Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E51709 second address: E51711 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E56007 second address: E56041 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 pushad 0x00000007 jng 00007F4E0D52CE7Ch 0x0000000d pushad 0x0000000e jmp 00007F4E0D52CE89h 0x00000013 jmp 00007F4E0D52CE7Bh 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E56184 second address: E56189 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E56189 second address: E56191 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E56191 second address: E56195 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E56195 second address: E5619B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E5619B second address: E561C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jg 00007F4E0D1720D6h 0x0000000d jmp 00007F4E0D1720E5h 0x00000012 push eax 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E5632A second address: E56352 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE83h 0x00000007 jl 00007F4E0D52CE76h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 jne 00007F4E0D52CE76h 0x00000016 pushad 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E564AD second address: E564B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E5A27D second address: E5A2C0 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F4E0D52CE76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jmp 00007F4E0D52CE85h 0x00000010 nop 0x00000011 add cx, CEFCh 0x00000016 push 00000000h 0x00000018 mov dx, 2056h 0x0000001c push 03C8D88Bh 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 jmp 00007F4E0D52CE7Eh 0x00000029 pop eax 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E5A2C0 second address: E5A2C6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E5A2C6 second address: E5A30C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xor dword ptr [esp], 03C8D80Bh 0x0000000f mov dword ptr [ebp+122D243Ah], esi 0x00000015 push 00000003h 0x00000017 jmp 00007F4E0D52CE81h 0x0000001c push 00000000h 0x0000001e mov si, A133h 0x00000022 push 00000003h 0x00000024 jc 00007F4E0D52CE7Ch 0x0000002a mov edx, dword ptr [ebp+122D2D99h] 0x00000030 push 8EDE42BAh 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 push eax 0x00000039 push edx 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E5A30C second address: E5A310 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E5A310 second address: E5A373 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 xor dword ptr [esp], 4EDE42BAh 0x0000000e push 00000000h 0x00000010 push edi 0x00000011 call 00007F4E0D52CE78h 0x00000016 pop edi 0x00000017 mov dword ptr [esp+04h], edi 0x0000001b add dword ptr [esp+04h], 0000001Bh 0x00000023 inc edi 0x00000024 push edi 0x00000025 ret 0x00000026 pop edi 0x00000027 ret 0x00000028 mov dx, CA0Bh 0x0000002c add edi, 7FD2E400h 0x00000032 lea ebx, dword ptr [ebp+12450187h] 0x00000038 push ebx 0x00000039 push edx 0x0000003a jo 00007F4E0D52CE76h 0x00000040 pop edi 0x00000041 pop ecx 0x00000042 xchg eax, ebx 0x00000043 pushad 0x00000044 push ecx 0x00000045 jmp 00007F4E0D52CE81h 0x0000004a pop ecx 0x0000004b pushad 0x0000004c push eax 0x0000004d push edx 0x0000004e rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E5A402 second address: E5A419 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D1720E3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E5A419 second address: E5A4B5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c sbb cx, AEBCh 0x00000011 push 00000000h 0x00000013 clc 0x00000014 push 2D0CA1CFh 0x00000019 push esi 0x0000001a jne 00007F4E0D52CE78h 0x00000020 pop esi 0x00000021 xor dword ptr [esp], 2D0CA14Fh 0x00000028 mov edi, dword ptr [ebp+122D2ED9h] 0x0000002e push 00000003h 0x00000030 pushad 0x00000031 mov eax, dword ptr [ebp+122D2CB1h] 0x00000037 stc 0x00000038 popad 0x00000039 push 00000000h 0x0000003b mov ecx, 062DFAB4h 0x00000040 push 00000003h 0x00000042 jmp 00007F4E0D52CE87h 0x00000047 call 00007F4E0D52CE79h 0x0000004c jg 00007F4E0D52CE84h 0x00000052 push eax 0x00000053 push eax 0x00000054 push edx 0x00000055 jmp 00007F4E0D52CE7Dh 0x0000005a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E5A4B5 second address: E5A4DB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D1720DDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d jmp 00007F4E0D1720DBh 0x00000012 mov eax, dword ptr [eax] 0x00000014 push edi 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E5A584 second address: E5A5DC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE89h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c movzx esi, cx 0x0000000f mov dword ptr [ebp+122D1E37h], ecx 0x00000015 push 00000000h 0x00000017 mov ecx, dword ptr [ebp+122D2DB1h] 0x0000001d call 00007F4E0D52CE79h 0x00000022 jmp 00007F4E0D52CE7Fh 0x00000027 push eax 0x00000028 push eax 0x00000029 push edx 0x0000002a js 00007F4E0D52CE7Ch 0x00000030 je 00007F4E0D52CE76h 0x00000036 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E5A5DC second address: E5A5E7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 js 00007F4E0D1720D6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E5A5E7 second address: E5A5FA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push edi 0x0000000f pop edi 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E5A5FA second address: E5A629 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F4E0D1720D8h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e jmp 00007F4E0D1720E8h 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a push edi 0x0000001b pop edi 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E5A629 second address: E5A62D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E5A62D second address: E5A63B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007F4E0D1720DCh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E7A025 second address: E7A03E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F4E0D52CE81h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E7A03E second address: E7A048 instructions: 0x00000000 rdtsc 0x00000002 js 00007F4E0D1720DCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E782C3 second address: E782C9 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E7857F second address: E78583 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E78583 second address: E78587 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E78587 second address: E7858D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E786DC second address: E7870A instructions: 0x00000000 rdtsc 0x00000002 jng 00007F4E0D52CE78h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c js 00007F4E0D52CE82h 0x00000012 jno 00007F4E0D52CE7Eh 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E7870A second address: E78728 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F4E0D1720E5h 0x0000000a pop ebx 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E78D9E second address: E78DB5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jp 00007F4E0D52CE76h 0x00000009 jns 00007F4E0D52CE76h 0x0000000f jno 00007F4E0D52CE76h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E78EFA second address: E78F00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E7907B second address: E7908F instructions: 0x00000000 rdtsc 0x00000002 jo 00007F4E0D52CE76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F4E0D52CE7Ah 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E791FB second address: E791FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E791FF second address: E79216 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4E0D52CE81h 0x00000009 push edi 0x0000000a pop edi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E798C2 second address: E798CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E798CF second address: E79901 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE81h 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jo 00007F4E0D52CE76h 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 jg 00007F4E0D52CE78h 0x0000001b pushad 0x0000001c popad 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 popad 0x00000024 push edi 0x00000025 pop edi 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E79901 second address: E79913 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F4E0D1720D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jl 00007F4E0D1720D6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E79913 second address: E79919 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E79919 second address: E7993A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D1720E7h 0x00000007 push eax 0x00000008 push edx 0x00000009 jl 00007F4E0D1720D6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E7993A second address: E7993E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E79BBB second address: E79BBF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E79BBF second address: E79BCB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E79BCB second address: E79BD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E79BD1 second address: E79BD5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E79BD5 second address: E79BF2 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jmp 00007F4E0D1720E7h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E79BF2 second address: E79C0D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 jo 00007F4E0D52CE76h 0x0000000b popad 0x0000000c push eax 0x0000000d push esi 0x0000000e pop esi 0x0000000f pop eax 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 jl 00007F4E0D52CE76h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E7C2F9 second address: E7C2FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E7C2FD second address: E7C306 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E7EE3C second address: E7EE41 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E7F0B8 second address: E7F0BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E7F0BC second address: E7F121 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 push eax 0x00000008 jmp 00007F4E0D1720E3h 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 jmp 00007F4E0D1720DDh 0x00000016 mov eax, dword ptr [eax] 0x00000018 jmp 00007F4E0D1720E5h 0x0000001d mov dword ptr [esp+04h], eax 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 jnp 00007F4E0D1720D6h 0x0000002a jmp 00007F4E0D1720E4h 0x0000002f popad 0x00000030 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E7F293 second address: E7F299 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E85ADA second address: E85AE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E85AE0 second address: E85AE6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E863BB second address: E863D1 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F4E0D1720DCh 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8838B second address: E8839D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 js 00007F4E0D52CE76h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8839D second address: E883E2 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F4E0D1720D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jg 00007F4E0D1720D8h 0x00000010 popad 0x00000011 mov eax, dword ptr [esp+04h] 0x00000015 push eax 0x00000016 jmp 00007F4E0D1720E1h 0x0000001b pop eax 0x0000001c mov eax, dword ptr [eax] 0x0000001e pushad 0x0000001f pushad 0x00000020 pushad 0x00000021 popad 0x00000022 je 00007F4E0D1720D6h 0x00000028 popad 0x00000029 push edx 0x0000002a push eax 0x0000002b pop eax 0x0000002c pop edx 0x0000002d popad 0x0000002e mov dword ptr [esp+04h], eax 0x00000032 pushad 0x00000033 push eax 0x00000034 push edx 0x00000035 push edi 0x00000036 pop edi 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E883E2 second address: E88439 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE7Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F4E0D52CE7Ah 0x0000000e popad 0x0000000f pop eax 0x00000010 push 00000000h 0x00000012 push ebp 0x00000013 call 00007F4E0D52CE78h 0x00000018 pop ebp 0x00000019 mov dword ptr [esp+04h], ebp 0x0000001d add dword ptr [esp+04h], 00000019h 0x00000025 inc ebp 0x00000026 push ebp 0x00000027 ret 0x00000028 pop ebp 0x00000029 ret 0x0000002a add dword ptr [ebp+122D1CEAh], ecx 0x00000030 push 5569D289h 0x00000035 push eax 0x00000036 push edx 0x00000037 jmp 00007F4E0D52CE7Dh 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E889BC second address: E889C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E889C0 second address: E889C4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E88AA5 second address: E88AC2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D1720DFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 push edi 0x00000011 pop edi 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E89136 second address: E8913C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8913C second address: E89176 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 js 00007F4E0D1720D6h 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, ebx 0x0000000d push 00000000h 0x0000000f push eax 0x00000010 call 00007F4E0D1720D8h 0x00000015 pop eax 0x00000016 mov dword ptr [esp+04h], eax 0x0000001a add dword ptr [esp+04h], 00000017h 0x00000022 inc eax 0x00000023 push eax 0x00000024 ret 0x00000025 pop eax 0x00000026 ret 0x00000027 mov esi, dword ptr [ebp+122D2E25h] 0x0000002d push eax 0x0000002e push eax 0x0000002f push edx 0x00000030 pushad 0x00000031 pushad 0x00000032 popad 0x00000033 push eax 0x00000034 push edx 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E89176 second address: E8917B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8917B second address: E89181 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E89181 second address: E89185 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E894B3 second address: E894B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E894B7 second address: E894BD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E894BD second address: E894C3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8A53C second address: E8A557 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4E0D52CE87h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8A557 second address: E8A55B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8BE26 second address: E8BE34 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F4E0D52CE76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8BE34 second address: E8BE38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8DB67 second address: E8DB6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8DB6C second address: E8DB8B instructions: 0x00000000 rdtsc 0x00000002 je 00007F4E0D1720E7h 0x00000008 jmp 00007F4E0D1720DFh 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push esi 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8DB8B second address: E8DB91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8DB91 second address: E8DB99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8DB99 second address: E8DBA8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 jnl 00007F4E0D52CE76h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8E1FC second address: E8E200 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8EE9E second address: E8EEBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4E0D52CE87h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8EB83 second address: E8EB87 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8EEBA second address: E8EED0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pushad 0x0000000e popad 0x0000000f pop ecx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8F847 second address: E8F84C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8F84C second address: E8F852 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8F852 second address: E8F894 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push eax 0x0000000d call 00007F4E0D1720D8h 0x00000012 pop eax 0x00000013 mov dword ptr [esp+04h], eax 0x00000017 add dword ptr [esp+04h], 0000001Bh 0x0000001f inc eax 0x00000020 push eax 0x00000021 ret 0x00000022 pop eax 0x00000023 ret 0x00000024 push 00000000h 0x00000026 xor dword ptr [ebp+1244DF6Bh], edi 0x0000002c push 00000000h 0x0000002e mov dword ptr [ebp+124492DEh], edi 0x00000034 xchg eax, ebx 0x00000035 pushad 0x00000036 pushad 0x00000037 push eax 0x00000038 push edx 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8F894 second address: E8F8A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F4E0D52CE76h 0x0000000a popad 0x0000000b jo 00007F4E0D52CE7Ch 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E900C7 second address: E900CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E91D4C second address: E91D60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4E0D52CE80h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E90B18 second address: E90B26 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jbe 00007F4E0D1720D6h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E91D60 second address: E91D88 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE80h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jnl 00007F4E0D52CE76h 0x00000010 jl 00007F4E0D52CE76h 0x00000016 push edi 0x00000017 pop edi 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E90B26 second address: E90B2A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E91D88 second address: E91DBB instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F4E0D52CE76h 0x00000008 jc 00007F4E0D52CE76h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 ja 00007F4E0D52CE7Ah 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 jnp 00007F4E0D52CE82h 0x0000001f jnl 00007F4E0D52CE76h 0x00000025 ja 00007F4E0D52CE76h 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e push edx 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E90B2A second address: E90B4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b jmp 00007F4E0D1720E9h 0x00000010 pop ebx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E91DBB second address: E91DBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E91DBF second address: E91DD9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D1720E6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E91DD9 second address: E91DE5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F4E0D52CE76h 0x0000000a push eax 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E939DC second address: E93A29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 popad 0x00000006 nop 0x00000007 sub dword ptr [ebp+122D275Eh], edi 0x0000000d push 00000000h 0x0000000f push 00000000h 0x00000011 push ebx 0x00000012 call 00007F4E0D1720D8h 0x00000017 pop ebx 0x00000018 mov dword ptr [esp+04h], ebx 0x0000001c add dword ptr [esp+04h], 00000014h 0x00000024 inc ebx 0x00000025 push ebx 0x00000026 ret 0x00000027 pop ebx 0x00000028 ret 0x00000029 jc 00007F4E0D1720DFh 0x0000002f pushad 0x00000030 jnl 00007F4E0D1720D6h 0x00000036 stc 0x00000037 popad 0x00000038 mov edi, ebx 0x0000003a push 00000000h 0x0000003c mov ebx, dword ptr [ebp+122D23C7h] 0x00000042 mov di, E1E2h 0x00000046 push eax 0x00000047 pushad 0x00000048 push edx 0x00000049 push eax 0x0000004a push edx 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E949D3 second address: E94A43 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F4E0D52CE76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov dword ptr [esp], eax 0x0000000e push 00000000h 0x00000010 push esi 0x00000011 call 00007F4E0D52CE78h 0x00000016 pop esi 0x00000017 mov dword ptr [esp+04h], esi 0x0000001b add dword ptr [esp+04h], 00000017h 0x00000023 inc esi 0x00000024 push esi 0x00000025 ret 0x00000026 pop esi 0x00000027 ret 0x00000028 push edx 0x00000029 mov di, cx 0x0000002c pop edi 0x0000002d push 00000000h 0x0000002f push 00000000h 0x00000031 push eax 0x00000032 call 00007F4E0D52CE78h 0x00000037 pop eax 0x00000038 mov dword ptr [esp+04h], eax 0x0000003c add dword ptr [esp+04h], 00000016h 0x00000044 inc eax 0x00000045 push eax 0x00000046 ret 0x00000047 pop eax 0x00000048 ret 0x00000049 push 00000000h 0x0000004b mov ebx, dword ptr [ebp+122D2C41h] 0x00000051 push eax 0x00000052 jp 00007F4E0D52CE8Fh 0x00000058 push eax 0x00000059 push edx 0x0000005a jmp 00007F4E0D52CE7Dh 0x0000005f rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E94A43 second address: E94A47 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9719F second address: E971A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E94B7A second address: E94C4E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D1720DAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push esi 0x0000000b jmp 00007F4E0D1720DBh 0x00000010 pop esi 0x00000011 nop 0x00000012 cld 0x00000013 push dword ptr fs:[00000000h] 0x0000001a push 00000000h 0x0000001c push edi 0x0000001d call 00007F4E0D1720D8h 0x00000022 pop edi 0x00000023 mov dword ptr [esp+04h], edi 0x00000027 add dword ptr [esp+04h], 00000019h 0x0000002f inc edi 0x00000030 push edi 0x00000031 ret 0x00000032 pop edi 0x00000033 ret 0x00000034 mov ebx, 273E7954h 0x00000039 mov dword ptr fs:[00000000h], esp 0x00000040 mov dword ptr [ebp+122D232Ch], esi 0x00000046 mov eax, dword ptr [ebp+122D07CDh] 0x0000004c push 00000000h 0x0000004e push ecx 0x0000004f call 00007F4E0D1720D8h 0x00000054 pop ecx 0x00000055 mov dword ptr [esp+04h], ecx 0x00000059 add dword ptr [esp+04h], 0000001Dh 0x00000061 inc ecx 0x00000062 push ecx 0x00000063 ret 0x00000064 pop ecx 0x00000065 ret 0x00000066 mov dword ptr [ebp+122D3C58h], esi 0x0000006c movsx ebx, cx 0x0000006f push FFFFFFFFh 0x00000071 call 00007F4E0D1720E1h 0x00000076 sub edi, 20F0C22Dh 0x0000007c pop ebx 0x0000007d nop 0x0000007e jmp 00007F4E0D1720E1h 0x00000083 push eax 0x00000084 push eax 0x00000085 push edx 0x00000086 jnp 00007F4E0D1720E9h 0x0000008c rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E94C4E second address: E94C54 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E98247 second address: E9824B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E973D1 second address: E973D7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9839D second address: E983A4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9A146 second address: E9A188 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F4E0D52CE8Ah 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c jmp 00007F4E0D52CE84h 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F4E0D52CE7Ch 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9C2DA second address: E9C2E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 jc 00007F4E0D1720D6h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9C2E8 second address: E9C377 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push ebx 0x0000000c call 00007F4E0D52CE78h 0x00000011 pop ebx 0x00000012 mov dword ptr [esp+04h], ebx 0x00000016 add dword ptr [esp+04h], 00000016h 0x0000001e inc ebx 0x0000001f push ebx 0x00000020 ret 0x00000021 pop ebx 0x00000022 ret 0x00000023 or dword ptr [ebp+122D1FACh], eax 0x00000029 push 00000000h 0x0000002b add ebx, 31E7B316h 0x00000031 push 00000000h 0x00000033 mov dword ptr [ebp+1245E33Eh], ecx 0x00000039 call 00007F4E0D52CE89h 0x0000003e pushad 0x0000003f mov dword ptr [ebp+122D3B3Ah], ebx 0x00000045 call 00007F4E0D52CE87h 0x0000004a pop ecx 0x0000004b popad 0x0000004c pop edi 0x0000004d push eax 0x0000004e pushad 0x0000004f push eax 0x00000050 push edx 0x00000051 jmp 00007F4E0D52CE84h 0x00000056 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9B649 second address: E9B653 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007F4E0D1720D6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9D2EA second address: E9D2F0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9D2F0 second address: E9D2F7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9C4BA second address: E9C4C0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9C4C0 second address: E9C4C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9C4C5 second address: E9C4DF instructions: 0x00000000 rdtsc 0x00000002 jg 00007F4E0D52CE7Ch 0x00000008 jc 00007F4E0D52CE76h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 pushad 0x00000012 jnl 00007F4E0D52CE7Ch 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9E384 second address: E9E38A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9E38A second address: E9E38E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9E38E second address: E9E392 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9E392 second address: E9E3A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9E3A0 second address: E9E3A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9E3A4 second address: E9E422 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE7Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebx 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push esi 0x0000000e call 00007F4E0D52CE78h 0x00000013 pop esi 0x00000014 mov dword ptr [esp+04h], esi 0x00000018 add dword ptr [esp+04h], 00000017h 0x00000020 inc esi 0x00000021 push esi 0x00000022 ret 0x00000023 pop esi 0x00000024 ret 0x00000025 mov edi, 5B31703Eh 0x0000002a push 00000000h 0x0000002c push 00000000h 0x0000002e push esi 0x0000002f call 00007F4E0D52CE78h 0x00000034 pop esi 0x00000035 mov dword ptr [esp+04h], esi 0x00000039 add dword ptr [esp+04h], 00000014h 0x00000041 inc esi 0x00000042 push esi 0x00000043 ret 0x00000044 pop esi 0x00000045 ret 0x00000046 mov bl, ch 0x00000048 push 00000000h 0x0000004a mov bx, 3CE9h 0x0000004e xchg eax, esi 0x0000004f jmp 00007F4E0D52CE87h 0x00000054 push eax 0x00000055 push eax 0x00000056 push edx 0x00000057 push eax 0x00000058 push edx 0x00000059 jl 00007F4E0D52CE76h 0x0000005f rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9E422 second address: E9E428 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9E428 second address: E9E432 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F4E0D52CE76h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EA0476 second address: EA047C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EA255C second address: EA25DF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jo 00007F4E0D52CE76h 0x00000009 jmp 00007F4E0D52CE81h 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 pushad 0x00000013 push eax 0x00000014 jne 00007F4E0D52CE76h 0x0000001a pop eax 0x0000001b jmp 00007F4E0D52CE85h 0x00000020 popad 0x00000021 nop 0x00000022 push 00000000h 0x00000024 xor di, 9CD8h 0x00000029 push 00000000h 0x0000002b push 00000000h 0x0000002d push ebx 0x0000002e call 00007F4E0D52CE78h 0x00000033 pop ebx 0x00000034 mov dword ptr [esp+04h], ebx 0x00000038 add dword ptr [esp+04h], 00000019h 0x00000040 inc ebx 0x00000041 push ebx 0x00000042 ret 0x00000043 pop ebx 0x00000044 ret 0x00000045 or ebx, 37775AA7h 0x0000004b xchg eax, esi 0x0000004c push eax 0x0000004d push edx 0x0000004e pushad 0x0000004f jmp 00007F4E0D52CE7Fh 0x00000054 push eax 0x00000055 push edx 0x00000056 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EA25DF second address: EA25E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9E552 second address: E9E557 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9E557 second address: E9E578 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D1720E2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c js 00007F4E0D1720DCh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9E578 second address: E9E57C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9F5DD second address: E9F5F3 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F4E0D1720D8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e jl 00007F4E0D1720DCh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9E57C second address: E9E60D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b jmp 00007F4E0D52CE84h 0x00000010 push dword ptr fs:[00000000h] 0x00000017 add edi, dword ptr [ebp+122D2E05h] 0x0000001d mov dword ptr fs:[00000000h], esp 0x00000024 push 00000000h 0x00000026 push edi 0x00000027 call 00007F4E0D52CE78h 0x0000002c pop edi 0x0000002d mov dword ptr [esp+04h], edi 0x00000031 add dword ptr [esp+04h], 0000001Bh 0x00000039 inc edi 0x0000003a push edi 0x0000003b ret 0x0000003c pop edi 0x0000003d ret 0x0000003e or ebx, 0F782E53h 0x00000044 mov eax, dword ptr [ebp+122D0FC1h] 0x0000004a mov ebx, edi 0x0000004c push FFFFFFFFh 0x0000004e pushad 0x0000004f xor dword ptr [ebp+122D2223h], eax 0x00000055 mov dword ptr [ebp+122DB698h], esi 0x0000005b popad 0x0000005c push eax 0x0000005d push eax 0x0000005e push edx 0x0000005f push esi 0x00000060 jmp 00007F4E0D52CE88h 0x00000065 pop esi 0x00000066 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EA34C7 second address: EA34D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9F5F3 second address: E9F663 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F4E0D52CE78h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d nop 0x0000000e mov dword ptr [ebp+122D229Dh], edi 0x00000014 push dword ptr fs:[00000000h] 0x0000001b push 00000000h 0x0000001d push ecx 0x0000001e call 00007F4E0D52CE78h 0x00000023 pop ecx 0x00000024 mov dword ptr [esp+04h], ecx 0x00000028 add dword ptr [esp+04h], 00000015h 0x00000030 inc ecx 0x00000031 push ecx 0x00000032 ret 0x00000033 pop ecx 0x00000034 ret 0x00000035 sub edi, dword ptr [ebp+122D2A1Ah] 0x0000003b mov dword ptr [ebp+122D2218h], esi 0x00000041 mov dword ptr fs:[00000000h], esp 0x00000048 mov ebx, dword ptr [ebp+122D2DE5h] 0x0000004e mov eax, dword ptr [ebp+122D0A59h] 0x00000054 mov dword ptr [ebp+122D238Bh], ecx 0x0000005a mov bx, 028Ah 0x0000005e push FFFFFFFFh 0x00000060 and edi, dword ptr [ebp+122D2BE1h] 0x00000066 push eax 0x00000067 push eax 0x00000068 push edx 0x00000069 push ebx 0x0000006a push edx 0x0000006b pop edx 0x0000006c pop ebx 0x0000006d rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E9E60D second address: E9E617 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F4E0D1720DCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EA34D3 second address: EA34D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EA34D8 second address: EA34DD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EA1822 second address: EA1827 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EA34DD second address: EA3536 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F4E0D1720D6h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e push 00000000h 0x00000010 push eax 0x00000011 call 00007F4E0D1720D8h 0x00000016 pop eax 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b add dword ptr [esp+04h], 0000001Ch 0x00000023 inc eax 0x00000024 push eax 0x00000025 ret 0x00000026 pop eax 0x00000027 ret 0x00000028 mov edi, dword ptr [ebp+122D2DD9h] 0x0000002e movsx edi, di 0x00000031 push 00000000h 0x00000033 mov ebx, edx 0x00000035 push 00000000h 0x00000037 mov di, B112h 0x0000003b xchg eax, esi 0x0000003c push eax 0x0000003d push edx 0x0000003e push eax 0x0000003f push edx 0x00000040 jmp 00007F4E0D1720DFh 0x00000045 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EA3536 second address: EA353C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EA4524 second address: EA4528 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EA4528 second address: EA452C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EA3652 second address: EA36DF instructions: 0x00000000 rdtsc 0x00000002 jne 00007F4E0D1720DCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d mov edi, esi 0x0000000f push dword ptr fs:[00000000h] 0x00000016 push 00000000h 0x00000018 push ecx 0x00000019 call 00007F4E0D1720D8h 0x0000001e pop ecx 0x0000001f mov dword ptr [esp+04h], ecx 0x00000023 add dword ptr [esp+04h], 0000001Ch 0x0000002b inc ecx 0x0000002c push ecx 0x0000002d ret 0x0000002e pop ecx 0x0000002f ret 0x00000030 mov edi, dword ptr [ebp+122D2B9Dh] 0x00000036 mov dword ptr [ebp+122D34D2h], edi 0x0000003c mov dword ptr fs:[00000000h], esp 0x00000043 push ebx 0x00000044 mov dword ptr [ebp+122D2B47h], ecx 0x0000004a pop edi 0x0000004b mov eax, dword ptr [ebp+122D0679h] 0x00000051 push 00000000h 0x00000053 push eax 0x00000054 call 00007F4E0D1720D8h 0x00000059 pop eax 0x0000005a mov dword ptr [esp+04h], eax 0x0000005e add dword ptr [esp+04h], 00000016h 0x00000066 inc eax 0x00000067 push eax 0x00000068 ret 0x00000069 pop eax 0x0000006a ret 0x0000006b mov ebx, dword ptr [ebp+122D2E65h] 0x00000071 push FFFFFFFFh 0x00000073 stc 0x00000074 nop 0x00000075 push edx 0x00000076 push eax 0x00000077 push eax 0x00000078 push edx 0x00000079 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EA93B9 second address: EA93D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F4E0D52CE76h 0x0000000a push edi 0x0000000b pop edi 0x0000000c jo 00007F4E0D52CE76h 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 jg 00007F4E0D52CE76h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8AD4A second address: E8AD4E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EBD387 second address: EBD3A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 jmp 00007F4E0D52CE7Ah 0x0000000b mov eax, dword ptr [esp+04h] 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push edi 0x00000013 pop edi 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EBD3A0 second address: EBD3C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 mov eax, dword ptr [eax] 0x00000009 push edi 0x0000000a jno 00007F4E0D1720DCh 0x00000010 pop edi 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F4E0D1720DAh 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EBD3C7 second address: EBD3D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007F4E0D52CE76h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC119F second address: EC11A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC11A3 second address: EC11AD instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC11AD second address: EC11B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F4E0D1720D6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC11B7 second address: EC11BB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC11BB second address: EC11C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC11C1 second address: EC11CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC11CA second address: EC11E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F4E0D1720E0h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC11E3 second address: EC11FC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE85h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC50C3 second address: EC50DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4E0D1720DDh 0x00000009 push esi 0x0000000a pop esi 0x0000000b popad 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC50DA second address: EC50F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4E0D52CE82h 0x00000009 pop edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC50F1 second address: EC50F6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC50F6 second address: EC50FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC50FE second address: EC5106 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC56B8 second address: EC56C2 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F4E0D52CE82h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC56C2 second address: EC56D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F4E0D1720D6h 0x0000000a push eax 0x0000000b push edx 0x0000000c jnp 00007F4E0D1720D6h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC56D6 second address: EC56DA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC57FC second address: EC5800 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC5963 second address: EC598F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE85h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e jne 00007F4E0D52CE76h 0x00000014 jnp 00007F4E0D52CE76h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC598F second address: EC5998 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 push esi 0x00000007 pop esi 0x00000008 pop ecx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EC60A4 second address: EC60AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ECA9D6 second address: ECA9F3 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jbe 00007F4E0D1720D6h 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jp 00007F4E0D1720D8h 0x00000013 pushad 0x00000014 popad 0x00000015 jo 00007F4E0D1720DCh 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ECAB30 second address: ECAB36 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ECAB36 second address: ECAB3B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ECAB3B second address: ECAB41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ECAB41 second address: ECAB52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F4E0D1720D6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f push edx 0x00000010 pop edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ECAB52 second address: ECAB56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ECAB56 second address: ECAB68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jo 00007F4E0D1720E8h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ECAB68 second address: ECAB6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ECAB6C second address: ECAB70 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ECAC99 second address: ECACEE instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F4E0D52CE76h 0x00000008 jmp 00007F4E0D52CE84h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jmp 00007F4E0D52CE82h 0x00000014 popad 0x00000015 jne 00007F4E0D52CEA9h 0x0000001b pushad 0x0000001c push eax 0x0000001d pop eax 0x0000001e jmp 00007F4E0D52CE89h 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ECACEE second address: ECACF7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ECACF7 second address: ECACFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ECB0AC second address: ECB0CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4E0D1720E4h 0x00000009 jnp 00007F4E0D1720D6h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ECB0CA second address: ECB0CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ECA6DF second address: ECA6E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ECB3B8 second address: ECB3E6 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 jmp 00007F4E0D52CE7Fh 0x0000000e jmp 00007F4E0D52CE85h 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ECB3E6 second address: ECB42C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jl 00007F4E0D1720D6h 0x00000009 jmp 00007F4E0D1720E1h 0x0000000e popad 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 jmp 00007F4E0D1720E9h 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d pushad 0x0000001e popad 0x0000001f jng 00007F4E0D1720D6h 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ED2173 second address: ED217E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ED6878 second address: ED687C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ED687C second address: ED6882 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ED6882 second address: ED6888 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E86D72 second address: E86DED instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE7Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push esi 0x0000000b jmp 00007F4E0D52CE7Ah 0x00000010 pop esi 0x00000011 nop 0x00000012 push 00000000h 0x00000014 push ebp 0x00000015 call 00007F4E0D52CE78h 0x0000001a pop ebp 0x0000001b mov dword ptr [esp+04h], ebp 0x0000001f add dword ptr [esp+04h], 0000001Ch 0x00000027 inc ebp 0x00000028 push ebp 0x00000029 ret 0x0000002a pop ebp 0x0000002b ret 0x0000002c xor ecx, dword ptr [ebp+122D2429h] 0x00000032 lea eax, dword ptr [ebp+1247CB50h] 0x00000038 push 00000000h 0x0000003a push eax 0x0000003b call 00007F4E0D52CE78h 0x00000040 pop eax 0x00000041 mov dword ptr [esp+04h], eax 0x00000045 add dword ptr [esp+04h], 00000019h 0x0000004d inc eax 0x0000004e push eax 0x0000004f ret 0x00000050 pop eax 0x00000051 ret 0x00000052 mov dx, si 0x00000055 push eax 0x00000056 push eax 0x00000057 push edx 0x00000058 push esi 0x00000059 jne 00007F4E0D52CE76h 0x0000005f pop esi 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E87406 second address: E87427 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 add dword ptr [esp], 655C3D00h 0x0000000d mov edi, dword ptr [ebp+122D2B69h] 0x00000013 push B042172Ah 0x00000018 push esi 0x00000019 push eax 0x0000001a push edx 0x0000001b jnp 00007F4E0D1720D6h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E87541 second address: E87559 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8784A second address: E878D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pushad 0x00000006 jmp 00007F4E0D1720E5h 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e popad 0x0000000f push eax 0x00000010 jmp 00007F4E0D1720E5h 0x00000015 nop 0x00000016 push 00000000h 0x00000018 push esi 0x00000019 call 00007F4E0D1720D8h 0x0000001e pop esi 0x0000001f mov dword ptr [esp+04h], esi 0x00000023 add dword ptr [esp+04h], 00000018h 0x0000002b inc esi 0x0000002c push esi 0x0000002d ret 0x0000002e pop esi 0x0000002f ret 0x00000030 sbb ecx, 64171FC5h 0x00000036 push 00000004h 0x00000038 push 00000000h 0x0000003a push edx 0x0000003b call 00007F4E0D1720D8h 0x00000040 pop edx 0x00000041 mov dword ptr [esp+04h], edx 0x00000045 add dword ptr [esp+04h], 00000017h 0x0000004d inc edx 0x0000004e push edx 0x0000004f ret 0x00000050 pop edx 0x00000051 ret 0x00000052 jl 00007F4E0D1720DCh 0x00000058 mov dword ptr [ebp+122D24D3h], eax 0x0000005e push eax 0x0000005f push eax 0x00000060 push esi 0x00000061 push eax 0x00000062 push edx 0x00000063 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E87E55 second address: E87E6A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE81h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E87F4E second address: E87FEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F4E0D1720E5h 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e popad 0x0000000f nop 0x00000010 push 00000000h 0x00000012 push ebp 0x00000013 call 00007F4E0D1720D8h 0x00000018 pop ebp 0x00000019 mov dword ptr [esp+04h], ebp 0x0000001d add dword ptr [esp+04h], 0000001Ah 0x00000025 inc ebp 0x00000026 push ebp 0x00000027 ret 0x00000028 pop ebp 0x00000029 ret 0x0000002a mov ecx, 401A83B5h 0x0000002f lea eax, dword ptr [ebp+1247CB94h] 0x00000035 push 00000000h 0x00000037 push esi 0x00000038 call 00007F4E0D1720D8h 0x0000003d pop esi 0x0000003e mov dword ptr [esp+04h], esi 0x00000042 add dword ptr [esp+04h], 0000001Dh 0x0000004a inc esi 0x0000004b push esi 0x0000004c ret 0x0000004d pop esi 0x0000004e ret 0x0000004f jo 00007F4E0D1720EDh 0x00000055 ja 00007F4E0D1720E7h 0x0000005b nop 0x0000005c push eax 0x0000005d push edx 0x0000005e jmp 00007F4E0D1720DFh 0x00000063 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E87FEF second address: E8803B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE7Dh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jng 00007F4E0D52CE82h 0x00000010 jmp 00007F4E0D52CE7Ch 0x00000015 nop 0x00000016 mov edx, dword ptr [ebp+122D2262h] 0x0000001c lea eax, dword ptr [ebp+1247CB50h] 0x00000022 sub edx, 66DE15BDh 0x00000028 mov ecx, dword ptr [ebp+122D2D89h] 0x0000002e nop 0x0000002f pushad 0x00000030 push eax 0x00000031 push edx 0x00000032 jmp 00007F4E0D52CE7Bh 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E8803B second address: E8803F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ED5B38 second address: ED5B45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jns 00007F4E0D52CE76h 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ED5B45 second address: ED5B4A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ED5B4A second address: ED5B53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ED5B53 second address: ED5B59 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ED5E2E second address: ED5E34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ED5E34 second address: ED5E39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ED5E39 second address: ED5E45 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ED5E45 second address: ED5E79 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D1720E3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jne 00007F4E0D1720D6h 0x00000014 jo 00007F4E0D1720D6h 0x0000001a jmp 00007F4E0D1720DBh 0x0000001f popad 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: ED6297 second address: ED62D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F4E0D52CE76h 0x0000000a popad 0x0000000b popad 0x0000000c pushad 0x0000000d push edi 0x0000000e jc 00007F4E0D52CE76h 0x00000014 jmp 00007F4E0D52CE82h 0x00000019 pop edi 0x0000001a jng 00007F4E0D52CE82h 0x00000020 jnp 00007F4E0D52CE76h 0x00000026 jnc 00007F4E0D52CE76h 0x0000002c pushad 0x0000002d push ebx 0x0000002e pop ebx 0x0000002f push ebx 0x00000030 pop ebx 0x00000031 push eax 0x00000032 push edx 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EDDA7E second address: EDDA82 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EDDA82 second address: EDDA88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EDDA88 second address: EDDA96 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 jng 00007F4E0D1720DCh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EDC894 second address: EDC898 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EDC898 second address: EDC8BF instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 jmp 00007F4E0D1720E9h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f pop eax 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EDC8BF second address: EDC8DC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jl 00007F4E0D52CE76h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jl 00007F4E0D52CE86h 0x00000014 push eax 0x00000015 pushad 0x00000016 popad 0x00000017 push eax 0x00000018 pop eax 0x00000019 pop eax 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EDCD2A second address: EDCD42 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F4E0D1720D6h 0x00000008 jp 00007F4E0D1720D6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 je 00007F4E0D1720DEh 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EDCEB1 second address: EDCED9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push eax 0x00000009 pushad 0x0000000a popad 0x0000000b pop eax 0x0000000c pushad 0x0000000d push eax 0x0000000e pop eax 0x0000000f jmp 00007F4E0D52CE87h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EDD060 second address: EDD07A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4E0D1720E4h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EDD07A second address: EDD092 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F4E0D52CE7Ah 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EDD092 second address: EDD0AF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D1720E5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EDD0AF second address: EDD0B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EDD0B3 second address: EDD0B9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EDD0B9 second address: EDD0BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EDD0BF second address: EDD0C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EDD379 second address: EDD37D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EDD37D second address: EDD38F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 jno 00007F4E0D1720D6h 0x0000000f push edi 0x00000010 pop edi 0x00000011 pop ebx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EDD91D second address: EDD925 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EE0F21 second address: EE0F32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007F4E0D1720DCh 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EE0F32 second address: EE0F46 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE7Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push ecx 0x0000000a pushad 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EE0AA1 second address: EE0AA5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EE0AA5 second address: EE0ABD instructions: 0x00000000 rdtsc 0x00000002 jo 00007F4E0D52CE76h 0x00000008 jmp 00007F4E0D52CE7Ah 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EE0ABD second address: EE0AC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EE0AC1 second address: EE0AC5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EE0C73 second address: EE0C77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EE0C77 second address: EE0C7B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EE0C7B second address: EE0C81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EE2FCB second address: EE2FCF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EE2FCF second address: EE2FD9 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F4E0D1720D6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EE2FD9 second address: EE3001 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F4E0D52CE81h 0x0000000b je 00007F4E0D52CE7Ch 0x00000011 jg 00007F4E0D52CE76h 0x00000017 popad 0x00000018 push edx 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E4AC38 second address: E4AC3D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E4AC3D second address: E4AC5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4E0D52CE89h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E4AC5C second address: E4AC6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F4E0D1720D6h 0x0000000a popad 0x0000000b js 00007F4E0D1720DCh 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EE8897 second address: EE88B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F4E0D52CE83h 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EE8A2D second address: EE8A35 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EE8A35 second address: EE8A57 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE88h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E87A71 second address: E87AB5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F4E0D1720D6h 0x0000000a popad 0x0000000b popad 0x0000000c mov dword ptr [esp], eax 0x0000000f mov edx, dword ptr [ebp+122D1DB2h] 0x00000015 mov ebx, dword ptr [ebp+1247CB8Fh] 0x0000001b push 00000000h 0x0000001d push ebp 0x0000001e call 00007F4E0D1720D8h 0x00000023 pop ebp 0x00000024 mov dword ptr [esp+04h], ebp 0x00000028 add dword ptr [esp+04h], 00000014h 0x00000030 inc ebp 0x00000031 push ebp 0x00000032 ret 0x00000033 pop ebp 0x00000034 ret 0x00000035 add eax, ebx 0x00000037 mov ecx, 1488F0C7h 0x0000003c push eax 0x0000003d push ebx 0x0000003e push eax 0x0000003f push edx 0x00000040 pushad 0x00000041 popad 0x00000042 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E87AB5 second address: E87B0A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push ebx 0x0000000d call 00007F4E0D52CE78h 0x00000012 pop ebx 0x00000013 mov dword ptr [esp+04h], ebx 0x00000017 add dword ptr [esp+04h], 00000019h 0x0000001f inc ebx 0x00000020 push ebx 0x00000021 ret 0x00000022 pop ebx 0x00000023 ret 0x00000024 push esi 0x00000025 sub dword ptr [ebp+122D1D8Fh], edx 0x0000002b pop edx 0x0000002c jmp 00007F4E0D52CE84h 0x00000031 push 00000004h 0x00000033 sub dword ptr [ebp+122D1D8Fh], ebx 0x00000039 push eax 0x0000003a pushad 0x0000003b push eax 0x0000003c push edx 0x0000003d pushad 0x0000003e popad 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: E87B0A second address: E87B0E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EE9239 second address: EE925B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE7Ah 0x00000007 push edx 0x00000008 pop edx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jo 00007F4E0D52CE7Eh 0x00000011 jns 00007F4E0D52CE76h 0x00000017 pushad 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EE925B second address: EE925F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EED5A7 second address: EED5DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4E0D52CE84h 0x00000009 popad 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007F4E0D52CE88h 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EED5DE second address: EED5E4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EED5E4 second address: EED5F2 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EED864 second address: EED86B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EED86B second address: EED871 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EED871 second address: EED877 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EED877 second address: EED87B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EED87B second address: EED88F instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F4E0D1720D6h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jc 00007F4E0D1720D6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EEDB94 second address: EEDB98 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EEDB98 second address: EEDB9C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF102D second address: EF1033 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF0738 second address: EF073E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF0D81 second address: EF0D8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push esi 0x0000000a pop esi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF953E second address: EF9553 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4E0D1720E1h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF7636 second address: EF763A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF7912 second address: EF7918 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF7918 second address: EF7927 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop esi 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF7927 second address: EF792B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF792B second address: EF7964 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F4E0D52CE76h 0x00000008 jl 00007F4E0D52CE76h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jmp 00007F4E0D52CE85h 0x00000015 push eax 0x00000016 push edx 0x00000017 jns 00007F4E0D52CE76h 0x0000001d jmp 00007F4E0D52CE7Ch 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF7C07 second address: EF7C0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF7C0B second address: EF7C11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF7C11 second address: EF7C1F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 jc 00007F4E0D1720D6h 0x0000000d pop ecx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF8175 second address: EF8185 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F4E0D52CE76h 0x00000008 jo 00007F4E0D52CE76h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF8185 second address: EF818B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF818B second address: EF8191 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF8191 second address: EF8195 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF846C second address: EF8499 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE83h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F4E0D52CE82h 0x00000010 push ebx 0x00000011 pop ebx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF8499 second address: EF849D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF8A40 second address: EF8A4A instructions: 0x00000000 rdtsc 0x00000002 jl 00007F4E0D52CE7Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF8A4A second address: EF8A7E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 jmp 00007F4E0D1720E4h 0x0000000a push esi 0x0000000b pop esi 0x0000000c pop esi 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jg 00007F4E0D1720DEh 0x00000017 push eax 0x00000018 push edx 0x00000019 push ebx 0x0000001a pop ebx 0x0000001b push edx 0x0000001c pop edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF8A7E second address: EF8A82 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF8A82 second address: EF8A97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4E0D1720DFh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF8A97 second address: EF8A9E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF8D60 second address: EF8D64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF8D64 second address: EF8D68 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF8D68 second address: EF8D6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EF8D6E second address: EF8D7E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push edx 0x00000004 pop edx 0x00000005 pop edx 0x00000006 jp 00007F4E0D52CE7Eh 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: EFEC7A second address: EFEC90 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F4E0D1720DDh 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F020E4 second address: F02113 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jbe 00007F4E0D52CE76h 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F4E0D52CE7Fh 0x00000015 jmp 00007F4E0D52CE80h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F026B2 second address: F026C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F4E0D1720D6h 0x0000000a pop esi 0x0000000b push eax 0x0000000c push edx 0x0000000d jo 00007F4E0D1720D6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F026C7 second address: F026CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F026CB second address: F026CF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F026CF second address: F026E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F4E0D52CE76h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push edx 0x0000000d jc 00007F4E0D52CE76h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0B86E second address: F0B874 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F09ACE second address: F09B02 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007F4E0D52CE81h 0x00000008 pop ecx 0x00000009 push ecx 0x0000000a jmp 00007F4E0D52CE86h 0x0000000f pop ecx 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 push esi 0x00000016 pop esi 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F09B02 second address: F09B06 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0A0A0 second address: F0A0B0 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jg 00007F4E0D52CE76h 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0A0B0 second address: F0A0D7 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F4E0D1720D6h 0x00000008 jc 00007F4E0D1720D6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pushad 0x00000011 jmp 00007F4E0D1720E4h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0A376 second address: F0A38D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F4E0D52CE76h 0x0000000a pop edx 0x0000000b pushad 0x0000000c pushad 0x0000000d js 00007F4E0D52CE76h 0x00000013 push esi 0x00000014 pop esi 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0A38D second address: F0A3AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4E0D1720E2h 0x00000009 popad 0x0000000a push ebx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d pop ebx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0A3AB second address: F0A3B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0A51B second address: F0A526 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0A526 second address: F0A547 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jno 00007F4E0D52CE76h 0x0000000a jmp 00007F4E0D52CE86h 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0A547 second address: F0A57D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007F4E0D1720EAh 0x0000000c jmp 00007F4E0D1720E2h 0x00000011 pushad 0x00000012 popad 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 ja 00007F4E0D1720E2h 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0A6E9 second address: F0A6ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0A6ED second address: F0A6F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0A6F3 second address: F0A701 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnp 00007F4E0D52CE76h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0A701 second address: F0A705 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0A705 second address: F0A70B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0A873 second address: F0A879 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0A879 second address: F0A87D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0A87D second address: F0A883 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0A883 second address: F0A889 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0AEA1 second address: F0AEA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0AEA6 second address: F0AEC7 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F4E0D52CE7Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jg 00007F4E0D52CE86h 0x00000010 jl 00007F4E0D52CE78h 0x00000016 push eax 0x00000017 pop eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F09490 second address: F09494 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0FA36 second address: F0FA47 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F4E0D52CE7Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0FA47 second address: F0FA4F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0F87E second address: F0F888 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F4E0D52CE76h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0F888 second address: F0F88D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F0F88D second address: F0F895 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F1337C second address: F13382 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F13382 second address: F1339E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F4E0D52CE7Eh 0x0000000a je 00007F4E0D52CE91h 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F1339E second address: F133A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F134EE second address: F134F4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F134F4 second address: F13512 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jng 00007F4E0D1720D6h 0x0000000d jmp 00007F4E0D1720E0h 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F1FC6A second address: F1FC74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F4E0D52CE76h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F1FC74 second address: F1FCA4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D1720E6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F4E0D1720E4h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F1FCA4 second address: F1FCA8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F1FCA8 second address: F1FCAE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F23186 second address: F2318C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F2318C second address: F23192 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F276AB second address: F276AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F2C1A2 second address: F2C1AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 ja 00007F4E0D1720DCh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F3667E second address: F36682 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F36682 second address: F36692 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007F4E0D1720DEh 0x0000000c pushad 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F36528 second address: F3652C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F3652C second address: F36530 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F36530 second address: F36538 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F3DAD1 second address: F3DAD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F3C5B6 second address: F3C5BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F3C6E4 second address: F3C705 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F4E0D1720D6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F4E0D1720E3h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F3C705 second address: F3C70E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F3C866 second address: F3C87B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F4E0D1720DFh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F3C87B second address: F3C885 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F3C885 second address: F3C890 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F3C890 second address: F3C894 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F3CCB9 second address: F3CCBD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F3CCBD second address: F3CCC7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F3CCC7 second address: F3CCCB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F3CCCB second address: F3CCD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F4D583 second address: F4D587 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F4D587 second address: F4D59F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F4E0D52CE7Bh 0x0000000b pop ebx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F4D59F second address: F4D5A5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F4D5A5 second address: F4D5A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F4D5A9 second address: F4D5B3 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F4E0D1720D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F4ED3E second address: F4ED44 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F4ED44 second address: F4ED48 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F5A9E9 second address: F5A9ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F5A9ED second address: F5A9F1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F5A9F1 second address: F5A9FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F5A9FC second address: F5AA02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F5D7EA second address: F5D80B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D52CE87h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b push edx 0x0000000c pop edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F5D80B second address: F5D813 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F5D813 second address: F5D81B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F5D81B second address: F5D831 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F4E0D1720D6h 0x0000000a popad 0x0000000b pushad 0x0000000c jbe 00007F4E0D1720D6h 0x00000012 push edi 0x00000013 pop edi 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F64F54 second address: F64F8E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 ja 00007F4E0D52CE76h 0x00000009 jng 00007F4E0D52CE76h 0x0000000f jmp 00007F4E0D52CE80h 0x00000014 popad 0x00000015 jns 00007F4E0D52CE7Ch 0x0000001b je 00007F4E0D52CE76h 0x00000021 pop edx 0x00000022 pop eax 0x00000023 push ebx 0x00000024 push eax 0x00000025 jl 00007F4E0D52CE76h 0x0000002b pop eax 0x0000002c pushad 0x0000002d push eax 0x0000002e push edx 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F65525 second address: F65539 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D1720DBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebx 0x0000000a pushad 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F65539 second address: F65559 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F4E0D52CE89h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F65559 second address: F6555D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F657E4 second address: F657F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 js 00007F4E0D52CE76h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F657F3 second address: F657FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F657FB second address: F6580C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F4E0D52CE7Bh 0x00000009 push edx 0x0000000a pop edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F68970 second address: F68990 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F4E0D1720E7h 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F6E009 second address: F6E00D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F6E00D second address: F6E011 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F6F8E6 second address: F6F8EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F6F8EC second address: F6F8F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F6F8F2 second address: F6F8F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F6F8F6 second address: F6F8FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F73203 second address: F73207 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F73207 second address: F73212 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F73212 second address: F73218 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F68C3E second address: F68C51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 je 00007F4E0D1720D6h 0x0000000d jne 00007F4E0D1720D6h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F68C51 second address: F68C5B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\jPJaszTDNt.exe | RDTSC instruction interceptor: First address: F68C5B second address: F68C72 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F4E0D1720DFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d rdtsc |