACB12CB6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jnp 00007F8CACB12CB8h 0x00000012 push esi 0x00000013 pop esi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 32FBF0 second address: 32FC15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8CACC719EEh 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F8CACC719EEh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 32FC15 second address: 32FC1B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 32FF05 second address: 32FF16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8CACC719EDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 33048D second address: 33049A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 33049A second address: 33049E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 330798 second address: 33079C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 33079C second address: 3307A6 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F8CACC719E6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3307A6 second address: 3307C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F8CACB12CC9h 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 33464F second address: 334660 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F8CACC719E6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 334660 second address: 33466A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3340D0 second address: 3340D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3340D4 second address: 3340E1 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F8CACB12CB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3340E1 second address: 3340EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F8CACC719E6h 0x0000000a popad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 334242 second address: 33424C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop esi 0x00000006 push edx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 33424C second address: 334263 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8CACC719F1h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 334263 second address: 33426B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 33AD8A second address: 33ADA2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8CACC719F3h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 33E495 second address: 33E4A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8CACB12CBCh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 33E4A5 second address: 33E4C1 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F8CACC719E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jo 00007F8CACC719F2h 0x00000010 jl 00007F8CACC719E6h 0x00000016 jng 00007F8CACC719E6h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 33DC9F second address: 33DCA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 33DE11 second address: 33DE17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 33DE17 second address: 33DE34 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jmp 00007F8CACB12CC7h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 33DF8C second address: 33DF9F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 jg 00007F8CACC719ECh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 345440 second address: 345446 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 345446 second address: 34545D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F8CACC719F2h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34545D second address: 345468 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jno 00007F8CACB12CB6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 345468 second address: 345470 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 345470 second address: 345476 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 345476 second address: 345482 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 345482 second address: 345496 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8CACB12CBFh 0x00000009 pop edi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 344017 second address: 344021 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F8CACC719E6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 344191 second address: 3441AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d ja 00007F8CACB12CB6h 0x00000013 jmp 00007F8CACB12CBAh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3441AE second address: 3441B4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3441B4 second address: 3441C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 jc 00007F8CACB12CBEh 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3442F2 second address: 3442F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3442F6 second address: 344310 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jl 00007F8CACB12CB6h 0x0000000d jmp 00007F8CACB12CBCh 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 344310 second address: 34431C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007F8CACC719E6h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34461B second address: 344625 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F8CACB12CBEh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34E3A8 second address: 34E3BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 ja 00007F8CACC719E6h 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jng 00007F8CACC719E6h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34E3BF second address: 34E3C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34C5E7 second address: 34C5EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34C5EB second address: 34C5FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 jp 00007F8CACB12CB6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34CF2E second address: 34CF32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34CF32 second address: 34CF51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007F8CACB12CC5h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34CF51 second address: 34CF77 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F8CACC719ECh 0x0000000b pushad 0x0000000c jmp 00007F8CACC719EBh 0x00000011 jl 00007F8CACC719E6h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34D76B second address: 34D78B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 js 00007F8CACB12CC6h 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34D78B second address: 34D78F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34D78F second address: 34D7AB instructions: 0x00000000 rdtsc 0x00000002 je 00007F8CACB12CB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F8CACB12CBFh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34D7AB second address: 34D7B0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34DA77 second address: 34DA86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push edi 0x00000006 pushad 0x00000007 popad 0x00000008 jno 00007F8CACB12CB6h 0x0000000e pop edi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34DA86 second address: 34DAAD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jnp 00007F8CACC719E6h 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d popad 0x0000000e push ecx 0x0000000f push edx 0x00000010 pop edx 0x00000011 pop ecx 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F8CACC719EDh 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34DAAD second address: 34DAB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34DAB1 second address: 34DAC4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACC719EDh 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34DAC4 second address: 34DAF4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8CACB12CC9h 0x00000009 jmp 00007F8CACB12CC3h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34DAF4 second address: 34DAFE instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F8CACC719E6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34DD7B second address: 34DD88 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnp 00007F8CACB12CB6h 0x00000009 push edx 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34E036 second address: 34E03E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 34E03E second address: 34E073 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 jmp 00007F8CACB12CBCh 0x0000000b pop edx 0x0000000c jmp 00007F8CACB12CC7h 0x00000011 popad 0x00000012 ja 00007F8CACB12CC4h 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3518C2 second address: 3518C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3518C8 second address: 3518CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3518CC second address: 3518D0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3518D0 second address: 3518E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F8CACB12CBBh 0x0000000e pop ebx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 351B5F second address: 351B73 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push edx 0x00000008 pop edx 0x00000009 pushad 0x0000000a popad 0x0000000b pop ecx 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 351B73 second address: 351B91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007F8CACB12CC3h 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 351B91 second address: 351BA5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8CACC719EDh 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 351BA5 second address: 351BAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 351D16 second address: 351D1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 35E306 second address: 35E33C instructions: 0x00000000 rdtsc 0x00000002 jno 00007F8CACB12CB6h 0x00000008 jmp 00007F8CACB12CC4h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop edx 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F8CACB12CC5h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 35E33C second address: 35E348 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 jnc 00007F8CACC719E6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 35E8DF second address: 35E8F5 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F8CACB12CB6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 ja 00007F8CACB12CB6h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 35E8F5 second address: 35E927 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F8CACC719E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d push edx 0x0000000e pop edx 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 jmp 00007F8CACC719EFh 0x00000017 popad 0x00000018 pushad 0x00000019 push ecx 0x0000001a jmp 00007F8CACC719ECh 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 35E927 second address: 35E93E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jc 00007F8CACB12CBEh 0x0000000b jnl 00007F8CACB12CB6h 0x00000011 push edi 0x00000012 pop edi 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 35E93E second address: 35E944 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 35E944 second address: 35E948 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 35EC0F second address: 35EC1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jc 00007F8CACC719EEh 0x0000000b push edx 0x0000000c pop edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 35ED79 second address: 35ED85 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F8CACB12CB6h 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 35ED85 second address: 35EDC9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACC719F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c ja 00007F8CACC719E8h 0x00000012 jmp 00007F8CACC719F4h 0x00000017 push eax 0x00000018 push edx 0x00000019 jbe 00007F8CACC719E6h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 365796 second address: 36579C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 36579C second address: 3657A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3749DF second address: 3749E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3743DE second address: 374410 instructions: 0x00000000 rdtsc 0x00000002 je 00007F8CACC719E6h 0x00000008 jmp 00007F8CACC719EBh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jng 00007F8CACC719F7h 0x00000015 jmp 00007F8CACC719F1h 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 374410 second address: 374423 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8CACB12CBDh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 374423 second address: 374428 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 374428 second address: 37444B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACB12CC3h 0x00000007 jl 00007F8CACB12CC2h 0x0000000d je 00007F8CACB12CB6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 374569 second address: 374581 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c je 00007F8CACC719E6h 0x00000012 js 00007F8CACC719E6h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 374581 second address: 3745AB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACB12CC6h 0x00000007 jmp 00007F8CACB12CC0h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3745AB second address: 3745CD instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F8CACC719F8h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3745CD second address: 3745D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 37738A second address: 3773BE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACC719F1h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e jnc 00007F8CACC719FAh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 387FE1 second address: 387FE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 387FE5 second address: 38800A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACC719EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a jmp 00007F8CACC719F3h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 38800A second address: 38801E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 jc 00007F8CACB12CBAh 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 38801E second address: 388022 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 388022 second address: 388045 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACB12CBFh 0x00000007 jmp 00007F8CACB12CBBh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 388045 second address: 38804B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 387E70 second address: 387E76 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 387E76 second address: 387E8E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F8CACC719EEh 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 387E8E second address: 387EA1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jnc 00007F8CACB12CBEh 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 38FC1B second address: 38FC33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F8CACC719EEh 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 38FC33 second address: 38FC48 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F8CACB12CB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jl 00007F8CACB12CC2h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 38FC48 second address: 38FC4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 38FC4E second address: 38FC5A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jo 00007F8CACB12CB6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 38FC5A second address: 38FC5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 38FC5E second address: 38FC71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8CACB12CBDh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 38FC71 second address: 38FC77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 38FC77 second address: 38FC7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 38FC7D second address: 38FC81 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 38FC81 second address: 38FCA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8CACB12CC8h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 38FF6A second address: 38FF7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F8CACC719E6h 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 38FF7B second address: 38FF7F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 38FF7F second address: 38FF87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 38FF87 second address: 38FFA3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACB12CC0h 0x00000007 push eax 0x00000008 push edx 0x00000009 ja 00007F8CACB12CB6h 0x0000000f push edx 0x00000010 pop edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 390447 second address: 39044B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 39044B second address: 390468 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACB12CBFh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edi 0x0000000c jne 00007F8CACB12CB6h 0x00000012 pop edi 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 390468 second address: 39048A instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F8CACC719EEh 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c jmp 00007F8CACC719EEh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3905DF second address: 3905E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3905E5 second address: 39061E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8CACC719F4h 0x00000009 push edx 0x0000000a pop edx 0x0000000b popad 0x0000000c jmp 00007F8CACC719F8h 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 39061E second address: 390622 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 396D3A second address: 396D44 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F8CACC719ECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 29F221 second address: 29F24A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8CACB12CC4h 0x00000009 jmp 00007F8CACB12CC1h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 29F24A second address: 29F25F instructions: 0x00000000 rdtsc 0x00000002 jp 00007F8CACC719E6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jl 00007F8CACC719E6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 29F25F second address: 29F26C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 29F26C second address: 29F270 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 29F270 second address: 29F2A0 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F8CACB12CB6h 0x00000008 jp 00007F8CACB12CB6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 jl 00007F8CACB12CB6h 0x00000017 jmp 00007F8CACB12CBCh 0x0000001c jbe 00007F8CACB12CB6h 0x00000022 ja 00007F8CACB12CB6h 0x00000028 popad 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 29F2A0 second address: 29F2A7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3A30FA second address: 3A3105 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007F8CACB12CB6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3A5645 second address: 3A564E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3A564E second address: 3A5654 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3A5654 second address: 3A565C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3A565C second address: 3A5664 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3B290B second address: 3B2910 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3B2910 second address: 3B293B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F8CACB12CC7h 0x00000009 jmp 00007F8CACB12CC0h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3B293B second address: 3B293F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3B4236 second address: 3B423B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3B40BC second address: 3B40C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3B7E81 second address: 3B7E85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3B79BF second address: 3B79D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 pop eax 0x00000008 jmp 00007F8CACC719ECh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3B79D3 second address: 3B79D7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3B79D7 second address: 3B79DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CBB7F second address: 3CBB92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F8CACB12CBFh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CBB92 second address: 3CBB9C instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CBB9C second address: 3CBBA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CBCFF second address: 3CBD1B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACC719F8h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CBE6D second address: 3CBE71 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CBE71 second address: 3CBE77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CBE77 second address: 3CBE7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CBE7D second address: 3CBE9E instructions: 0x00000000 rdtsc 0x00000002 js 00007F8CACC719E8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F8CACC719F3h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CC159 second address: 3CC178 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACB12CBCh 0x00000007 jmp 00007F8CACB12CBFh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CC494 second address: 3CC4D6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACC719EFh 0x00000007 push esi 0x00000008 pushad 0x00000009 popad 0x0000000a pop esi 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push esi 0x00000011 pop esi 0x00000012 pushad 0x00000013 popad 0x00000014 jmp 00007F8CACC719F5h 0x00000019 popad 0x0000001a jnl 00007F8CACC719EEh 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CC906 second address: 3CC90A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CC90A second address: 3CC91A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jnp 00007F8CACC719E6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CC91A second address: 3CC920 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CCA8D second address: 3CCAB6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F8CACC719EBh 0x0000000b jmp 00007F8CACC719EEh 0x00000010 popad 0x00000011 pushad 0x00000012 push edx 0x00000013 pop edx 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 push eax 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CCAB6 second address: 3CCAC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CCAC1 second address: 3CCAC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CF9B2 second address: 3CF9B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CF9B7 second address: 3CFA46 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACC719F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a push 00000000h 0x0000000c push edi 0x0000000d call 00007F8CACC719E8h 0x00000012 pop edi 0x00000013 mov dword ptr [esp+04h], edi 0x00000017 add dword ptr [esp+04h], 0000001Ah 0x0000001f inc edi 0x00000020 push edi 0x00000021 ret 0x00000022 pop edi 0x00000023 ret 0x00000024 mov edx, dword ptr [ebp+122D2921h] 0x0000002a stc 0x0000002b push 00000004h 0x0000002d push 00000000h 0x0000002f push ebx 0x00000030 call 00007F8CACC719E8h 0x00000035 pop ebx 0x00000036 mov dword ptr [esp+04h], ebx 0x0000003a add dword ptr [esp+04h], 0000001Ah 0x00000042 inc ebx 0x00000043 push ebx 0x00000044 ret 0x00000045 pop ebx 0x00000046 ret 0x00000047 movzx edx, ax 0x0000004a call 00007F8CACC719E9h 0x0000004f push eax 0x00000050 push edx 0x00000051 jns 00007F8CACC719F6h 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CFA46 second address: 3CFA6B instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 je 00007F8CACB12CBAh 0x0000000f push eax 0x00000010 push edx 0x00000011 pop edx 0x00000012 pop eax 0x00000013 mov eax, dword ptr [esp+04h] 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007F8CACB12CBCh 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CFA6B second address: 3CFAA5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8CACC719F4h 0x00000008 jmp 00007F8CACC719F2h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov eax, dword ptr [eax] 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007F8CACC719EAh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CFAA5 second address: 3CFABF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F8CACB12CC5h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CFABF second address: 3CFAE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e js 00007F8CACC719E6h 0x00000014 jmp 00007F8CACC719F5h 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CFAE9 second address: 3CFAF3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007F8CACB12CB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3CFD10 second address: 3CFDB0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F8CACC719F2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a cmc 0x0000000b push dword ptr [ebp+122D1DFBh] 0x00000011 push 00000000h 0x00000013 push edx 0x00000014 call 00007F8CACC719E8h 0x00000019 pop edx 0x0000001a mov dword ptr [esp+04h], edx 0x0000001e add dword ptr [esp+04h], 00000019h 0x00000026 inc edx 0x00000027 push edx 0x00000028 ret 0x00000029 pop edx 0x0000002a ret 0x0000002b pushad 0x0000002c sub dword ptr [ebp+1245323Bh], esi 0x00000032 sub dword ptr [ebp+122D2B7Dh], edi 0x00000038 popad 0x00000039 and dx, A005h 0x0000003e call 00007F8CACC719E9h 0x00000043 push ecx 0x00000044 jp 00007F8CACC719ECh 0x0000004a ja 00007F8CACC719E6h 0x00000050 pop ecx 0x00000051 push eax 0x00000052 jnp 00007F8CACC719FBh 0x00000058 mov eax, dword ptr [esp+04h] 0x0000005c jl 00007F8CACC719ECh 0x00000062 pushad 0x00000063 pushad 0x00000064 popad 0x00000065 pushad 0x00000066 popad 0x00000067 popad 0x00000068 mov eax, dword ptr [eax] 0x0000006a pushad 0x0000006b jng 00007F8CACC719ECh 0x00000071 push eax 0x00000072 push edx 0x00000073 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3D1023 second address: 3D1033 instructions: 0x00000000 rdtsc 0x00000002 je 00007F8CACB12CB6h 0x00000008 jnc 00007F8CACB12CB6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\PH1D3KHmOD.exe | RDTSC instruction interceptor: First address: 3D1033 second address: 3D1046 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F8CACC719EDh 0x0000000b rdtsc |