Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E09774 second address: E0978E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F112ED7A3h 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E098E2 second address: E098E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E098E8 second address: E098F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E098F0 second address: E098F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E09BA5 second address: E09BF8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007F9F112ED796h 0x00000009 jmp 00007F9F112ED7A8h 0x0000000e push esi 0x0000000f pop esi 0x00000010 popad 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F9F112ED7A5h 0x0000001b jmp 00007F9F112ED7A5h 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E0D644 second address: E0D691 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525C02h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ebx 0x0000000b push eax 0x0000000c jmp 00007F9F10525C06h 0x00000011 pop eax 0x00000012 pop ebx 0x00000013 mov eax, dword ptr [esp+04h] 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007F9F10525C06h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E0D691 second address: E0D69C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jp 00007F9F112ED796h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E0D69C second address: E0D6BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, dword ptr [eax] 0x00000009 jbe 00007F9F10525BFEh 0x0000000f push esi 0x00000010 jl 00007F9F10525BF6h 0x00000016 pop esi 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b pushad 0x0000001c push eax 0x0000001d push edx 0x0000001e push esi 0x0000001f pop esi 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E0D6BC second address: E0D701 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007F9F112ED798h 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f pop eax 0x00000010 mov edi, dword ptr [ebp+122D39AFh] 0x00000016 push 00000003h 0x00000018 xor ecx, dword ptr [ebp+122D395Fh] 0x0000001e push 00000000h 0x00000020 mov edx, dword ptr [ebp+122D383Fh] 0x00000026 push 00000003h 0x00000028 mov edx, dword ptr [ebp+122D3807h] 0x0000002e push 651E852Dh 0x00000033 push eax 0x00000034 push eax 0x00000035 push edx 0x00000036 jmp 00007F9F112ED79Fh 0x0000003b rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E0D701 second address: E0D705 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E0D705 second address: E0D72C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 add dword ptr [esp], 5AE17AD3h 0x0000000e adc dx, 4756h 0x00000013 lea ebx, dword ptr [ebp+124584D3h] 0x00000019 mov dword ptr [ebp+122D25D5h], ebx 0x0000001f xchg eax, ebx 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 push edx 0x00000024 pop edx 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E0D72C second address: E0D731 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E0D731 second address: E0D73B instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F9F112ED79Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E0D73B second address: E0D759 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jmp 00007F9F10525C01h 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E0D7E9 second address: E0D7EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E0D7EE second address: E0D840 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F9F10525BFCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b js 00007F9F10525C04h 0x00000011 nop 0x00000012 mov ecx, ebx 0x00000014 push 00000000h 0x00000016 mov edi, 2864FADEh 0x0000001b mov esi, dword ptr [ebp+122D39CFh] 0x00000021 push BE43E731h 0x00000026 push eax 0x00000027 push edx 0x00000028 push esi 0x00000029 jmp 00007F9F10525C04h 0x0000002e pop esi 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E0D840 second address: E0D845 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E0D845 second address: E0D8C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 add dword ptr [esp], 41BC194Fh 0x00000010 jmp 00007F9F10525BFBh 0x00000015 push 00000003h 0x00000017 mov di, 9CAFh 0x0000001b push 00000000h 0x0000001d mov edx, edi 0x0000001f push 00000003h 0x00000021 push 00000000h 0x00000023 push edi 0x00000024 call 00007F9F10525BF8h 0x00000029 pop edi 0x0000002a mov dword ptr [esp+04h], edi 0x0000002e add dword ptr [esp+04h], 00000018h 0x00000036 inc edi 0x00000037 push edi 0x00000038 ret 0x00000039 pop edi 0x0000003a ret 0x0000003b push 496DA1C1h 0x00000040 push ecx 0x00000041 jmp 00007F9F10525BFDh 0x00000046 pop ecx 0x00000047 add dword ptr [esp], 76925E3Fh 0x0000004e mov dword ptr [ebp+122D25CDh], ebx 0x00000054 lea ebx, dword ptr [ebp+124584DCh] 0x0000005a add dword ptr [ebp+122D24BAh], esi 0x00000060 xchg eax, ebx 0x00000061 push eax 0x00000062 push edx 0x00000063 je 00007F9F10525BFCh 0x00000069 jnl 00007F9F10525BF6h 0x0000006f rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E0D937 second address: E0D9A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop ebx 0x00000006 push eax 0x00000007 jbe 00007F9F112ED7B2h 0x0000000d nop 0x0000000e push 00000000h 0x00000010 push edi 0x00000011 call 00007F9F112ED798h 0x00000016 pop edi 0x00000017 mov dword ptr [esp+04h], edi 0x0000001b add dword ptr [esp+04h], 00000015h 0x00000023 inc edi 0x00000024 push edi 0x00000025 ret 0x00000026 pop edi 0x00000027 ret 0x00000028 jns 00007F9F112ED79Ch 0x0000002e add di, 6371h 0x00000033 sbb ecx, 557A33FBh 0x00000039 push 00000000h 0x0000003b stc 0x0000003c call 00007F9F112ED799h 0x00000041 pushad 0x00000042 push eax 0x00000043 push edx 0x00000044 push edx 0x00000045 pop edx 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E0D9A6 second address: E0D9AA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E0D9AA second address: E0D9B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E0D9B5 second address: E0D9C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push ecx 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E0D9C0 second address: E0DA4D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop ecx 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a push ebx 0x0000000b push ecx 0x0000000c pushad 0x0000000d popad 0x0000000e pop ecx 0x0000000f pop ebx 0x00000010 mov eax, dword ptr [eax] 0x00000012 jmp 00007F9F112ED79Ch 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b jmp 00007F9F112ED7A0h 0x00000020 pop eax 0x00000021 movsx edi, di 0x00000024 push 00000003h 0x00000026 add dl, FFFFFFA0h 0x00000029 push 00000000h 0x0000002b xor dword ptr [ebp+122D3261h], esi 0x00000031 push 00000003h 0x00000033 or cl, 0000007Eh 0x00000036 push 983C7B60h 0x0000003b jno 00007F9F112ED7A0h 0x00000041 add dword ptr [esp], 27C384A0h 0x00000048 mov dword ptr [ebp+122D21AFh], ecx 0x0000004e lea ebx, dword ptr [ebp+124584E7h] 0x00000054 mov dx, ax 0x00000057 push eax 0x00000058 pushad 0x00000059 push eax 0x0000005a jmp 00007F9F112ED7A3h 0x0000005f pop eax 0x00000060 push ebx 0x00000061 push eax 0x00000062 push edx 0x00000063 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2BE40 second address: E2BE5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F9F10525C04h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2C119 second address: E2C121 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2C121 second address: E2C12B instructions: 0x00000000 rdtsc 0x00000002 jc 00007F9F10525BFCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2C12B second address: E2C144 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F9F112ED79Eh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2C928 second address: E2C92F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2CA74 second address: E2CA7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2CA7A second address: E2CA80 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2CA80 second address: E2CA9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9F112ED7A7h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2CBE6 second address: E2CBEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2CD3B second address: E2CD54 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F112ED79Fh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2CD54 second address: E2CD58 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E242C2 second address: E242C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E242C6 second address: E242CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E242CC second address: E242D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2CFD1 second address: E2D03E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9F10525BFCh 0x00000009 jmp 00007F9F10525C01h 0x0000000e push edx 0x0000000f jmp 00007F9F10525C01h 0x00000014 jl 00007F9F10525BF6h 0x0000001a pop edx 0x0000001b popad 0x0000001c pushad 0x0000001d pushad 0x0000001e jmp 00007F9F10525C02h 0x00000023 pushad 0x00000024 popad 0x00000025 popad 0x00000026 jmp 00007F9F10525C08h 0x0000002b push ebx 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2D716 second address: E2D735 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F112ED7A9h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2D9EA second address: E2D9EE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2D9EE second address: E2DA78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9F112ED7A1h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007F9F112ED79Eh 0x00000011 jmp 00007F9F112ED7A0h 0x00000016 popad 0x00000017 pushad 0x00000018 jmp 00007F9F112ED7A1h 0x0000001d push esi 0x0000001e pop esi 0x0000001f jne 00007F9F112ED796h 0x00000025 push ecx 0x00000026 pop ecx 0x00000027 popad 0x00000028 popad 0x00000029 pushad 0x0000002a pushad 0x0000002b push ecx 0x0000002c pop ecx 0x0000002d push edx 0x0000002e pop edx 0x0000002f jg 00007F9F112ED796h 0x00000035 popad 0x00000036 ja 00007F9F112ED7AEh 0x0000003c jmp 00007F9F112ED7A8h 0x00000041 push eax 0x00000042 push edx 0x00000043 jnc 00007F9F112ED796h 0x00000049 push ebx 0x0000004a pop ebx 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2DA78 second address: E2DA7C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2FAD6 second address: E2FADA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2FADA second address: E2FAE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2FAE0 second address: E2FAFF instructions: 0x00000000 rdtsc 0x00000002 ja 00007F9F112ED7A9h 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E2FAFF second address: E2FB05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E33D0B second address: E33D11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E33D11 second address: E33D1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a pushad 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E33D1F second address: E33D59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push edi 0x00000009 pop edi 0x0000000a popad 0x0000000b popad 0x0000000c mov eax, dword ptr [eax] 0x0000000e je 00007F9F112ED7AFh 0x00000014 jmp 00007F9F112ED7A9h 0x00000019 mov dword ptr [esp+04h], eax 0x0000001d pushad 0x0000001e push ecx 0x0000001f push edx 0x00000020 pop edx 0x00000021 pop ecx 0x00000022 push eax 0x00000023 push edx 0x00000024 push esi 0x00000025 pop esi 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E000EA second address: E00118 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 ja 00007F9F10525BF6h 0x0000000c jmp 00007F9F10525C06h 0x00000011 popad 0x00000012 jnl 00007F9F10525BF8h 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E00118 second address: E0011E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E373E1 second address: E373E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E373E5 second address: E373EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E3750D second address: E37513 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E37513 second address: E37517 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E37517 second address: E3751D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E3751D second address: E3752E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jnc 00007F9F112ED796h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E37993 second address: E379B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 jmp 00007F9F10525BFBh 0x0000000b jbe 00007F9F10525BF6h 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 popad 0x00000015 jo 00007F9F10525C10h 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e popad 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E37B31 second address: E37B38 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E3AF4B second address: E3AF5F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9F10525BFFh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E3BBD6 second address: E3BC0A instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F9F112ED796h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], ebx 0x0000000d push 00000000h 0x0000000f push edx 0x00000010 call 00007F9F112ED798h 0x00000015 pop edx 0x00000016 mov dword ptr [esp+04h], edx 0x0000001a add dword ptr [esp+04h], 00000014h 0x00000022 inc edx 0x00000023 push edx 0x00000024 ret 0x00000025 pop edx 0x00000026 ret 0x00000027 xor dword ptr [ebp+122D324Ah], eax 0x0000002d push eax 0x0000002e push edx 0x0000002f pushad 0x00000030 push eax 0x00000031 push edx 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E3D76B second address: E3D779 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jg 00007F9F10525BF6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E3E6C7 second address: E3E6CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E3E6CB second address: E3E6EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 mov edi, dword ptr [ebp+12479C5Bh] 0x0000000e push 00000000h 0x00000010 push 00000000h 0x00000012 mov dword ptr [ebp+122D21A6h], esi 0x00000018 xchg eax, ebx 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d pop edx 0x0000001e pop eax 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E3E6EA second address: E3E6EF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E3E6EF second address: E3E6F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E43337 second address: E43342 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E439AE second address: E439B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E44346 second address: E443BE instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push ebp 0x0000000c call 00007F9F112ED798h 0x00000011 pop ebp 0x00000012 mov dword ptr [esp+04h], ebp 0x00000016 add dword ptr [esp+04h], 0000001Bh 0x0000001e inc ebp 0x0000001f push ebp 0x00000020 ret 0x00000021 pop ebp 0x00000022 ret 0x00000023 push 00000000h 0x00000025 push 00000000h 0x00000027 push ecx 0x00000028 call 00007F9F112ED798h 0x0000002d pop ecx 0x0000002e mov dword ptr [esp+04h], ecx 0x00000032 add dword ptr [esp+04h], 0000001Ch 0x0000003a inc ecx 0x0000003b push ecx 0x0000003c ret 0x0000003d pop ecx 0x0000003e ret 0x0000003f jmp 00007F9F112ED7A5h 0x00000044 push 00000000h 0x00000046 sbb esi, 6C8DE7FDh 0x0000004c push eax 0x0000004d push eax 0x0000004e push edx 0x0000004f pushad 0x00000050 pushad 0x00000051 popad 0x00000052 push ebx 0x00000053 pop ebx 0x00000054 popad 0x00000055 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E443BE second address: E443C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E4876C second address: E48772 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E48772 second address: E48776 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E48776 second address: E4877A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E49771 second address: E49775 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E48954 second address: E48958 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E49775 second address: E49779 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E49779 second address: E4977F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E4977F second address: E497A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 jmp 00007F9F10525C01h 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E4A869 second address: E4A86D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E4A86D second address: E4A871 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E4A871 second address: E4A8CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 jmp 00007F9F112ED79Ch 0x0000000c nop 0x0000000d mov dword ptr [ebp+122D31CCh], ecx 0x00000013 push 00000000h 0x00000015 pushad 0x00000016 mov eax, esi 0x00000018 push ecx 0x00000019 add ch, FFFFFFD3h 0x0000001c pop esi 0x0000001d popad 0x0000001e push 00000000h 0x00000020 push 00000000h 0x00000022 push edi 0x00000023 call 00007F9F112ED798h 0x00000028 pop edi 0x00000029 mov dword ptr [esp+04h], edi 0x0000002d add dword ptr [esp+04h], 0000001Bh 0x00000035 inc edi 0x00000036 push edi 0x00000037 ret 0x00000038 pop edi 0x00000039 ret 0x0000003a add ebx, 5C3C6B39h 0x00000040 xchg eax, esi 0x00000041 push esi 0x00000042 push eax 0x00000043 push edx 0x00000044 jl 00007F9F112ED796h 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E4B8CF second address: E4B944 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007F9F10525BF6h 0x00000009 jnc 00007F9F10525BF6h 0x0000000f popad 0x00000010 pop edx 0x00000011 pop eax 0x00000012 nop 0x00000013 push 00000000h 0x00000015 push edi 0x00000016 call 00007F9F10525BF8h 0x0000001b pop edi 0x0000001c mov dword ptr [esp+04h], edi 0x00000020 add dword ptr [esp+04h], 00000014h 0x00000028 inc edi 0x00000029 push edi 0x0000002a ret 0x0000002b pop edi 0x0000002c ret 0x0000002d mov bx, D6CAh 0x00000031 push 00000000h 0x00000033 push 00000000h 0x00000035 push ebx 0x00000036 call 00007F9F10525BF8h 0x0000003b pop ebx 0x0000003c mov dword ptr [esp+04h], ebx 0x00000040 add dword ptr [esp+04h], 0000001Dh 0x00000048 inc ebx 0x00000049 push ebx 0x0000004a ret 0x0000004b pop ebx 0x0000004c ret 0x0000004d push 00000000h 0x0000004f mov dword ptr [ebp+122D362Dh], eax 0x00000055 xchg eax, esi 0x00000056 pushad 0x00000057 push eax 0x00000058 push edx 0x00000059 jmp 00007F9F10525BFFh 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E4C934 second address: E4C93A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E4BAAE second address: E4BAB3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E4CB49 second address: E4CB53 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F9F112ED79Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E50F05 second address: E50F95 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525BFDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jc 00007F9F10525C1Eh 0x00000010 pushad 0x00000011 jmp 00007F9F10525BFDh 0x00000016 jmp 00007F9F10525C09h 0x0000001b popad 0x0000001c nop 0x0000001d push 00000000h 0x0000001f push esi 0x00000020 call 00007F9F10525BF8h 0x00000025 pop esi 0x00000026 mov dword ptr [esp+04h], esi 0x0000002a add dword ptr [esp+04h], 00000019h 0x00000032 inc esi 0x00000033 push esi 0x00000034 ret 0x00000035 pop esi 0x00000036 ret 0x00000037 push esi 0x00000038 sbb edi, 17BBE45Bh 0x0000003e pop edi 0x0000003f push 00000000h 0x00000041 mov dword ptr [ebp+1247C8C1h], edx 0x00000047 push 00000000h 0x00000049 jmp 00007F9F10525BFDh 0x0000004e movsx edi, cx 0x00000051 xchg eax, esi 0x00000052 je 00007F9F10525C00h 0x00000058 pushad 0x00000059 pushad 0x0000005a popad 0x0000005b push eax 0x0000005c push edx 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E52064 second address: E5206A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E540E2 second address: E5416C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F9F10525BFFh 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f push 00000000h 0x00000011 push eax 0x00000012 call 00007F9F10525BF8h 0x00000017 pop eax 0x00000018 mov dword ptr [esp+04h], eax 0x0000001c add dword ptr [esp+04h], 00000019h 0x00000024 inc eax 0x00000025 push eax 0x00000026 ret 0x00000027 pop eax 0x00000028 ret 0x00000029 jmp 00007F9F10525C00h 0x0000002e push 00000000h 0x00000030 jo 00007F9F10525BFCh 0x00000036 or dword ptr [ebp+122D21AFh], edx 0x0000003c push 00000000h 0x0000003e push 00000000h 0x00000040 push eax 0x00000041 call 00007F9F10525BF8h 0x00000046 pop eax 0x00000047 mov dword ptr [esp+04h], eax 0x0000004b add dword ptr [esp+04h], 00000018h 0x00000053 inc eax 0x00000054 push eax 0x00000055 ret 0x00000056 pop eax 0x00000057 ret 0x00000058 sub dword ptr [ebp+122D3001h], esi 0x0000005e push eax 0x0000005f pushad 0x00000060 push eax 0x00000061 push edx 0x00000062 jg 00007F9F10525BF6h 0x00000068 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E5509F second address: E550B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F9F112ED79Eh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E550B3 second address: E55133 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push ebp 0x0000000d call 00007F9F10525BF8h 0x00000012 pop ebp 0x00000013 mov dword ptr [esp+04h], ebp 0x00000017 add dword ptr [esp+04h], 00000019h 0x0000001f inc ebp 0x00000020 push ebp 0x00000021 ret 0x00000022 pop ebp 0x00000023 ret 0x00000024 and bx, A42Ah 0x00000029 jmp 00007F9F10525C02h 0x0000002e push 00000000h 0x00000030 jmp 00007F9F10525BFEh 0x00000035 push ebx 0x00000036 cmc 0x00000037 pop edi 0x00000038 push 00000000h 0x0000003a push 00000000h 0x0000003c push ebp 0x0000003d call 00007F9F10525BF8h 0x00000042 pop ebp 0x00000043 mov dword ptr [esp+04h], ebp 0x00000047 add dword ptr [esp+04h], 00000015h 0x0000004f inc ebp 0x00000050 push ebp 0x00000051 ret 0x00000052 pop ebp 0x00000053 ret 0x00000054 mov edi, dword ptr [ebp+122D1C3Ah] 0x0000005a xchg eax, esi 0x0000005b pushad 0x0000005c push eax 0x0000005d push edx 0x0000005e push esi 0x0000005f pop esi 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E53265 second address: E53269 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E55133 second address: E55148 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525BFDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E53269 second address: E53290 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F9F112ED796h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F9F112ED7A9h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E55148 second address: E55155 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E53290 second address: E53295 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E55155 second address: E55167 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F9F10525BF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jo 00007F9F10525BFCh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E53295 second address: E53334 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9F112ED79Eh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d push 00000000h 0x0000000f push ecx 0x00000010 call 00007F9F112ED798h 0x00000015 pop ecx 0x00000016 mov dword ptr [esp+04h], ecx 0x0000001a add dword ptr [esp+04h], 0000001Dh 0x00000022 inc ecx 0x00000023 push ecx 0x00000024 ret 0x00000025 pop ecx 0x00000026 ret 0x00000027 push dword ptr fs:[00000000h] 0x0000002e jne 00007F9F112ED799h 0x00000034 mov dword ptr fs:[00000000h], esp 0x0000003b mov dword ptr [ebp+122D1D3Dh], edi 0x00000041 mov eax, dword ptr [ebp+122D0C31h] 0x00000047 mov dword ptr [ebp+122D2936h], ecx 0x0000004d push FFFFFFFFh 0x0000004f push 00000000h 0x00000051 push ecx 0x00000052 call 00007F9F112ED798h 0x00000057 pop ecx 0x00000058 mov dword ptr [esp+04h], ecx 0x0000005c add dword ptr [esp+04h], 0000001Ch 0x00000064 inc ecx 0x00000065 push ecx 0x00000066 ret 0x00000067 pop ecx 0x00000068 ret 0x00000069 mov ebx, dword ptr [ebp+122D39CBh] 0x0000006f push eax 0x00000070 jc 00007F9F112ED7A2h 0x00000076 jl 00007F9F112ED79Ch 0x0000007c push eax 0x0000007d push edx 0x0000007e rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E58174 second address: E58188 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525C00h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E58188 second address: E5819F instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F9F112ED798h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jnl 00007F9F112ED798h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E57302 second address: E5739B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F9F10525BFBh 0x0000000d pop edx 0x0000000e nop 0x0000000f ja 00007F9F10525BFCh 0x00000015 push dword ptr fs:[00000000h] 0x0000001c push 00000000h 0x0000001e push eax 0x0000001f call 00007F9F10525BF8h 0x00000024 pop eax 0x00000025 mov dword ptr [esp+04h], eax 0x00000029 add dword ptr [esp+04h], 00000017h 0x00000031 inc eax 0x00000032 push eax 0x00000033 ret 0x00000034 pop eax 0x00000035 ret 0x00000036 mov dword ptr fs:[00000000h], esp 0x0000003d jnp 00007F9F10525BFCh 0x00000043 mov dword ptr [ebp+122D25CDh], ebx 0x00000049 mov eax, dword ptr [ebp+122D170Dh] 0x0000004f mov edi, dword ptr [ebp+122D390Bh] 0x00000055 push FFFFFFFFh 0x00000057 jmp 00007F9F10525BFBh 0x0000005c nop 0x0000005d jng 00007F9F10525C08h 0x00000063 jmp 00007F9F10525C02h 0x00000068 push eax 0x00000069 pushad 0x0000006a push ebx 0x0000006b jne 00007F9F10525BF6h 0x00000071 pop ebx 0x00000072 push edx 0x00000073 push eax 0x00000074 push edx 0x00000075 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E5819F second address: E581A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E581A5 second address: E581A9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E5CF03 second address: E5CF09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6022B second address: E6022F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6022F second address: E6023E instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F9F112ED796h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E5F9FE second address: E5FA05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E5FA05 second address: E5FA0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E5FA0B second address: E5FA0F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E5FA0F second address: E5FA1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edi 0x0000000c pop edi 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E63F67 second address: E63FBF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F9F10525BFAh 0x0000000b popad 0x0000000c push eax 0x0000000d pushad 0x0000000e jng 00007F9F10525BF8h 0x00000014 jmp 00007F9F10525C03h 0x00000019 popad 0x0000001a mov eax, dword ptr [esp+04h] 0x0000001e pushad 0x0000001f jmp 00007F9F10525C04h 0x00000024 push ecx 0x00000025 jnl 00007F9F10525BF6h 0x0000002b pop ecx 0x0000002c popad 0x0000002d mov eax, dword ptr [eax] 0x0000002f pushad 0x00000030 push eax 0x00000031 push edx 0x00000032 push eax 0x00000033 pop eax 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6A59A second address: E6A59E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6A59E second address: E6A5D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jno 00007F9F10525C0Bh 0x0000000c push ecx 0x0000000d jnp 00007F9F10525BFEh 0x00000013 jl 00007F9F10525BF6h 0x00000019 push eax 0x0000001a pop eax 0x0000001b pushad 0x0000001c pushad 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6A76A second address: E6A77C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F9F112ED79Eh 0x0000000a push esi 0x0000000b pop esi 0x0000000c ja 00007F9F112ED796h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6AA7C second address: E6AA8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 ja 00007F9F10525BF6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6AA8C second address: E6AA95 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6AA95 second address: E6AA9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6AA9B second address: E6AAB2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F112ED7A3h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6ADA2 second address: E6ADA6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6F30C second address: E6F312 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6F452 second address: E6F458 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6F458 second address: E6F45E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6F5A4 second address: E6F5A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6F6DA second address: E6F741 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jp 00007F9F112ED7C2h 0x0000000c jbe 00007F9F112ED798h 0x00000012 pushad 0x00000013 jne 00007F9F112ED796h 0x00000019 jmp 00007F9F112ED7A6h 0x0000001e pushad 0x0000001f popad 0x00000020 popad 0x00000021 popad 0x00000022 push eax 0x00000023 push edx 0x00000024 push ebx 0x00000025 pushad 0x00000026 popad 0x00000027 pop ebx 0x00000028 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6FA63 second address: E6FA67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6FA67 second address: E6FA80 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F112ED7A0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a push edi 0x0000000b pop edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6FD4A second address: E6FD52 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6FD52 second address: E6FD56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6FD56 second address: E6FD7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F9F10525C09h 0x0000000d jbe 00007F9F10525BF6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6FEF5 second address: E6FEFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E6FEFD second address: E6FF03 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E70072 second address: E70076 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E70076 second address: E7007F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E701DE second address: E701FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F9F112ED7A6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E701FB second address: E70213 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525C04h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E70213 second address: E70232 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 jns 00007F9F112ED798h 0x0000000f jnc 00007F9F112ED79Eh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E70232 second address: E70237 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E037E4 second address: E037EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E037EA second address: E037F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 jnp 00007F9F10525BF6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E037F9 second address: E037FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7432C second address: E74330 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E74330 second address: E7434A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F9F112ED7A4h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E776E5 second address: E77705 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F9F10525C07h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E77705 second address: E7771A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop esi 0x00000007 jng 00007F9F112ED79Ah 0x0000000d pushad 0x0000000e popad 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7771A second address: E7771E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7771E second address: E77724 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7B879 second address: E7B87F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7B87F second address: E7B88E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7B88E second address: E7B89C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jno 00007F9F10525BF6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7B89C second address: E7B8A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7B8A3 second address: E7B8BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F9F10525C05h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7B8BE second address: E7B8D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F9F112ED79Fh 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7B8D7 second address: E7B8DB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E3999C second address: E399A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E399A1 second address: E242C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9F10525BFEh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f push 00000000h 0x00000011 push edx 0x00000012 call 00007F9F10525BF8h 0x00000017 pop edx 0x00000018 mov dword ptr [esp+04h], edx 0x0000001c add dword ptr [esp+04h], 0000001Ah 0x00000024 inc edx 0x00000025 push edx 0x00000026 ret 0x00000027 pop edx 0x00000028 ret 0x00000029 add ecx, dword ptr [ebp+122D1E9Ah] 0x0000002f lea eax, dword ptr [ebp+12484730h] 0x00000035 mov dword ptr [ebp+122D2811h], esi 0x0000003b push eax 0x0000003c jl 00007F9F10525C0Bh 0x00000042 mov dword ptr [esp], eax 0x00000045 or dword ptr [ebp+122D31C4h], edi 0x0000004b call dword ptr [ebp+122D3256h] 0x00000051 push ebx 0x00000052 push eax 0x00000053 push edx 0x00000054 jmp 00007F9F10525C08h 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E39EB0 second address: E39EC6 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F9F112ED79Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E39EC6 second address: E39ECA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E3A072 second address: E3A078 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E3A8CD second address: E3A8EB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525C01h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push edi 0x0000000e pop edi 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E3AC0F second address: E3AC13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E3AC13 second address: E3AC44 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 mov dword ptr [esp], eax 0x0000000a pushad 0x0000000b mov ecx, esi 0x0000000d xor eax, 290477A7h 0x00000013 popad 0x00000014 lea eax, dword ptr [ebp+12484774h] 0x0000001a add edx, dword ptr [ebp+122D3242h] 0x00000020 push eax 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 jg 00007F9F10525BF6h 0x0000002a jbe 00007F9F10525BF6h 0x00000030 popad 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7C453 second address: E7C459 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7C459 second address: E7C45D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7C59E second address: E7C5A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7C5A4 second address: E7C5B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 pushad 0x00000008 jp 00007F9F10525BF6h 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7C5B6 second address: E7C5D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F9F112ED796h 0x0000000a popad 0x0000000b jne 00007F9F112ED79Ch 0x00000011 js 00007F9F112ED796h 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7C5D0 second address: E7C5D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7C5D6 second address: E7C5E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a push edx 0x0000000b pop edx 0x0000000c jne 00007F9F112ED796h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7C5E8 second address: E7C5F6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jo 00007F9F10525BF6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7C5F6 second address: E7C60E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F112ED7A4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E7C60E second address: E7C61F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jo 00007F9F10525BF6h 0x00000009 jl 00007F9F10525BF6h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E80F01 second address: E80F17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jc 00007F9F112ED796h 0x0000000c popad 0x0000000d pushad 0x0000000e jns 00007F9F112ED796h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E80F17 second address: E80F1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E80F1F second address: E80F2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F9F112ED796h 0x0000000a popad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E811F3 second address: E811F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E811F7 second address: E81203 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jns 00007F9F112ED796h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E81203 second address: E81220 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F9F10525BF6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 jmp 00007F9F10525BFDh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E81220 second address: E81224 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E814DB second address: E814DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E8161C second address: E8162C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F9F112ED796h 0x0000000a popad 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E8162C second address: E81656 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F9F10525BF6h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d popad 0x0000000e push eax 0x0000000f jmp 00007F9F10525C03h 0x00000014 jnp 00007F9F10525BFCh 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E80BA2 second address: E80BA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E80BA6 second address: E80BAA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E80BAA second address: E80BC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jp 00007F9F112ED796h 0x0000000d jnl 00007F9F112ED796h 0x00000013 push edx 0x00000014 pop edx 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E80BC4 second address: E80BCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E80BCA second address: E80BFB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F112ED79Dh 0x00000007 js 00007F9F112ED796h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f popad 0x00000010 jo 00007F9F112ED7C4h 0x00000016 jmp 00007F9F112ED79Fh 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E80BFB second address: E80BFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E81BD7 second address: E81BDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E81E71 second address: E81E8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jmp 00007F9F10525C02h 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E81E8C second address: E81E96 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E85079 second address: E850AA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525BFBh 0x00000007 jmp 00007F9F10525C07h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jo 00007F9F10525C1Ch 0x00000014 pushad 0x00000015 pushad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E850AA second address: E850B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F9F112ED796h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E8496D second address: E84979 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jg 00007F9F10525BF6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E84AF8 second address: E84AFE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E84DC0 second address: E84DCE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push ecx 0x00000006 push ecx 0x00000007 pop ecx 0x00000008 pop ecx 0x00000009 push ebx 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E84DCE second address: E84DDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jbe 00007F9F112ED796h 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E87504 second address: E8753E instructions: 0x00000000 rdtsc 0x00000002 jg 00007F9F10525BFAh 0x00000008 jmp 00007F9F10525C04h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F9F10525C06h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E8753E second address: E87544 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E87544 second address: E8754E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F9F10525BF6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E870A1 second address: E870A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E870A7 second address: E870B1 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F9F10525BF6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E870B1 second address: E870B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E870B7 second address: E870CB instructions: 0x00000000 rdtsc 0x00000002 jg 00007F9F10525BF8h 0x00000008 pushad 0x00000009 popad 0x0000000a jnp 00007F9F10525BFEh 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E870CB second address: E870E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F9F112ED7A1h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E8D665 second address: E8D66C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E8CBB3 second address: E8CBBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E8CBBC second address: E8CBD6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525C02h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E8CBD6 second address: E8CBDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E8CF08 second address: E8CF0C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E8D042 second address: E8D046 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E8D046 second address: E8D051 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push esi 0x00000004 pop esi 0x00000005 pushad 0x00000006 popad 0x00000007 pop edi 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E8D1CC second address: E8D1E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jmp 00007F9F112ED7A8h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E8D1E9 second address: E8D1F0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E9143F second address: E91445 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E91445 second address: E9146F instructions: 0x00000000 rdtsc 0x00000002 jl 00007F9F10525BF6h 0x00000008 jg 00007F9F10525BF6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 push edi 0x00000012 pop edi 0x00000013 jnc 00007F9F10525BF6h 0x00000019 jmp 00007F9F10525BFFh 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E91132 second address: E91157 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jne 00007F9F112ED796h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f jmp 00007F9F112ED7A4h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E91157 second address: E91162 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F9F10525BF6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E91162 second address: E91184 instructions: 0x00000000 rdtsc 0x00000002 js 00007F9F112ED7ACh 0x00000008 jmp 00007F9F112ED7A6h 0x0000000d push eax 0x0000000e push edx 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E9574D second address: E95756 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edi 0x00000007 pop edi 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E95756 second address: E9577B instructions: 0x00000000 rdtsc 0x00000002 jno 00007F9F112ED7B0h 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E958D7 second address: E958E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push edi 0x00000008 pop edi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E95A13 second address: E95A18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E95A18 second address: E95A24 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 jng 00007F9F10525BF6h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E95E62 second address: E95E6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F9F112ED798h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E3A7A4 second address: E3A7AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E9F07E second address: E9F082 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E9F082 second address: E9F086 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E9F086 second address: E9F08E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E9F08E second address: E9F0C5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525C05h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F9F10525C09h 0x00000011 push esi 0x00000012 pop esi 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E9F0C5 second address: E9F0DB instructions: 0x00000000 rdtsc 0x00000002 jc 00007F9F112ED796h 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push edx 0x0000000f pop edx 0x00000010 jng 00007F9F112ED796h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E9D241 second address: E9D256 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push esi 0x00000007 pop esi 0x00000008 popad 0x00000009 jmp 00007F9F10525BFCh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E9D256 second address: E9D280 instructions: 0x00000000 rdtsc 0x00000002 je 00007F9F112ED7ADh 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b jnp 00007F9F112ED796h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E9D64A second address: E9D650 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E9DCB0 second address: E9DCC9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9F112ED7A5h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E9E744 second address: E9E76E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edx 0x00000006 pushad 0x00000007 jnc 00007F9F10525C10h 0x0000000d jmp 00007F9F10525C04h 0x00000012 jg 00007F9F10525BF6h 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E9E76E second address: E9E774 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E9E774 second address: E9E7B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F9F10525BF6h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d pushad 0x0000000e jmp 00007F9F10525C09h 0x00000013 jmp 00007F9F10525C05h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EA2F49 second address: EA2F60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F9F112ED7A3h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EA2F60 second address: EA2F6B instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EA2271 second address: EA227A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EA227A second address: EA229F instructions: 0x00000000 rdtsc 0x00000002 jl 00007F9F10525C02h 0x00000008 push eax 0x00000009 jmp 00007F9F10525BFEh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EA268B second address: EA2692 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EA2AB5 second address: EA2ADD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F9F10525BFEh 0x00000008 jmp 00007F9F10525BFEh 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EA2ADD second address: EA2AE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EA2AE1 second address: EA2AF4 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F9F10525BF6h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push esi 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EA2AF4 second address: EA2AF8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EA2AF8 second address: EA2AFC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EA2C62 second address: EA2C8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F9F112ED7A3h 0x0000000b jmp 00007F9F112ED7A2h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EA2C8F second address: EA2CAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F9F10525C04h 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EAF689 second address: EAF693 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F9F112ED796h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EAF693 second address: EAF699 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EAF814 second address: EAF81E instructions: 0x00000000 rdtsc 0x00000002 jc 00007F9F112ED796h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EAF81E second address: EAF824 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EAF824 second address: EAF83C instructions: 0x00000000 rdtsc 0x00000002 js 00007F9F112ED7A2h 0x00000008 push eax 0x00000009 push edx 0x0000000a push edi 0x0000000b pop edi 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EAFB1E second address: EAFB45 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525C09h 0x00000007 jng 00007F9F10525BF6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EAFB45 second address: EAFB4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F9F112ED796h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EAFB4F second address: EAFB6C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525C09h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EAFB6C second address: EAFB9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 pushad 0x00000009 push edi 0x0000000a pop edi 0x0000000b pushad 0x0000000c popad 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007F9F112ED79Ch 0x00000014 popad 0x00000015 jg 00007F9F112ED798h 0x0000001b jl 00007F9F112ED798h 0x00000021 pushad 0x00000022 popad 0x00000023 push eax 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EAFD12 second address: EAFD16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EAFD16 second address: EAFD1A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EAFD1A second address: EAFD22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EB0113 second address: EB0118 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EB026B second address: EB0289 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jmp 00007F9F10525C09h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EB7DBA second address: EB7DBE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EB7DBE second address: EB7DC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EB7DC4 second address: EB7DCD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EB7DCD second address: EB7DFC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F9F10525BF6h 0x0000000a pushad 0x0000000b popad 0x0000000c jmp 00007F9F10525C02h 0x00000011 popad 0x00000012 pushad 0x00000013 push esi 0x00000014 pop esi 0x00000015 pushad 0x00000016 popad 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 pushad 0x0000001a popad 0x0000001b popad 0x0000001c popad 0x0000001d pushad 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EB7DFC second address: EB7E02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EB7E02 second address: EB7E06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EB7E06 second address: EB7E0A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EC963D second address: EC9683 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F9F10525C07h 0x0000000e push edx 0x0000000f pop edx 0x00000010 popad 0x00000011 pushad 0x00000012 jmp 00007F9F10525C04h 0x00000017 je 00007F9F10525BF6h 0x0000001d jne 00007F9F10525BF6h 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EC97FB second address: EC9811 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007F9F112ED79Bh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: ED1DB7 second address: ED1DBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: ED877D second address: ED8785 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: ED8785 second address: ED87A5 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F9F10525C08h 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EDE9E0 second address: EDE9FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 jmp 00007F9F112ED7A2h 0x0000000b popad 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EDE9FE second address: EDEA0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F9F10525BF6h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EE3112 second address: EE3129 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F9F112ED798h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f jo 00007F9F112ED796h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EE3129 second address: EE3144 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push edi 0x00000007 pop edi 0x00000008 popad 0x00000009 jmp 00007F9F10525C02h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EF0A02 second address: EF0A06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EF0A06 second address: EF0A10 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EF0A10 second address: EF0A14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: DFE71C second address: DFE721 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EF2F7D second address: EF2F81 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EF2F81 second address: EF2F89 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: EF2F89 second address: EF2FB2 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F9F112ED7A8h 0x00000008 pop ebx 0x00000009 pushad 0x0000000a jnp 00007F9F112ED796h 0x00000010 push edx 0x00000011 pop edx 0x00000012 push edx 0x00000013 pop edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: E01C3D second address: E01C5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F9F10525BF6h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 jmp 00007F9F10525BFFh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: F02713 second address: F02717 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: F16502 second address: F16540 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F9F10525BFAh 0x00000008 push eax 0x00000009 pop eax 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d jmp 00007F9F10525BFAh 0x00000012 push ecx 0x00000013 pop ecx 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F9F10525C08h 0x00000020 jne 00007F9F10525BF6h 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: F16540 second address: F16556 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jc 00007F9F112ED796h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jbe 00007F9F112ED796h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: F16556 second address: F1655A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: F1655A second address: F16560 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: F166B5 second address: F166BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: F166BB second address: F166E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jc 00007F9F112ED7B5h 0x0000000b jmp 00007F9F112ED79Dh 0x00000010 jmp 00007F9F112ED7A2h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: F166E5 second address: F166FE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525BFFh 0x00000007 jp 00007F9F10525BFCh 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: F168A9 second address: F168AE instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: F16CF1 second address: F16D32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 jmp 00007F9F10525C03h 0x0000000b jmp 00007F9F10525C04h 0x00000010 pop edi 0x00000011 jmp 00007F9F10525BFEh 0x00000016 pushad 0x00000017 push edi 0x00000018 pop edi 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: F16E99 second address: F16EC5 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F9F112ED798h 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F9F112ED7A1h 0x00000011 jmp 00007F9F112ED79Fh 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: F17178 second address: F17182 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 push edi 0x00000009 pop edi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: F17182 second address: F1718C instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F9F112ED796h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: F1A23D second address: F1A241 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: F1A4B5 second address: F1A518 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F9F112ED7A2h 0x0000000c jmp 00007F9F112ED79Dh 0x00000011 popad 0x00000012 popad 0x00000013 nop 0x00000014 push 00000000h 0x00000016 push eax 0x00000017 call 00007F9F112ED798h 0x0000001c pop eax 0x0000001d mov dword ptr [esp+04h], eax 0x00000021 add dword ptr [esp+04h], 00000014h 0x00000029 inc eax 0x0000002a push eax 0x0000002b ret 0x0000002c pop eax 0x0000002d ret 0x0000002e push dword ptr [ebp+122D1865h] 0x00000034 adc dx, 23AFh 0x00000039 push 42E5EE22h 0x0000003e push eax 0x0000003f push edx 0x00000040 jng 00007F9F112ED79Ch 0x00000046 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: F1D3B9 second address: F1D3C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: F1D3C2 second address: F1D3D6 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F9F112ED79Bh 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 557036E second address: 5570374 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5570374 second address: 5570378 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5570378 second address: 557037C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 557037C second address: 55703EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F9F112ED79Eh 0x0000000e xchg eax, ebp 0x0000000f pushad 0x00000010 pushad 0x00000011 movzx esi, di 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 mov ebx, 55BD980Ah 0x0000001c popad 0x0000001d mov ebp, esp 0x0000001f pushad 0x00000020 jmp 00007F9F112ED7A7h 0x00000025 mov ah, FFh 0x00000027 popad 0x00000028 mov edx, dword ptr [ebp+0Ch] 0x0000002b pushad 0x0000002c mov ax, 6FD3h 0x00000030 popad 0x00000031 mov ecx, dword ptr [ebp+08h] 0x00000034 push eax 0x00000035 push edx 0x00000036 pushad 0x00000037 mov dx, AEE6h 0x0000003b call 00007F9F112ED7A7h 0x00000040 pop eax 0x00000041 popad 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 55703EB second address: 55703F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 55703F1 second address: 55703F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 55907E3 second address: 55907E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 55907E9 second address: 55907ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 55907ED second address: 559082C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b jmp 00007F9F10525BFFh 0x00000010 mov ebp, esp 0x00000012 jmp 00007F9F10525C06h 0x00000017 xchg eax, ecx 0x00000018 pushad 0x00000019 mov ecx, 229E67ADh 0x0000001e push eax 0x0000001f push edx 0x00000020 mov cx, BECFh 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 559082C second address: 559083D instructions: 0x00000000 rdtsc 0x00000002 mov ecx, 2B9D78EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 559083D second address: 5590841 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5590841 second address: 5590847 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5590847 second address: 5590870 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525C05h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F9F10525BFDh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5590870 second address: 55908E9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F112ED7A1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a jmp 00007F9F112ED79Eh 0x0000000f push eax 0x00000010 jmp 00007F9F112ED79Bh 0x00000015 xchg eax, esi 0x00000016 jmp 00007F9F112ED7A6h 0x0000001b lea eax, dword ptr [ebp-04h] 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 pushfd 0x00000022 jmp 00007F9F112ED79Dh 0x00000027 sub esi, 232B3F86h 0x0000002d jmp 00007F9F112ED7A1h 0x00000032 popfd 0x00000033 mov eax, 61309937h 0x00000038 popad 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 55908E9 second address: 5590910 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525BFDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a jmp 00007F9F10525BFEh 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5590910 second address: 5590914 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5590914 second address: 5590930 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525C08h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5590930 second address: 5590936 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5590936 second address: 559093A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 559093A second address: 559094D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c movzx esi, di 0x0000000f movsx edx, ax 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 559094D second address: 5590953 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5590992 second address: 55909C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F112ED7A1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [ebp-04h], 00000000h 0x0000000d jmp 00007F9F112ED79Eh 0x00000012 mov esi, eax 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 55909C1 second address: 55909C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 55909C5 second address: 55909C9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 55909C9 second address: 55909CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5590A76 second address: 558008F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, ebx 0x00000005 mov bh, 99h 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop esi 0x0000000b jmp 00007F9F112ED7A0h 0x00000010 leave 0x00000011 jmp 00007F9F112ED7A0h 0x00000016 retn 0004h 0x00000019 nop 0x0000001a sub esp, 04h 0x0000001d xor ebx, ebx 0x0000001f cmp eax, 00000000h 0x00000022 je 00007F9F112ED8FAh 0x00000028 mov dword ptr [esp], 0000000Dh 0x0000002f call 00007F9F15C09931h 0x00000034 mov edi, edi 0x00000036 pushad 0x00000037 mov eax, 1E464CBDh 0x0000003c pushfd 0x0000003d jmp 00007F9F112ED79Ah 0x00000042 adc ax, 3498h 0x00000047 jmp 00007F9F112ED79Bh 0x0000004c popfd 0x0000004d popad 0x0000004e xchg eax, ebp 0x0000004f jmp 00007F9F112ED7A6h 0x00000054 push eax 0x00000055 jmp 00007F9F112ED79Bh 0x0000005a xchg eax, ebp 0x0000005b pushad 0x0000005c mov esi, 250C7C4Bh 0x00000061 mov bx, cx 0x00000064 popad 0x00000065 mov ebp, esp 0x00000067 push eax 0x00000068 push edx 0x00000069 pushad 0x0000006a call 00007F9F112ED79Fh 0x0000006f pop eax 0x00000070 pushfd 0x00000071 jmp 00007F9F112ED7A9h 0x00000076 jmp 00007F9F112ED79Bh 0x0000007b popfd 0x0000007c popad 0x0000007d rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 558008F second address: 55800EF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F9F10525BFFh 0x00000009 sbb eax, 2C8F7D7Eh 0x0000000f jmp 00007F9F10525C09h 0x00000014 popfd 0x00000015 pushfd 0x00000016 jmp 00007F9F10525C00h 0x0000001b sbb ax, 6878h 0x00000020 jmp 00007F9F10525BFBh 0x00000025 popfd 0x00000026 popad 0x00000027 pop edx 0x00000028 pop eax 0x00000029 sub esp, 2Ch 0x0000002c pushad 0x0000002d push eax 0x0000002e push edx 0x0000002f mov ch, 9Ah 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 55800EF second address: 5580143 instructions: 0x00000000 rdtsc 0x00000002 mov di, BEF2h 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushfd 0x00000009 jmp 00007F9F112ED7A3h 0x0000000e sbb ah, FFFFFFEEh 0x00000011 jmp 00007F9F112ED7A9h 0x00000016 popfd 0x00000017 popad 0x00000018 xchg eax, ebx 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c jmp 00007F9F112ED7A3h 0x00000021 pushad 0x00000022 popad 0x00000023 popad 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580143 second address: 558016D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525BFFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F9F10525C04h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 558016D second address: 5580187 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F9F112ED79Dh 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580187 second address: 558018D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 558018D second address: 55801F4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, 4217h 0x00000007 pushfd 0x00000008 jmp 00007F9F112ED79Ch 0x0000000d adc esi, 4E69FB88h 0x00000013 jmp 00007F9F112ED79Bh 0x00000018 popfd 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c xchg eax, edi 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 pushfd 0x00000021 jmp 00007F9F112ED79Bh 0x00000026 or ch, FFFFFFCEh 0x00000029 jmp 00007F9F112ED7A9h 0x0000002e popfd 0x0000002f jmp 00007F9F112ED7A0h 0x00000034 popad 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 55801F4 second address: 55801FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580287 second address: 55802B8 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F9F112ED7A1h 0x00000008 sub si, 5036h 0x0000000d jmp 00007F9F112ED7A1h 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 mov ebx, ecx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 55802B8 second address: 5580312 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F9F10525BFAh 0x00000008 or ax, 5F58h 0x0000000d jmp 00007F9F10525BFBh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 inc ebx 0x00000017 jmp 00007F9F10525C06h 0x0000001c test al, al 0x0000001e pushad 0x0000001f call 00007F9F10525BFEh 0x00000024 movzx eax, bx 0x00000027 pop edx 0x00000028 push eax 0x00000029 push edx 0x0000002a call 00007F9F10525BFAh 0x0000002f pop esi 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580508 second address: 558050D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 558050D second address: 558051C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9F10525BFBh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 558051C second address: 5580542 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebx, dword ptr [ebp+08h] 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F9F112ED7A7h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580542 second address: 558055F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525C09h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 558055F second address: 558056F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9F112ED79Ch 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 558056F second address: 5580573 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580573 second address: 558058B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 lea eax, dword ptr [ebp-2Ch] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov esi, 108D3EDFh 0x00000013 mov si, E9FBh 0x00000017 popad 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 558058B second address: 55805E9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 067555E2h 0x00000008 jmp 00007F9F10525C03h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 xchg eax, esi 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007F9F10525C04h 0x00000018 or cx, 2BA8h 0x0000001d jmp 00007F9F10525BFBh 0x00000022 popfd 0x00000023 push eax 0x00000024 push edx 0x00000025 jmp 00007F9F10525C06h 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 55805E9 second address: 558062A instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F9F112ED7A2h 0x00000008 sbb eax, 47E59938h 0x0000000e jmp 00007F9F112ED79Bh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 popad 0x00000017 push eax 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F9F112ED7A4h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 558062A second address: 5580630 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580630 second address: 558063F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 558063F second address: 5580645 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580645 second address: 5580696 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F9F112ED7A3h 0x00000008 pop eax 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 call 00007F9F112ED7A7h 0x00000015 pop esi 0x00000016 call 00007F9F112ED7A9h 0x0000001b pop ecx 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580696 second address: 55806CD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525BFEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F9F10525BFCh 0x00000013 sbb esi, 6656DD18h 0x00000019 jmp 00007F9F10525BFBh 0x0000001e popfd 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 55806CD second address: 55806D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 55806D2 second address: 55806FF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F9F10525C05h 0x00000008 mov ebx, ecx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e jmp 00007F9F10525BFAh 0x00000013 xchg eax, ebx 0x00000014 pushad 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580769 second address: 558077B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9F112ED79Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 558077B second address: 5570E9A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525BFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b test esi, esi 0x0000000d jmp 00007F9F10525C06h 0x00000012 je 00007F9F81BD3AA7h 0x00000018 xor eax, eax 0x0000001a jmp 00007F9F104FF32Ah 0x0000001f pop esi 0x00000020 pop edi 0x00000021 pop ebx 0x00000022 leave 0x00000023 retn 0004h 0x00000026 nop 0x00000027 sub esp, 04h 0x0000002a mov esi, eax 0x0000002c xor ebx, ebx 0x0000002e cmp esi, 00000000h 0x00000031 je 00007F9F10525D35h 0x00000037 call 00007F9F14E32AB5h 0x0000003c mov edi, edi 0x0000003e jmp 00007F9F10525C05h 0x00000043 xchg eax, ebp 0x00000044 pushad 0x00000045 mov ax, D2F3h 0x00000049 push eax 0x0000004a push edx 0x0000004b push eax 0x0000004c push edx 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5570E9A second address: 5570E9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5570E9E second address: 5570F15 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F10525C04h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b jmp 00007F9F10525BFBh 0x00000010 xchg eax, ebp 0x00000011 pushad 0x00000012 mov al, 3Dh 0x00000014 jmp 00007F9F10525C01h 0x00000019 popad 0x0000001a mov ebp, esp 0x0000001c pushad 0x0000001d mov dh, cl 0x0000001f mov si, di 0x00000022 popad 0x00000023 push ebp 0x00000024 pushad 0x00000025 movzx esi, bx 0x00000028 jmp 00007F9F10525C03h 0x0000002d popad 0x0000002e mov dword ptr [esp], ecx 0x00000031 push eax 0x00000032 push edx 0x00000033 jmp 00007F9F10525C05h 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5570F15 second address: 5570F1B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5570F1B second address: 5570F1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580BCD second address: 5580BD1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580BD1 second address: 5580BD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580BD7 second address: 5580BDD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580BDD second address: 5580BE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580BE1 second address: 5580C0F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F112ED79Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F9F112ED7A7h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580C0F second address: 5580C27 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9F10525C04h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580C27 second address: 5580C2B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580C2B second address: 5580CA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F9F10525BFEh 0x0000000e xchg eax, ebp 0x0000000f jmp 00007F9F10525C00h 0x00000014 mov ebp, esp 0x00000016 jmp 00007F9F10525C00h 0x0000001b cmp dword ptr [76C8459Ch], 05h 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 mov ax, dx 0x00000028 pushfd 0x00000029 jmp 00007F9F10525C09h 0x0000002e adc ch, 00000046h 0x00000031 jmp 00007F9F10525C01h 0x00000036 popfd 0x00000037 popad 0x00000038 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580D49 second address: 5580D90 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F9F112ED79Dh 0x00000008 sub eax, 6CB3D326h 0x0000000e jmp 00007F9F112ED7A1h 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 popad 0x00000017 push eax 0x00000018 jmp 00007F9F112ED7A1h 0x0000001d mov eax, dword ptr [esp+04h] 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 push eax 0x00000026 push edx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580D90 second address: 5580D94 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580D94 second address: 5580DAE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F112ED7A6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580DAE second address: 5580DEA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F9F10525BFDh 0x00000009 adc esi, 6AF3C496h 0x0000000f jmp 00007F9F10525C01h 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 mov eax, dword ptr [eax] 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F9F10525BFCh 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580DEA second address: 5580DF0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580DF0 second address: 5580DF4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580DF4 second address: 5580DF8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580DF8 second address: 5580E41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c pushad 0x0000000d call 00007F9F10525C06h 0x00000012 push eax 0x00000013 pop ebx 0x00000014 pop eax 0x00000015 jmp 00007F9F10525C07h 0x0000001a popad 0x0000001b pop eax 0x0000001c pushad 0x0000001d mov ax, 7ADBh 0x00000021 push eax 0x00000022 push edx 0x00000023 mov bx, cx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580E41 second address: 5580E87 instructions: 0x00000000 rdtsc 0x00000002 mov edi, esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 call 00007F9F829924C0h 0x0000000c push 76C22B70h 0x00000011 push dword ptr fs:[00000000h] 0x00000018 mov eax, dword ptr [esp+10h] 0x0000001c mov dword ptr [esp+10h], ebp 0x00000020 lea ebp, dword ptr [esp+10h] 0x00000024 sub esp, eax 0x00000026 push ebx 0x00000027 push esi 0x00000028 push edi 0x00000029 mov eax, dword ptr [76C84538h] 0x0000002e xor dword ptr [ebp-04h], eax 0x00000031 xor eax, ebp 0x00000033 push eax 0x00000034 mov dword ptr [ebp-18h], esp 0x00000037 push dword ptr [ebp-08h] 0x0000003a mov eax, dword ptr [ebp-04h] 0x0000003d mov dword ptr [ebp-04h], FFFFFFFEh 0x00000044 mov dword ptr [ebp-08h], eax 0x00000047 lea eax, dword ptr [ebp-10h] 0x0000004a mov dword ptr fs:[00000000h], eax 0x00000050 ret 0x00000051 push eax 0x00000052 push edx 0x00000053 pushad 0x00000054 pushfd 0x00000055 jmp 00007F9F112ED7A1h 0x0000005a jmp 00007F9F112ED79Bh 0x0000005f popfd 0x00000060 jmp 00007F9F112ED7A8h 0x00000065 popad 0x00000066 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580E87 second address: 5580E99 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9F10525BFEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580E99 second address: 5580E9D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580E9D second address: 5580EE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esi, 00000000h 0x0000000d pushad 0x0000000e pushfd 0x0000000f jmp 00007F9F10525BFAh 0x00000014 sub si, 1898h 0x00000019 jmp 00007F9F10525BFBh 0x0000001e popfd 0x0000001f push eax 0x00000020 push edx 0x00000021 call 00007F9F10525C06h 0x00000026 pop ecx 0x00000027 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580EE0 second address: 5580EFC instructions: 0x00000000 rdtsc 0x00000002 call 00007F9F112ED79Bh 0x00000007 pop ecx 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov dword ptr [ebp-1Ch], esi 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov ah, C6h 0x00000013 mov ecx, edi 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580EFC second address: 5580F02 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580F02 second address: 5580F06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5580F3A second address: 5580FA5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F9F10525BFFh 0x00000008 pop eax 0x00000009 mov dx, FF2Ch 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 test al, al 0x00000012 jmp 00007F9F10525BFBh 0x00000017 je 00007F9F81BB961Ah 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 push edi 0x00000021 pop eax 0x00000022 pushfd 0x00000023 jmp 00007F9F10525C07h 0x00000028 adc ecx, 7EEA738Eh 0x0000002e jmp 00007F9F10525C09h 0x00000033 popfd 0x00000034 popad 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5590B0A second address: 5590B0F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5590B0F second address: 5590B3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ebp 0x00000008 jmp 00007F9F10525BFAh 0x0000000d mov ebp, esp 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F9F10525C07h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5590B3C second address: 5590B54 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F9F112ED7A4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5590B54 second address: 5590B77 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F9F10525C06h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5590B77 second address: 5590B86 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F9F112ED79Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5590D2F second address: 5590D33 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | RDTSC instruction interceptor: First address: 5590D33 second address: 5590D39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpak | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cert9.db | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\formhistory.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\key4.db | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\logins.json | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\prefs.js | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifd | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcob | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqlite | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnf | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddfffla | Jump to behavior |
Source: C:\Users\user\Desktop\fer4JIJGeL.exe | File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg | Jump to behavior |