Source: k7T6akLcAr.exe, 00000000.00000003.2284289746.00000000055AD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0 |
Source: k7T6akLcAr.exe, 00000000.00000003.2284289746.00000000055AD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B |
Source: k7T6akLcAr.exe, 00000000.00000003.2284289746.00000000055AD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0 |
Source: k7T6akLcAr.exe, 00000000.00000003.2284289746.00000000055AD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07 |
Source: k7T6akLcAr.exe, 00000000.00000003.2284289746.00000000055AD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0= |
Source: k7T6akLcAr.exe, 00000000.00000003.2284289746.00000000055AD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00 |
Source: k7T6akLcAr.exe, 00000000.00000003.2284289746.00000000055AD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0? |
Source: k7T6akLcAr.exe, 00000000.00000003.2284289746.00000000055AD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.digicert.com0 |
Source: k7T6akLcAr.exe, 00000000.00000003.2284289746.00000000055AD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ocsp.rootca1.amazontrust.com0: |
Source: k7T6akLcAr.exe, 00000000.00000003.2214068044.0000000000A0D000.00000004.00000020.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/account/cookiepreferences/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/privacy_agreement/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214068044.0000000000A0D000.00000004.00000020.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://store.steampowered.com/subscriber_agreement/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.valvesoftware.com/legal.htm |
Source: k7T6akLcAr.exe, 00000000.00000003.2284289746.00000000055AD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.c.lencr.org/0 |
Source: k7T6akLcAr.exe, 00000000.00000003.2284289746.00000000055AD000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://x1.i.lencr.org/0 |
Source: k7T6akLcAr.exe, 00000000.00000003.2237358352.00000000055CC000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2237434433.00000000055CC000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2237220194.00000000055CF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ac.ecosia.org/autocomplete?q= |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://avatars.fastly.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg |
Source: k7T6akLcAr.exe, 00000000.00000003.2307744830.0000000005592000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2308093192.0000000005596000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189. |
Source: k7T6akLcAr.exe, 00000000.00000003.2307744830.0000000005592000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2308093192.0000000005596000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta |
Source: k7T6akLcAr.exe, 00000000.00000003.2237358352.00000000055CC000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2237434433.00000000055CC000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2237220194.00000000055CF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q= |
Source: k7T6akLcAr.exe, 00000000.00000003.2237358352.00000000055CC000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2237434433.00000000055CC000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2237220194.00000000055CF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search |
Source: k7T6akLcAr.exe, 00000000.00000003.2237358352.00000000055CC000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2237434433.00000000055CC000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2237220194.00000000055CF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command= |
Source: k7T6akLcAr.exe, 00000000.00000003.2214068044.0000000000A0D000.00000004.00000020.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/applications/community/main.css?v=Lj6X7NKUMfzk&a |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/globalv2.css?v=hzEgqbtRcI5V&l=english&_c |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap& |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis |
Source: k7T6akLcAr.exe, 00000000.00000003.2214068044.0000000000A0D000.00000004.00000020.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/arrowDn9x5.gif |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 |
Source: k7T6akLcAr.exe, 00000000.00000003.2214068044.0000000000A0D000.00000004.00000020.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6 |
Source: k7T6akLcAr.exe, 00000000.00000003.2214068044.0000000000A0D000.00000004.00000020.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/main.js?v=_92TWn81 |
Source: k7T6akLcAr.exe, 00000000.00000003.2214068044.0000000000A0D000.00000004.00000020.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=FRRi |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=gQHVlrK4-jX-&l |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalContent.js?v=uqf5ttWTRe7l&l=engl |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/profile.js?v=GeQ6v03mWpAc&l=english&a |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/prototype-1.7.js?v=npJElBnrEO6W&l=eng |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/reportedcontent.js?v=-lZqrarogJr8&l=e |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=oOCAGrkRfpQ6&l=e |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english& |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe& |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_logo.png |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/auth_refresh.js?v=w6QbwI-5-j2S& |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=tvQ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://community.fastly.steamstatic.com/public/shared/javascript/tooltip.js?v=QYkT4eS5mbTN&l=en |
Source: k7T6akLcAr.exe, 00000000.00000003.2307744830.0000000005592000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2308093192.0000000005596000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg |
Source: k7T6akLcAr.exe, 00000000.00000003.2307744830.0000000005592000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2308093192.0000000005596000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg |
Source: k7T6akLcAr.exe, 00000000.00000003.2237358352.00000000055CC000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2237434433.00000000055CC000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2237220194.00000000055CF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/ac/?q= |
Source: k7T6akLcAr.exe, 00000000.00000003.2237358352.00000000055CC000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2237434433.00000000055CC000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2237220194.00000000055CF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/chrome_newtab |
Source: k7T6akLcAr.exe, 00000000.00000003.2237358352.00000000055CC000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2237434433.00000000055CC000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2237220194.00000000055CF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q= |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://help.steampowered.com/en/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2308093192.0000000005596000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi |
Source: k7T6akLcAr.exe, 00000000.00000002.2392016339.0000000000A89000.00000004.00000020.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2214068044.0000000000A84000.00000004.00000020.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2283837927.0000000005596000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2284043332.0000000005592000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2261475852.000000000558A000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2355357038.0000000000A86000.00000004.00000020.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2260828830.0000000005585000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214068044.0000000000A0D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/$$ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214068044.0000000000A4D000.00000004.00000020.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2355357038.0000000000A9C000.00000004.00000020.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2353494330.0000000005592000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api |
Source: k7T6akLcAr.exe, 00000000.00000003.2283743192.000000000558A000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2283837927.0000000005596000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2284043332.0000000005592000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api3 |
Source: k7T6akLcAr.exe, 00000000.00000003.2214068044.0000000000A4D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api9 |
Source: k7T6akLcAr.exe, 00000000.00000003.2388617851.0000000000A9C000.00000004.00000020.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000002.2392347427.0000000000A9C000.00000004.00000020.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2355357038.0000000000A9C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/api? |
Source: k7T6akLcAr.exe, 00000000.00000002.2392016339.0000000000A4D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/apiFV |
Source: k7T6akLcAr.exe, 00000000.00000003.2214068044.0000000000A84000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/pi |
Source: k7T6akLcAr.exe, 00000000.00000002.2392016339.0000000000A89000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com/pi; |
Source: k7T6akLcAr.exe, 00000000.00000003.2354242281.0000000000AAB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://lev-tolstoi.com:443/apingNot_NullproductState |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/?subsection=broadcasts |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/discussions/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199724331900 |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/market/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/my/wishlist/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214068044.0000000000A0D000.00000004.00000020.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/badges |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://steamcommunity.com/workshop/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/about/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/explore/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/legal/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/mobile |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/news/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/points/shop/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/privacy_agreement/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/stats/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/steam_refunds/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://store.steampowered.com/subscriber_agreement/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2285086260.000000000569F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br |
Source: k7T6akLcAr.exe, 00000000.00000003.2285086260.000000000569F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://support.mozilla.org/products/firefoxgro.all |
Source: k7T6akLcAr.exe, 00000000.00000003.2307744830.0000000005592000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2308093192.0000000005596000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3 |
Source: k7T6akLcAr.exe, 00000000.00000003.2237358352.00000000055CC000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2237434433.00000000055CC000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2237220194.00000000055CF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.ecosia.org/newtab/ |
Source: k7T6akLcAr.exe, 00000000.00000003.2237358352.00000000055CC000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2237434433.00000000055CC000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2237220194.00000000055CF000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico |
Source: k7T6akLcAr.exe, 00000000.00000003.2307679456.00000000055A9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.or |
Source: k7T6akLcAr.exe, 00000000.00000003.2307679456.00000000055A9000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org |
Source: k7T6akLcAr.exe, 00000000.00000003.2285086260.000000000569F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.bwSC1pmG_zle |
Source: k7T6akLcAr.exe, 00000000.00000003.2285086260.000000000569F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.hjKdHaZH-dbQ |
Source: k7T6akLcAr.exe, 00000000.00000003.2285086260.000000000569F000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig |
Source: k7T6akLcAr.exe, 00000000.00000003.2307744830.0000000005592000.00000004.00000800.00020000.00000000.sdmp, k7T6akLcAr.exe, 00000000.00000003.2308093192.0000000005596000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_ |
Source: k7T6akLcAr.exe, 00000000.00000003.2214037124.0000000000A9F000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: DF8DD6 second address: DF8DED instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F335854CBBFh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: DF8DED second address: DF8DF1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: DF8DF1 second address: DF8E14 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push ecx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F335854CBC8h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: DF8E14 second address: DF8E18 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F76356 second address: F7635E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F7635E second address: F76362 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F76362 second address: F76366 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F6E889 second address: F6E88F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F6E88F second address: F6E893 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F6E893 second address: F6E89E instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F6E89E second address: F6E8AE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push esi 0x00000008 jc 00007F335854CBBCh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F754D6 second address: F754DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F754DC second address: F75500 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jc 00007F335854CBB6h 0x0000000d push edi 0x0000000e pop edi 0x0000000f jbe 00007F335854CBB6h 0x00000015 js 00007F335854CBB6h 0x0000001b popad 0x0000001c js 00007F335854CBC2h 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F75500 second address: F7550D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F335931F146h 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F7566E second address: F75693 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F335854CBB6h 0x0000000a jmp 00007F335854CBC7h 0x0000000f push eax 0x00000010 push edx 0x00000011 push edi 0x00000012 pop edi 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F757E4 second address: F757F3 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F335931F146h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F757F3 second address: F75826 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F335854CBC5h 0x00000009 popad 0x0000000a push edx 0x0000000b jc 00007F335854CBB6h 0x00000011 pop edx 0x00000012 popad 0x00000013 push eax 0x00000014 push edx 0x00000015 jns 00007F335854CBBEh 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F75826 second address: F7582B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F75969 second address: F7596D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F75CB5 second address: F75CC1 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jp 00007F335931F146h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F75CC1 second address: F75CC7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F780EE second address: F780F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F781C4 second address: F781EC instructions: 0x00000000 rdtsc 0x00000002 jg 00007F335854CBB8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F335854CBC6h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F781EC second address: F781FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push ebx 0x00000006 pop ebx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [eax] 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F781FD second address: F78218 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F335854CBC6h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F78218 second address: F7823C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007F335931F14Ah 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f pushad 0x00000010 jnc 00007F335931F14Ch 0x00000016 jg 00007F335931F146h 0x0000001c push ebx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F782B9 second address: F782F4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 mov dword ptr [esp], eax 0x0000000a mov ecx, 3E1C5CA5h 0x0000000f push 00000000h 0x00000011 jmp 00007F335854CBC3h 0x00000016 push 5114DF00h 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F335854CBC0h 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F783F2 second address: F78408 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F335931F148h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp+04h], eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F78408 second address: F7840C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F7840C second address: F78412 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F784C0 second address: F784C6 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F784C6 second address: F7850A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F14Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a sub dword ptr [ebp+122D1DB9h], ecx 0x00000010 call 00007F335931F151h 0x00000015 stc 0x00000016 pop edx 0x00000017 push 00000000h 0x00000019 mov dword ptr [ebp+122D2D78h], ebx 0x0000001f push 158484F3h 0x00000024 je 00007F335931F152h 0x0000002a jnp 00007F335931F14Ch 0x00000030 push eax 0x00000031 push edx 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F895EE second address: F895F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F962BD second address: F962DA instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F335931F146h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jnl 00007F335931F146h 0x00000013 pushad 0x00000014 popad 0x00000015 pushad 0x00000016 popad 0x00000017 popad 0x00000018 pushad 0x00000019 push ebx 0x0000001a pop ebx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F96575 second address: F96579 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F966CE second address: F966ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F335931F150h 0x00000009 pop esi 0x0000000a jmp 00007F335931F14Ah 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F966ED second address: F96711 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBC5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c ja 00007F335854CBB6h 0x00000012 push ebx 0x00000013 pop ebx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F96842 second address: F96848 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F96848 second address: F96856 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F335854CBB6h 0x0000000a popad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F96F38 second address: F96F53 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F335931F153h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F96F53 second address: F96F59 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F96F59 second address: F96F64 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 ja 00007F335931F146h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F8BAA6 second address: F8BAAC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F8BAAC second address: F8BADC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jo 00007F335931F15Ch 0x00000010 jmp 00007F335931F154h 0x00000015 push esi 0x00000016 pop esi 0x00000017 jg 00007F335931F14Ah 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F9709E second address: F970BB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBC9h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F97AF2 second address: F97AFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 push edx 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F97AFD second address: F97B01 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F97B01 second address: F97B05 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F9BA35 second address: F9BA39 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F9BBED second address: F9BBFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov eax, dword ptr [esp+04h] 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c je 00007F335931F146h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F9BBFF second address: F9BC19 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBC6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F9BC19 second address: F9BC3E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [eax] 0x0000000c jc 00007F335931F14Ch 0x00000012 pushad 0x00000013 push ecx 0x00000014 pop ecx 0x00000015 pushad 0x00000016 popad 0x00000017 popad 0x00000018 mov dword ptr [esp+04h], eax 0x0000001c jng 00007F335931F14Eh 0x00000022 push edi 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F62E7F second address: F62E97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 jns 00007F335854CBB6h 0x0000000e push esi 0x0000000f pop esi 0x00000010 je 00007F335854CBB6h 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F62E97 second address: F62EBF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 jmp 00007F335931F159h 0x0000000d jno 00007F335931F146h 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA2841 second address: FA287E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F335854CBC8h 0x00000009 jmp 00007F335854CBBEh 0x0000000e popad 0x0000000f push ecx 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 jo 00007F335854CBB6h 0x00000018 pop ecx 0x00000019 push eax 0x0000001a push edx 0x0000001b jc 00007F335854CBB6h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA2A27 second address: FA2A2C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA2A2C second address: FA2A43 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F335854CBC0h 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA2CEA second address: FA2D06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F335931F156h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA2D06 second address: FA2D11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 push esi 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA2D11 second address: FA2D15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA300A second address: FA3010 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA3010 second address: FA301C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jg 00007F335931F146h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA301C second address: FA3020 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA3020 second address: FA3051 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F151h 0x00000007 jmp 00007F335931F151h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f jo 00007F335931F146h 0x00000015 pushad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA3051 second address: FA3077 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F335854CBBBh 0x0000000e jno 00007F335854CBC2h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA3077 second address: FA3082 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 js 00007F335931F146h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA3347 second address: FA334D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA334D second address: FA3351 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA3351 second address: FA3361 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jp 00007F335854CBB6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA4A9E second address: FA4AA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA4AA2 second address: FA4ACD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBBFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F335854CBC6h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA4ACD second address: FA4AF4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xor dword ptr [esp], 2B524AD0h 0x0000000e mov di, F672h 0x00000012 call 00007F335931F149h 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a pushad 0x0000001b popad 0x0000001c jnp 00007F335931F146h 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA4AF4 second address: FA4AF9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA4AF9 second address: FA4AFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA4AFF second address: FA4B11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jnl 00007F335854CBB8h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA4B11 second address: FA4B16 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA4B16 second address: FA4B1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA4B1C second address: FA4B36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b pushad 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 jc 00007F335931F146h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA4B36 second address: FA4B43 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [eax] 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA4B43 second address: FA4B51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a push ebx 0x0000000b push esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA4C83 second address: FA4C87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA5085 second address: FA5089 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA5089 second address: FA508D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA508D second address: FA5093 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA5093 second address: FA50A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F335854CBC1h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA538A second address: FA538E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA584B second address: FA58B8 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F335854CBB8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push esi 0x0000000c jg 00007F335854CBB8h 0x00000012 pushad 0x00000013 popad 0x00000014 pop esi 0x00000015 xchg eax, ebx 0x00000016 push 00000000h 0x00000018 push edi 0x00000019 call 00007F335854CBB8h 0x0000001e pop edi 0x0000001f mov dword ptr [esp+04h], edi 0x00000023 add dword ptr [esp+04h], 0000001Bh 0x0000002b inc edi 0x0000002c push edi 0x0000002d ret 0x0000002e pop edi 0x0000002f ret 0x00000030 nop 0x00000031 pushad 0x00000032 jg 00007F335854CBB8h 0x00000038 jno 00007F335854CBBCh 0x0000003e popad 0x0000003f push eax 0x00000040 push eax 0x00000041 push edx 0x00000042 jmp 00007F335854CBC8h 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA58B8 second address: FA58BF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA5B0E second address: FA5B13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA5C06 second address: FA5C10 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F335931F146h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA5C10 second address: FA5C15 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA5DE6 second address: FA5DFF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F335931F155h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA5DFF second address: FA5E03 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA5E03 second address: FA5E16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 nop 0x00000009 cmc 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 push edi 0x00000011 pop edi 0x00000012 popad 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA629E second address: FA62B8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F335854CBC6h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA62B8 second address: FA6333 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F156h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e push 00000000h 0x00000010 push edi 0x00000011 call 00007F335931F148h 0x00000016 pop edi 0x00000017 mov dword ptr [esp+04h], edi 0x0000001b add dword ptr [esp+04h], 0000001Ch 0x00000023 inc edi 0x00000024 push edi 0x00000025 ret 0x00000026 pop edi 0x00000027 ret 0x00000028 push 00000000h 0x0000002a mov esi, dword ptr [ebp+122D2706h] 0x00000030 push 00000000h 0x00000032 push 00000000h 0x00000034 push ebx 0x00000035 call 00007F335931F148h 0x0000003a pop ebx 0x0000003b mov dword ptr [esp+04h], ebx 0x0000003f add dword ptr [esp+04h], 00000014h 0x00000047 inc ebx 0x00000048 push ebx 0x00000049 ret 0x0000004a pop ebx 0x0000004b ret 0x0000004c mov esi, dword ptr [ebp+12465100h] 0x00000052 push eax 0x00000053 jp 00007F335931F150h 0x00000059 pushad 0x0000005a pushad 0x0000005b popad 0x0000005c push eax 0x0000005d push edx 0x0000005e rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA6C6A second address: FA6C70 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA7492 second address: FA74AD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F157h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA74AD second address: FA74B2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA89B2 second address: FA8A38 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 pop eax 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push edx 0x00000010 call 00007F335931F148h 0x00000015 pop edx 0x00000016 mov dword ptr [esp+04h], edx 0x0000001a add dword ptr [esp+04h], 0000001Ch 0x00000022 inc edx 0x00000023 push edx 0x00000024 ret 0x00000025 pop edx 0x00000026 ret 0x00000027 jng 00007F335931F14Ch 0x0000002d mov dword ptr [ebp+1244D3FAh], esi 0x00000033 push 00000000h 0x00000035 mov dword ptr [ebp+1245A948h], edx 0x0000003b or si, 4B38h 0x00000040 push 00000000h 0x00000042 push 00000000h 0x00000044 push eax 0x00000045 call 00007F335931F148h 0x0000004a pop eax 0x0000004b mov dword ptr [esp+04h], eax 0x0000004f add dword ptr [esp+04h], 0000001Ah 0x00000057 inc eax 0x00000058 push eax 0x00000059 ret 0x0000005a pop eax 0x0000005b ret 0x0000005c xchg eax, ebx 0x0000005d push eax 0x0000005e push edx 0x0000005f jmp 00007F335931F155h 0x00000064 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA74B2 second address: FA74C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jng 00007F335854CBBCh 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA74C6 second address: FA74CA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAB4AA second address: FAB4BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F335854CBBEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAB4BC second address: FAB4D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jnp 00007F335931F14Ch 0x00000011 jne 00007F335931F146h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAF483 second address: FAF492 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAF492 second address: FAF496 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAF496 second address: FAF49C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAB237 second address: FAB241 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F335931F146h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F6496E second address: F64974 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F64974 second address: F64981 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F335931F146h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAB241 second address: FAB25A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F335854CBC5h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FB3B40 second address: FB3B5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F335931F156h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FB4AFD second address: FB4B07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FABCCC second address: FABCD2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FABCD2 second address: FABCD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FB5CB1 second address: FB5D4C instructions: 0x00000000 rdtsc 0x00000002 jc 00007F335931F14Ch 0x00000008 jg 00007F335931F146h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov dword ptr [esp], eax 0x00000013 push 00000000h 0x00000015 push ebp 0x00000016 call 00007F335931F148h 0x0000001b pop ebp 0x0000001c mov dword ptr [esp+04h], ebp 0x00000020 add dword ptr [esp+04h], 00000016h 0x00000028 inc ebp 0x00000029 push ebp 0x0000002a ret 0x0000002b pop ebp 0x0000002c ret 0x0000002d mov dword ptr [ebp+1245A75Bh], eax 0x00000033 push 00000000h 0x00000035 push 00000000h 0x00000037 push esi 0x00000038 call 00007F335931F148h 0x0000003d pop esi 0x0000003e mov dword ptr [esp+04h], esi 0x00000042 add dword ptr [esp+04h], 0000001Ah 0x0000004a inc esi 0x0000004b push esi 0x0000004c ret 0x0000004d pop esi 0x0000004e ret 0x0000004f push 00000000h 0x00000051 mov ebx, ecx 0x00000053 xchg eax, esi 0x00000054 je 00007F335931F15Ch 0x0000005a jmp 00007F335931F156h 0x0000005f push eax 0x00000060 push eax 0x00000061 push edx 0x00000062 pushad 0x00000063 jnp 00007F335931F146h 0x00000069 jmp 00007F335931F154h 0x0000006e popad 0x0000006f rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FB7D44 second address: FB7D49 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FB7D49 second address: FB7DD6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F335931F159h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f and ebx, dword ptr [ebp+122D3BC8h] 0x00000015 push 00000000h 0x00000017 push 00000000h 0x00000019 push edx 0x0000001a call 00007F335931F148h 0x0000001f pop edx 0x00000020 mov dword ptr [esp+04h], edx 0x00000024 add dword ptr [esp+04h], 00000019h 0x0000002c inc edx 0x0000002d push edx 0x0000002e ret 0x0000002f pop edx 0x00000030 ret 0x00000031 mov ebx, dword ptr [ebp+122D3A50h] 0x00000037 push 00000000h 0x00000039 push 00000000h 0x0000003b push edi 0x0000003c call 00007F335931F148h 0x00000041 pop edi 0x00000042 mov dword ptr [esp+04h], edi 0x00000046 add dword ptr [esp+04h], 0000001Ah 0x0000004e inc edi 0x0000004f push edi 0x00000050 ret 0x00000051 pop edi 0x00000052 ret 0x00000053 mov bh, 16h 0x00000055 sub ebx, 3627D297h 0x0000005b push eax 0x0000005c push eax 0x0000005d push edx 0x0000005e jns 00007F335931F14Ch 0x00000064 jg 00007F335931F146h 0x0000006a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAF687 second address: FAF729 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F335854CBC8h 0x0000000c jnp 00007F335854CBB6h 0x00000012 popad 0x00000013 popad 0x00000014 mov dword ptr [esp], eax 0x00000017 push edx 0x00000018 jmp 00007F335854CBBBh 0x0000001d pop edi 0x0000001e add dword ptr [ebp+122DB936h], ecx 0x00000024 push dword ptr fs:[00000000h] 0x0000002b push 00000000h 0x0000002d push eax 0x0000002e call 00007F335854CBB8h 0x00000033 pop eax 0x00000034 mov dword ptr [esp+04h], eax 0x00000038 add dword ptr [esp+04h], 0000001Bh 0x00000040 inc eax 0x00000041 push eax 0x00000042 ret 0x00000043 pop eax 0x00000044 ret 0x00000045 mov ebx, dword ptr [ebp+122D2D0Bh] 0x0000004b mov dword ptr fs:[00000000h], esp 0x00000052 mov bh, 50h 0x00000054 mov dword ptr [ebp+122DB996h], eax 0x0000005a mov eax, dword ptr [ebp+122D0BB5h] 0x00000060 add edi, 4E64AF66h 0x00000066 push FFFFFFFFh 0x00000068 sub dword ptr [ebp+1244DC41h], eax 0x0000006e nop 0x0000006f pushad 0x00000070 push ecx 0x00000071 jo 00007F335854CBB6h 0x00000077 pop ecx 0x00000078 push eax 0x00000079 push edx 0x0000007a js 00007F335854CBB6h 0x00000080 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FB8E60 second address: FB8E77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F335931F153h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FB8E77 second address: FB8ECC instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push ecx 0x0000000a jnp 00007F335854CBB8h 0x00000010 push esi 0x00000011 pop esi 0x00000012 pop ecx 0x00000013 nop 0x00000014 push 00000000h 0x00000016 push ecx 0x00000017 call 00007F335854CBB8h 0x0000001c pop ecx 0x0000001d mov dword ptr [esp+04h], ecx 0x00000021 add dword ptr [esp+04h], 00000016h 0x00000029 inc ecx 0x0000002a push ecx 0x0000002b ret 0x0000002c pop ecx 0x0000002d ret 0x0000002e push 00000000h 0x00000030 mov dword ptr [ebp+12471909h], edi 0x00000036 push 00000000h 0x00000038 mov edi, eax 0x0000003a xchg eax, esi 0x0000003b jng 00007F335854CBC1h 0x00000041 jmp 00007F335854CBBBh 0x00000046 push eax 0x00000047 push edx 0x00000048 push edi 0x00000049 push eax 0x0000004a push edx 0x0000004b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FB06D0 second address: FB06D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FB2DC8 second address: FB2DCC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FB2DCC second address: FB2DEF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 pushad 0x00000009 jmp 00007F335931F157h 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FB7F17 second address: FB7F1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FBAFF9 second address: FBB00F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 jo 00007F335931F146h 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e jo 00007F335931F14Ch 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FBC015 second address: FBC01A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FBC01A second address: FBC090 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F335931F148h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f push 00000000h 0x00000011 push ebx 0x00000012 call 00007F335931F148h 0x00000017 pop ebx 0x00000018 mov dword ptr [esp+04h], ebx 0x0000001c add dword ptr [esp+04h], 00000019h 0x00000024 inc ebx 0x00000025 push ebx 0x00000026 ret 0x00000027 pop ebx 0x00000028 ret 0x00000029 cld 0x0000002a push 00000000h 0x0000002c call 00007F335931F155h 0x00000031 mov ebx, esi 0x00000033 pop edi 0x00000034 push 00000000h 0x00000036 push 00000000h 0x00000038 push edi 0x00000039 call 00007F335931F148h 0x0000003e pop edi 0x0000003f mov dword ptr [esp+04h], edi 0x00000043 add dword ptr [esp+04h], 00000018h 0x0000004b inc edi 0x0000004c push edi 0x0000004d ret 0x0000004e pop edi 0x0000004f ret 0x00000050 push eax 0x00000051 pushad 0x00000052 push edi 0x00000053 pushad 0x00000054 popad 0x00000055 pop edi 0x00000056 pushad 0x00000057 push eax 0x00000058 push edx 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FBC090 second address: FBC096 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FB904E second address: FB9058 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 pushad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FB9058 second address: FB90BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a push ecx 0x0000000b pop ecx 0x0000000c popad 0x0000000d popad 0x0000000e nop 0x0000000f clc 0x00000010 push dword ptr fs:[00000000h] 0x00000017 mov edi, 5C53BB6Fh 0x0000001c mov dword ptr fs:[00000000h], esp 0x00000023 mov ebx, 1845787Ah 0x00000028 mov eax, dword ptr [ebp+122D093Dh] 0x0000002e push 00000000h 0x00000030 push edi 0x00000031 call 00007F335854CBB8h 0x00000036 pop edi 0x00000037 mov dword ptr [esp+04h], edi 0x0000003b add dword ptr [esp+04h], 00000018h 0x00000043 inc edi 0x00000044 push edi 0x00000045 ret 0x00000046 pop edi 0x00000047 ret 0x00000048 sub dword ptr [ebp+1245A413h], ebx 0x0000004e mov edi, dword ptr [ebp+1246D8F8h] 0x00000054 push FFFFFFFFh 0x00000056 push eax 0x00000057 push eax 0x00000058 push edx 0x00000059 jc 00007F335854CBBCh 0x0000005f push eax 0x00000060 push edx 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FB90BF second address: FB90C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FBB1B6 second address: FBB1C7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F335854CBBDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FBB1C7 second address: FBB1E9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F156h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 pop eax 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FBB1E9 second address: FBB1ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FBE080 second address: FBE0F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 nop 0x00000008 push 00000000h 0x0000000a push ebp 0x0000000b call 00007F335931F148h 0x00000010 pop ebp 0x00000011 mov dword ptr [esp+04h], ebp 0x00000015 add dword ptr [esp+04h], 00000019h 0x0000001d inc ebp 0x0000001e push ebp 0x0000001f ret 0x00000020 pop ebp 0x00000021 ret 0x00000022 pushad 0x00000023 xor dword ptr [ebp+122D1DD9h], ebx 0x00000029 push ecx 0x0000002a movsx ecx, cx 0x0000002d pop ecx 0x0000002e popad 0x0000002f push 00000000h 0x00000031 movsx ebx, dx 0x00000034 push 00000000h 0x00000036 push 00000000h 0x00000038 push edx 0x00000039 call 00007F335931F148h 0x0000003e pop edx 0x0000003f mov dword ptr [esp+04h], edx 0x00000043 add dword ptr [esp+04h], 00000016h 0x0000004b inc edx 0x0000004c push edx 0x0000004d ret 0x0000004e pop edx 0x0000004f ret 0x00000050 cld 0x00000051 push eax 0x00000052 push eax 0x00000053 push edx 0x00000054 jmp 00007F335931F157h 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FBD23F second address: FBD250 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F335854CBBCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FBF149 second address: FBF14D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FBF14D second address: FBF153 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FBF153 second address: FBF17D instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F335931F14Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F335931F157h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FBF17D second address: FBF182 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FBF314 second address: FBF380 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 mov dword ptr [esp], eax 0x0000000a call 00007F335931F14Ah 0x0000000f and bx, 6C12h 0x00000014 pop edi 0x00000015 push dword ptr fs:[00000000h] 0x0000001c sub edi, dword ptr [ebp+122D2C71h] 0x00000022 mov dword ptr fs:[00000000h], esp 0x00000029 push 00000000h 0x0000002b push eax 0x0000002c call 00007F335931F148h 0x00000031 pop eax 0x00000032 mov dword ptr [esp+04h], eax 0x00000036 add dword ptr [esp+04h], 0000001Ch 0x0000003e inc eax 0x0000003f push eax 0x00000040 ret 0x00000041 pop eax 0x00000042 ret 0x00000043 mov eax, dword ptr [ebp+122D0BADh] 0x00000049 or dword ptr [ebp+122D1D5Dh], edi 0x0000004f push FFFFFFFFh 0x00000051 mov ebx, dword ptr [ebp+122D27C9h] 0x00000057 push eax 0x00000058 push eax 0x00000059 push edx 0x0000005a pushad 0x0000005b push eax 0x0000005c push edx 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FBF380 second address: FBF387 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FC97F6 second address: FC9810 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F335931F154h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FC9810 second address: FC9833 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jng 00007F335854CBB6h 0x00000009 pop edx 0x0000000a pushad 0x0000000b jmp 00007F335854CBC6h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F698CB second address: F698D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FC90D3 second address: FC90DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FC90DB second address: FC90E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FC90E1 second address: FC90E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FC9390 second address: FC93C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edi 0x00000007 jmp 00007F335931F14Bh 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f pushad 0x00000010 popad 0x00000011 jnc 00007F335931F146h 0x00000017 popad 0x00000018 push edx 0x00000019 push esi 0x0000001a pop esi 0x0000001b jmp 00007F335931F14Ah 0x00000020 pop edx 0x00000021 popad 0x00000022 push eax 0x00000023 push edx 0x00000024 push eax 0x00000025 push edx 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FCD22D second address: FCD23D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F335854CBBBh 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FCD23D second address: FCD27C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007F335931F14Ch 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 push esi 0x00000013 push eax 0x00000014 jl 00007F335931F146h 0x0000001a pop eax 0x0000001b pop esi 0x0000001c mov eax, dword ptr [eax] 0x0000001e jc 00007F335931F152h 0x00000024 mov dword ptr [esp+04h], eax 0x00000028 pushad 0x00000029 pushad 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FCD32A second address: FCD32E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FCD32E second address: FCD33B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ecx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FCD33B second address: FCD341 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FCD341 second address: FCD346 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FCD46A second address: FCD479 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F335854CBBAh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FD2846 second address: FD2854 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FD2854 second address: FD2868 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007F335854CBBBh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FD2868 second address: FD286D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FD2B30 second address: FD2B43 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F335854CBBDh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FD2B43 second address: FD2B4F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F335931F146h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FD2B4F second address: FD2B53 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FD2B53 second address: FD2B57 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FD2B57 second address: FD2B79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F335854CBBAh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jns 00007F335854CBBCh 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushad 0x00000014 push ecx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FD2B79 second address: FD2B97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F335931F155h 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FD2B97 second address: FD2B9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FD2B9B second address: FD2BA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FD2BA4 second address: FD2BBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F335854CBBAh 0x0000000b popad 0x0000000c pushad 0x0000000d jg 00007F335854CBB6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FD2E7A second address: FD2E8B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F335931F14Bh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FD2E8B second address: FD2E92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FD303C second address: FD3057 instructions: 0x00000000 rdtsc 0x00000002 js 00007F335931F155h 0x00000008 push edx 0x00000009 pop edx 0x0000000a jmp 00007F335931F14Dh 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FD3057 second address: FD305B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FD305B second address: FD305F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FDA819 second address: FDA860 instructions: 0x00000000 rdtsc 0x00000002 js 00007F335854CBBEh 0x00000008 pushad 0x00000009 popad 0x0000000a jg 00007F335854CBB6h 0x00000010 pushad 0x00000011 push eax 0x00000012 pop eax 0x00000013 jmp 00007F335854CBC6h 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b jnp 00007F335854CBE4h 0x00000021 jmp 00007F335854CBC2h 0x00000026 pushad 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FDB689 second address: FDB6A0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F14Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FDB6A0 second address: FDB6AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a pop edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FDB6AB second address: FDB6AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FDB6AF second address: FDB6B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FE070F second address: FE0738 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F152h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f push edi 0x00000010 pop edi 0x00000011 pushad 0x00000012 popad 0x00000013 push edi 0x00000014 pop edi 0x00000015 jbe 00007F335931F146h 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FE0738 second address: FE073E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FE073E second address: FE0756 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F335931F154h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FACE0E second address: FACE42 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBC8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b popad 0x0000000c pop eax 0x0000000d popad 0x0000000e mov dword ptr [esp], esi 0x00000011 mov dword ptr [ebp+122D1DD9h], eax 0x00000017 push eax 0x00000018 pushad 0x00000019 push eax 0x0000001a push edx 0x0000001b jg 00007F335854CBB6h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAD0F6 second address: FAD0FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAD0FC second address: FAD14F instructions: 0x00000000 rdtsc 0x00000002 jo 00007F335854CBCBh 0x00000008 jmp 00007F335854CBC5h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f mov dword ptr [esp], eax 0x00000012 push 00000000h 0x00000014 push ebp 0x00000015 call 00007F335854CBB8h 0x0000001a pop ebp 0x0000001b mov dword ptr [esp+04h], ebp 0x0000001f add dword ptr [esp+04h], 0000001Ch 0x00000027 inc ebp 0x00000028 push ebp 0x00000029 ret 0x0000002a pop ebp 0x0000002b ret 0x0000002c push 00000004h 0x0000002e push eax 0x0000002f push eax 0x00000030 push edx 0x00000031 jg 00007F335854CBB8h 0x00000037 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAD50B second address: FAD50F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAD50F second address: FAD526 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push edi 0x00000008 pop edi 0x00000009 jns 00007F335854CBB6h 0x0000000f popad 0x00000010 popad 0x00000011 push eax 0x00000012 push esi 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAD80C second address: FAD812 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAD812 second address: FAD829 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F335854CBBCh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAD829 second address: FAD82D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAD82D second address: FAD833 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAD833 second address: FAD83D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007F335931F146h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAD83D second address: FAD857 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c push eax 0x0000000d push edx 0x0000000e jo 00007F335854CBBCh 0x00000014 jnl 00007F335854CBB6h 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAD8F3 second address: FAD921 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 mov dword ptr [esp], eax 0x00000008 xor cx, F6C1h 0x0000000d lea eax, dword ptr [ebp+12487314h] 0x00000013 mov dword ptr [ebp+122D207Ah], eax 0x00000019 nop 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007F335931F150h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAD921 second address: FAD927 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAD927 second address: FAD9AF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 jmp 00007F335931F151h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e jnp 00007F335931F154h 0x00000014 nop 0x00000015 mov cx, di 0x00000018 pushad 0x00000019 and di, F411h 0x0000001e mov ecx, dword ptr [ebp+122D3A48h] 0x00000024 popad 0x00000025 lea eax, dword ptr [ebp+124872D0h] 0x0000002b push 00000000h 0x0000002d push ebp 0x0000002e call 00007F335931F148h 0x00000033 pop ebp 0x00000034 mov dword ptr [esp+04h], ebp 0x00000038 add dword ptr [esp+04h], 0000001Bh 0x00000040 inc ebp 0x00000041 push ebp 0x00000042 ret 0x00000043 pop ebp 0x00000044 ret 0x00000045 mov dword ptr [ebp+12465100h], esi 0x0000004b add ch, FFFFFF8Bh 0x0000004e nop 0x0000004f pushad 0x00000050 pushad 0x00000051 jbe 00007F335931F146h 0x00000057 pushad 0x00000058 popad 0x00000059 popad 0x0000005a push ebx 0x0000005b push edi 0x0000005c pop edi 0x0000005d pop ebx 0x0000005e popad 0x0000005f push eax 0x00000060 push edi 0x00000061 push eax 0x00000062 push edx 0x00000063 push eax 0x00000064 push edx 0x00000065 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAD9AF second address: FAD9B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FAD9B3 second address: F8C60D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 nop 0x00000008 mov di, 6B5Ah 0x0000000c call dword ptr [ebp+122D3929h] 0x00000012 pushad 0x00000013 jbe 00007F335931F158h 0x00000019 jmp 00007F335931F14Ch 0x0000001e jg 00007F335931F146h 0x00000024 jmp 00007F335931F156h 0x00000029 push esi 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F8C60D second address: F8C62C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 jmp 00007F335854CBC7h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F702F4 second address: F702F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: F702F8 second address: F70327 instructions: 0x00000000 rdtsc 0x00000002 ja 00007F335854CBB6h 0x00000008 jp 00007F335854CBB6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 jmp 00007F335854CBC4h 0x00000015 pushad 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 jo 00007F335854CBB6h 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FE0D5E second address: FE0D65 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FE1191 second address: FE11AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F335854CBC0h 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FE11AA second address: FE11B0 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FE11B0 second address: FE11B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FE1479 second address: FE14BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F335931F154h 0x00000009 push esi 0x0000000a pop esi 0x0000000b popad 0x0000000c jmp 00007F335931F155h 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F335931F153h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FE14BE second address: FE14C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEB3D8 second address: FEB3DC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEB3DC second address: FEB3E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEB3E2 second address: FEB40E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F335931F157h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F335931F14Ch 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEB40E second address: FEB418 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jo 00007F335854CBB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FE9D96 second address: FE9DB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F335931F146h 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jc 00007F335931F146h 0x00000015 jbe 00007F335931F146h 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FE9DB1 second address: FE9DC9 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F335854CBB6h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F335854CBBCh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEA229 second address: FEA22F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEA22F second address: FEA233 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEA3C1 second address: FEA3C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEA3C7 second address: FEA3E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F335854CBC7h 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEA9A2 second address: FEA9B9 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push edi 0x00000004 pop edi 0x00000005 jmp 00007F335931F14Dh 0x0000000a pop ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEAB4A second address: FEAB4F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEAE0E second address: FEAE2B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jno 00007F335931F146h 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c push ecx 0x0000000d pushad 0x0000000e popad 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 pop ecx 0x00000012 pop edx 0x00000013 pop eax 0x00000014 pushad 0x00000015 js 00007F335931F14Ch 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEAE2B second address: FEAE3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jmp 00007F335854CBBEh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEB257 second address: FEB270 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F335931F148h 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F335931F14Bh 0x0000000f push edx 0x00000010 pop edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEB270 second address: FEB27A instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F335854CBB6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEE70A second address: FEE72C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F335931F156h 0x00000009 jp 00007F335931F146h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEDF9C second address: FEDFB3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBBDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEDFB3 second address: FEDFB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEE10C second address: FEE126 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jmp 00007F335854CBC0h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEE126 second address: FEE14B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F335931F14Dh 0x00000009 pop edi 0x0000000a pushad 0x0000000b jmp 00007F335931F150h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEE14B second address: FEE161 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F335854CBBEh 0x00000009 popad 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEFE1B second address: FEFE21 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEFE21 second address: FEFE2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jc 00007F335854CBC2h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FEFE2E second address: FEFE34 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FF3625 second address: FF3629 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FF31FC second address: FF3202 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FF3202 second address: FF320C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F335854CBB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FF320C second address: FF3238 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F335931F146h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jp 00007F335931F14Ch 0x00000012 jp 00007F335931F146h 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d jnp 00007F335931F146h 0x00000023 jg 00007F335931F146h 0x00000029 push esi 0x0000002a pop esi 0x0000002b popad 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FF8AF4 second address: FF8AF8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FF8AF8 second address: FF8B20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d jmp 00007F335931F159h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FF8B20 second address: FF8B25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FF8C7E second address: FF8C82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FF8C82 second address: FF8C8C instructions: 0x00000000 rdtsc 0x00000002 jng 00007F335854CBB6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FF8DD3 second address: FF8DEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F335931F14Dh 0x00000009 jl 00007F335931F146h 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FF8DEB second address: FF8DF1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FF8DF1 second address: FF8DF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FF8F37 second address: FF8F6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F335854CBB6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F335854CBC5h 0x00000012 jmp 00007F335854CBC2h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FF90D8 second address: FF90FB instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a jmp 00007F335931F152h 0x0000000f jl 00007F335931F146h 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FF90FB second address: FF9101 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FF9101 second address: FF9105 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FF9105 second address: FF911F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBC6h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FFDCB0 second address: FFDCB6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FFDCB6 second address: FFDCC0 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FFDCC0 second address: FFDCD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F335931F14Dh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FFDE50 second address: FFDE56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FFDFEF second address: FFDFF9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007F335931F146h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FFDFF9 second address: FFDFFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FFE2BD second address: FFE2EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F335931F159h 0x0000000c jmp 00007F335931F151h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FFE550 second address: FFE555 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10018DA second address: 10018DE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1001045 second address: 100105C instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push edx 0x0000000a push edx 0x0000000b pop edx 0x0000000c pop edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jnl 00007F335854CBB6h 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100105C second address: 1001077 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F14Dh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jp 00007F335931F146h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1001077 second address: 100107D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10011CA second address: 10011CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10011CE second address: 10011DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jp 00007F335854CBB6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10011DE second address: 10011E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100132E second address: 1001338 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F335854CBB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100160E second address: 1001614 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1006ED3 second address: 1006EEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F335854CBC6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100751E second address: 1007522 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10077D4 second address: 10077D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10080D6 second address: 1008102 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F335931F151h 0x00000009 jmp 00007F335931F157h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1008102 second address: 100811A instructions: 0x00000000 rdtsc 0x00000002 jl 00007F335854CBB6h 0x00000008 je 00007F335854CBB6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jns 00007F335854CBB6h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100811A second address: 100811E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1008726 second address: 100872C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100872C second address: 1008760 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jmp 00007F335931F14Ch 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e jmp 00007F335931F154h 0x00000013 pop ebx 0x00000014 push edx 0x00000015 push edi 0x00000016 pop edi 0x00000017 jbe 00007F335931F146h 0x0000001d pop edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1008760 second address: 100876A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007F335854CBB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1008AAF second address: 1008AE5 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F335931F157h 0x00000008 push esi 0x00000009 pop esi 0x0000000a jmp 00007F335931F14Fh 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 jmp 00007F335931F155h 0x00000019 push esi 0x0000001a pop esi 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1008AE5 second address: 1008AEB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100C962 second address: 100C96A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100CA9B second address: 100CAB9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F335854CBBEh 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f jns 00007F335854CBB6h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100CAB9 second address: 100CABD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100CABD second address: 100CAD0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b je 00007F335854CBB6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100CAD0 second address: 100CAD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100CAD4 second address: 100CADA instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100CADA second address: 100CAF5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F335931F157h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100CC5B second address: 100CC88 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBC7h 0x00000007 jmp 00007F335854CBC2h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100CDE0 second address: 100CDFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 pop eax 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F335931F14Eh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100CDFD second address: 100CE05 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100CE05 second address: 100CE09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100D0F9 second address: 100D103 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F335854CBB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 100D56E second address: 100D588 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F335931F154h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1010444 second address: 1010448 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1010448 second address: 1010463 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F157h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1010463 second address: 1010468 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 101BE92 second address: 101BEAE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F335931F14Eh 0x0000000a pushad 0x0000000b popad 0x0000000c je 00007F335931F146h 0x00000012 js 00007F335931F14Eh 0x00000018 push ecx 0x00000019 pop ecx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 101BFEA second address: 101BFF6 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 101BFF6 second address: 101C00F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F155h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 101C00F second address: 101C041 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push esi 0x00000008 pop esi 0x00000009 ja 00007F335854CBB6h 0x0000000f jno 00007F335854CBB6h 0x00000015 jmp 00007F335854CBC7h 0x0000001a popad 0x0000001b popad 0x0000001c pushad 0x0000001d pushad 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 101C041 second address: 101C057 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F335931F146h 0x0000000a push esi 0x0000000b pop esi 0x0000000c popad 0x0000000d pushad 0x0000000e jnl 00007F335931F146h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 101C4E9 second address: 101C4EE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 101C667 second address: 101C66C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 101C66C second address: 101C69C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007F335854CBBDh 0x00000012 jg 00007F335854CBB6h 0x00000018 jmp 00007F335854CBBBh 0x0000001d popad 0x0000001e push eax 0x0000001f push edx 0x00000020 pushad 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 101C872 second address: 101C87C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F335931F146h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 101C87C second address: 101C880 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 101C880 second address: 101C89C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F335931F156h 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 101CCD9 second address: 101CCDF instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 101DC31 second address: 101DC37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 101DC37 second address: 101DC4D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F335854CBBFh 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 101BA33 second address: 101BA45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F335931F14Eh 0x0000000a jns 00007F335931F146h 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 101BA45 second address: 101BA51 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007F335854CBB6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 101BA51 second address: 101BA55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 101BA55 second address: 101BA6E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBC5h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1024C12 second address: 1024C28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F335931F152h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1024C28 second address: 1024C38 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F335854CBB6h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1024C38 second address: 1024C63 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F154h 0x00000007 jmp 00007F335931F153h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1024C63 second address: 1024C6D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 ja 00007F335854CBB6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1024C6D second address: 1024C71 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1024C71 second address: 1024C77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1024C77 second address: 1024C9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F335931F14Eh 0x0000000d jmp 00007F335931F14Dh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1024C9A second address: 1024C9E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10324DF second address: 1032500 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007F335931F14Bh 0x0000000e pushad 0x0000000f jmp 00007F335931F14Ah 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 103204B second address: 103206A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F335854CBBDh 0x00000009 popad 0x0000000a jmp 00007F335854CBBAh 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10321D9 second address: 10321E9 instructions: 0x00000000 rdtsc 0x00000002 je 00007F335931F146h 0x00000008 jne 00007F335931F146h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1039BB1 second address: 1039BB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 103E928 second address: 103E92C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 103E92C second address: 103E941 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F335854CBBFh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 103E941 second address: 103E94C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 je 00007F335931F146h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 103E94C second address: 103E955 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 103E955 second address: 103E95F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 ja 00007F335931F146h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10458AA second address: 10458B8 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F335854CBB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10458B8 second address: 10458F2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F14Dh 0x00000007 jl 00007F335931F146h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f popad 0x00000010 pushad 0x00000011 jnc 00007F335931F15Bh 0x00000017 push eax 0x00000018 push edx 0x00000019 push edi 0x0000001a pop edi 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1045724 second address: 1045730 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F335854CBB6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10486AF second address: 10486B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10486B5 second address: 10486EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 jmp 00007F335854CBC9h 0x0000000a pop edi 0x0000000b pushad 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e pushad 0x0000000f popad 0x00000010 pushad 0x00000011 popad 0x00000012 popad 0x00000013 push eax 0x00000014 push ecx 0x00000015 pop ecx 0x00000016 jbe 00007F335854CBB6h 0x0000001c pop eax 0x0000001d popad 0x0000001e pushad 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10486EB second address: 1048703 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jmp 00007F335931F14Dh 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f pop eax 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1048703 second address: 104871C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBC5h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1049E73 second address: 1049E8C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F155h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1051817 second address: 105181C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1051EB6 second address: 1051ECC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 jmp 00007F335931F151h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1051ECC second address: 1051EE8 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F335854CBBCh 0x00000008 jns 00007F335854CBB6h 0x0000000e pushad 0x0000000f push esi 0x00000010 pop esi 0x00000011 pushad 0x00000012 popad 0x00000013 popad 0x00000014 pop edx 0x00000015 pop eax 0x00000016 push eax 0x00000017 pushad 0x00000018 pushad 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 105208A second address: 1052094 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F335931F146h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10521F0 second address: 10521F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1052CB8 second address: 1052CBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10729A0 second address: 10729A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10729A4 second address: 10729C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007F335931F15Dh 0x0000000c jmp 00007F335931F157h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 108797E second address: 1087982 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1087AC7 second address: 1087ACC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1087ACC second address: 1087AD1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1088197 second address: 10881A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 jg 00007F335931F148h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10881A6 second address: 10881AC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10881AC second address: 10881B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10884AE second address: 10884BA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10884BA second address: 10884BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10884BE second address: 10884C2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10884C2 second address: 10884C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10884C8 second address: 10884EE instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jo 00007F335854CBB6h 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F335854CBC4h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10884EE second address: 10884F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 10884F2 second address: 1088504 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBBCh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1088504 second address: 108850E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007F335931F146h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 108850E second address: 1088528 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBC6h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1088528 second address: 1088538 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jl 00007F335931F146h 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1088538 second address: 1088542 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F335854CBB6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 108B4D3 second address: 108B500 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jp 00007F335931F14Eh 0x0000000c jmp 00007F335931F151h 0x00000011 push eax 0x00000012 push edx 0x00000013 je 00007F335931F146h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 108B500 second address: 108B504 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 108F92C second address: 108F9B4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F157h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c adc edx, 16120EBAh 0x00000012 push dword ptr [ebp+122D2102h] 0x00000018 push 00000000h 0x0000001a push esi 0x0000001b call 00007F335931F148h 0x00000020 pop esi 0x00000021 mov dword ptr [esp+04h], esi 0x00000025 add dword ptr [esp+04h], 00000018h 0x0000002d inc esi 0x0000002e push esi 0x0000002f ret 0x00000030 pop esi 0x00000031 ret 0x00000032 call 00007F335931F150h 0x00000037 xor dword ptr [ebp+122D2D6Eh], edi 0x0000003d pop edx 0x0000003e call 00007F335931F149h 0x00000043 pushad 0x00000044 jmp 00007F335931F155h 0x00000049 push eax 0x0000004a push edx 0x0000004b je 00007F335931F146h 0x00000051 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 108F9B4 second address: 108F9D5 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F335854CBB6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F335854CBC2h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 108F9D5 second address: 108FA1E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F150h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e jnl 00007F335931F14Ah 0x00000014 mov eax, dword ptr [eax] 0x00000016 jmp 00007F335931F151h 0x0000001b mov dword ptr [esp+04h], eax 0x0000001f je 00007F335931F154h 0x00000025 pushad 0x00000026 jc 00007F335931F146h 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1091325 second address: 109132E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 109132E second address: 1091334 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1090EBF second address: 1090EC5 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1090EC5 second address: 1090EDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jmp 00007F335931F14Ah 0x0000000c push eax 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1090EDA second address: 1090EE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 1090EE2 second address: 1090EE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA7718 second address: FA771C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA771C second address: FA7722 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA7722 second address: FA7733 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F335854CBBDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA7733 second address: FA7737 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA7737 second address: FA7746 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA7746 second address: FA774C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA7902 second address: FA7906 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: FA7906 second address: FA792D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F158h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d jnc 00007F335931F146h 0x00000013 pop ebx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BC0438 second address: 4BC043D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BC043D second address: 4BC0443 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BC0443 second address: 4BC0498 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov dword ptr [esp], ebp 0x0000000a jmp 00007F335854CBC2h 0x0000000f mov ebp, esp 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 pushfd 0x00000017 jmp 00007F335854CBC3h 0x0000001c xor ah, FFFFFFDEh 0x0000001f jmp 00007F335854CBC9h 0x00000024 popfd 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BC0498 second address: 4BC04EB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F151h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov edx, dword ptr [ebp+0Ch] 0x0000000c pushad 0x0000000d mov eax, 0A909033h 0x00000012 pushfd 0x00000013 jmp 00007F335931F158h 0x00000018 add eax, 65E3B838h 0x0000001e jmp 00007F335931F14Bh 0x00000023 popfd 0x00000024 popad 0x00000025 mov ecx, dword ptr [ebp+08h] 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BC04EB second address: 4BC04EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BC04EF second address: 4BC04F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BC04F3 second address: 4BC04F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF06C6 second address: 4BF0738 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F335931F155h 0x00000009 and eax, 67D0B126h 0x0000000f jmp 00007F335931F151h 0x00000014 popfd 0x00000015 jmp 00007F335931F150h 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d push eax 0x0000001e pushad 0x0000001f mov dh, 33h 0x00000021 push eax 0x00000022 push edx 0x00000023 pushfd 0x00000024 jmp 00007F335931F158h 0x00000029 xor ah, 00000028h 0x0000002c jmp 00007F335931F14Bh 0x00000031 popfd 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0738 second address: 4BF077D instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F335854CBC8h 0x00000008 xor ecx, 1D986788h 0x0000000e jmp 00007F335854CBBBh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 popad 0x00000017 xchg eax, ebp 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F335854CBC0h 0x00000021 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF077D second address: 4BF078C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F14Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF078C second address: 4BF0792 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0792 second address: 4BF0796 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0796 second address: 4BF07B9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBBBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jmp 00007F335854CBBBh 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF07B9 second address: 4BF07BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF07BE second address: 4BF07EF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBBFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a jmp 00007F335854CBC6h 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF07EF second address: 4BF07F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF07F3 second address: 4BF07F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF07F9 second address: 4BF07FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF07FF second address: 4BF0803 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0803 second address: 4BF0845 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F151h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ecx 0x0000000c jmp 00007F335931F14Eh 0x00000011 xchg eax, esi 0x00000012 pushad 0x00000013 mov si, E1B9h 0x00000017 popad 0x00000018 push eax 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007F335931F152h 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0845 second address: 4BF085A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBBBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF085A second address: 4BF0886 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F335931F151h 0x0000000a and ch, FFFFFFE6h 0x0000000d jmp 00007F335931F151h 0x00000012 popfd 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0886 second address: 4BF088C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF088C second address: 4BF0890 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0890 second address: 4BF08AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 lea eax, dword ptr [ebp-04h] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F335854CBC2h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF08AF second address: 4BF08B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF08B5 second address: 4BF08B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF08B9 second address: 4BF0962 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 pushad 0x0000000a call 00007F335931F154h 0x0000000f mov ecx, 682ADA71h 0x00000014 pop esi 0x00000015 pushfd 0x00000016 jmp 00007F335931F157h 0x0000001b sub eax, 441234DEh 0x00000021 jmp 00007F335931F159h 0x00000026 popfd 0x00000027 popad 0x00000028 mov dword ptr [esp], eax 0x0000002b pushad 0x0000002c pushfd 0x0000002d jmp 00007F335931F14Ch 0x00000032 or ax, 14D8h 0x00000037 jmp 00007F335931F14Bh 0x0000003c popfd 0x0000003d push eax 0x0000003e push edx 0x0000003f pushfd 0x00000040 jmp 00007F335931F156h 0x00000045 xor ax, DF38h 0x0000004a jmp 00007F335931F14Bh 0x0000004f popfd 0x00000050 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0962 second address: 4BF0978 instructions: 0x00000000 rdtsc 0x00000002 mov cx, E16Fh 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push dword ptr [ebp+08h] 0x0000000c pushad 0x0000000d mov eax, 1C718F67h 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF09C8 second address: 4BF09F6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F159h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esi, eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F335931F14Dh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF09F6 second address: 4BF09FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF09FC second address: 4BF0A00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0A00 second address: 4BF0A04 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0A32 second address: 4BE001A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F335931F156h 0x00000008 pushfd 0x00000009 jmp 00007F335931F152h 0x0000000e xor ecx, 0295C4A8h 0x00000014 jmp 00007F335931F14Bh 0x00000019 popfd 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d mov eax, esi 0x0000001f jmp 00007F335931F156h 0x00000024 pop esi 0x00000025 pushad 0x00000026 pushfd 0x00000027 jmp 00007F335931F14Eh 0x0000002c or eax, 4903F238h 0x00000032 jmp 00007F335931F14Bh 0x00000037 popfd 0x00000038 mov si, 306Fh 0x0000003c popad 0x0000003d leave 0x0000003e jmp 00007F335931F152h 0x00000043 retn 0004h 0x00000046 nop 0x00000047 sub esp, 04h 0x0000004a xor ebx, ebx 0x0000004c cmp eax, 00000000h 0x0000004f je 00007F335931F2AAh 0x00000055 mov dword ptr [esp], 0000000Dh 0x0000005c call 00007F335D12B2E1h 0x00000061 mov edi, edi 0x00000063 jmp 00007F335931F14Ch 0x00000068 xchg eax, ebp 0x00000069 push eax 0x0000006a push edx 0x0000006b pushad 0x0000006c mov edi, 5B243430h 0x00000071 pushad 0x00000072 popad 0x00000073 popad 0x00000074 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE001A second address: 4BE003F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, eax 0x00000005 mov ax, 1D1Dh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007F335854CBC6h 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE003F second address: 4BE0062 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F335931F151h 0x00000008 mov eax, 54A2B697h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 xchg eax, ebp 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0062 second address: 4BE0066 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0066 second address: 4BE006C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE006C second address: 4BE007D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F335854CBBDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE007D second address: 4BE00A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F335931F158h 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE00A1 second address: 4BE00A7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE00A7 second address: 4BE00AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE00AB second address: 4BE00CC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 sub esp, 2Ch 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F335854CBC4h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE00CC second address: 4BE00D2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE00D2 second address: 4BE00D6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE00D6 second address: 4BE0118 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 jmp 00007F335931F156h 0x0000000e mov dword ptr [esp], ebx 0x00000011 jmp 00007F335931F150h 0x00000016 xchg eax, edi 0x00000017 pushad 0x00000018 mov dl, ch 0x0000001a mov bx, 1F1Eh 0x0000001e popad 0x0000001f push eax 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0118 second address: 4BE011C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE011C second address: 4BE0122 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0122 second address: 4BE0163 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F335854CBC6h 0x00000009 and cx, CD18h 0x0000000e jmp 00007F335854CBBBh 0x00000013 popfd 0x00000014 push ecx 0x00000015 pop edx 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 xchg eax, edi 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007F335854CBBCh 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0163 second address: 4BE0172 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F14Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0172 second address: 4BE0178 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0215 second address: 4BE0227 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F335931F14Eh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0227 second address: 4BE0278 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBBBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b je 00007F335854CE24h 0x00000011 pushad 0x00000012 mov ah, dl 0x00000014 popad 0x00000015 lea ecx, dword ptr [ebp-14h] 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b pushad 0x0000001c popad 0x0000001d pushfd 0x0000001e jmp 00007F335854CBC5h 0x00000023 xor ax, F056h 0x00000028 jmp 00007F335854CBC1h 0x0000002d popfd 0x0000002e popad 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0278 second address: 4BE02DF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F335931F157h 0x00000009 xor cl, FFFFFF8Eh 0x0000000c jmp 00007F335931F159h 0x00000011 popfd 0x00000012 jmp 00007F335931F150h 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a mov dword ptr [ebp-14h], edi 0x0000001d push eax 0x0000001e push edx 0x0000001f jmp 00007F335931F157h 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0384 second address: 4BE038A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE038A second address: 4BE03C0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F14Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007F335931F14Bh 0x0000000f nop 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F335931F155h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE03C0 second address: 4BE03EA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBC1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 call dword ptr [769B86D4h] 0x0000000f mov edi, edi 0x00000011 push ebp 0x00000012 mov ebp, esp 0x00000014 push FFFFFFFEh 0x00000016 push 7741CA08h 0x0000001b push 7738AE00h 0x00000020 mov eax, dword ptr fs:[00000000h] 0x00000026 push eax 0x00000027 sub esp, 0Ch 0x0000002a push ebx 0x0000002b push esi 0x0000002c push edi 0x0000002d mov eax, dword ptr [7743B370h] 0x00000032 xor dword ptr [ebp-08h], eax 0x00000035 xor eax, ebp 0x00000037 push eax 0x00000038 lea eax, dword ptr [ebp-10h] 0x0000003b mov dword ptr fs:[00000000h], eax 0x00000041 mov dword ptr [ebp-18h], esp 0x00000044 mov eax, dword ptr fs:[00000018h] 0x0000004a test eax, eax 0x0000004c je 00007F3358590201h 0x00000052 mov dword ptr [ebp-04h], 00000000h 0x00000059 mov edx, dword ptr [ebp+08h] 0x0000005c mov dword ptr [eax+00000BF4h], edx 0x00000062 mov dword ptr [ebp-04h], FFFFFFFEh 0x00000069 test edx, edx 0x0000006b je 00007F335854CC59h 0x00000071 xor edx, edx 0x00000073 jmp 00007F335854CB98h 0x00000075 mov eax, edx 0x00000077 mov ecx, dword ptr [ebp-10h] 0x0000007a mov dword ptr fs:[00000000h], ecx 0x00000081 pop ecx 0x00000082 pop edi 0x00000083 pop esi 0x00000084 pop ebx 0x00000085 mov esp, ebp 0x00000087 pop ebp 0x00000088 retn 0004h 0x0000008b push eax 0x0000008c push edx 0x0000008d jmp 00007F335854CBBDh 0x00000092 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE03EA second address: 4BE03F0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE03F0 second address: 4BE03F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE03F4 second address: 4BE03F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE03F8 second address: 4BE040D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test eax, eax 0x0000000a pushad 0x0000000b mov edx, 538B8708h 0x00000010 push eax 0x00000011 push edx 0x00000012 mov cx, dx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE040D second address: 4BE044E instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 jg 00007F33CB09D1BEh 0x0000000d jmp 00007F335931F155h 0x00000012 js 00007F335931F1BDh 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b jmp 00007F335931F153h 0x00000020 mov ebx, ecx 0x00000022 popad 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE044E second address: 4BE0470 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBC5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [ebp-14h], edi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0470 second address: 4BE0483 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F14Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0483 second address: 4BE0489 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0489 second address: 4BE048D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE048D second address: 4BE0491 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0491 second address: 4BE0512 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jne 00007F33CB09D148h 0x0000000e pushad 0x0000000f mov edi, 67056370h 0x00000014 push ebx 0x00000015 mov ax, A42Bh 0x00000019 pop ecx 0x0000001a popad 0x0000001b mov ebx, dword ptr [ebp+08h] 0x0000001e pushad 0x0000001f movzx esi, dx 0x00000022 popad 0x00000023 lea eax, dword ptr [ebp-2Ch] 0x00000026 pushad 0x00000027 pushfd 0x00000028 jmp 00007F335931F151h 0x0000002d and si, E7A6h 0x00000032 jmp 00007F335931F151h 0x00000037 popfd 0x00000038 pushad 0x00000039 movzx esi, dx 0x0000003c mov ebx, 01FD0A2Eh 0x00000041 popad 0x00000042 popad 0x00000043 push esp 0x00000044 push eax 0x00000045 push edx 0x00000046 pushad 0x00000047 pushfd 0x00000048 jmp 00007F335931F14Ah 0x0000004d jmp 00007F335931F155h 0x00000052 popfd 0x00000053 popad 0x00000054 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0512 second address: 4BE0579 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBC1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], esi 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F335854CBBCh 0x00000013 jmp 00007F335854CBC5h 0x00000018 popfd 0x00000019 jmp 00007F335854CBC0h 0x0000001e popad 0x0000001f nop 0x00000020 jmp 00007F335854CBC0h 0x00000025 push eax 0x00000026 push eax 0x00000027 push edx 0x00000028 pushad 0x00000029 push ecx 0x0000002a pop edi 0x0000002b pushad 0x0000002c popad 0x0000002d popad 0x0000002e rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0637 second address: 4BE063C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE063C second address: 4BD0734 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 call 00007F335854CBBCh 0x00000009 pop ecx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov esi, eax 0x0000000f jmp 00007F335854CBC1h 0x00000014 test esi, esi 0x00000016 pushad 0x00000017 mov bl, ch 0x00000019 mov edi, 1856E34Ch 0x0000001e popad 0x0000001f je 00007F33CA2CAB9Dh 0x00000025 xor eax, eax 0x00000027 jmp 00007F33585262EAh 0x0000002c pop esi 0x0000002d pop edi 0x0000002e pop ebx 0x0000002f leave 0x00000030 retn 0004h 0x00000033 nop 0x00000034 sub esp, 04h 0x00000037 mov esi, eax 0x00000039 xor ebx, ebx 0x0000003b cmp esi, 00000000h 0x0000003e je 00007F335854CCF5h 0x00000044 call 00007F335C34931Dh 0x00000049 mov edi, edi 0x0000004b push eax 0x0000004c push edx 0x0000004d jmp 00007F335854CBBFh 0x00000052 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BD0734 second address: 4BD073A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BD073A second address: 4BD073E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BD073E second address: 4BD0742 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BD0742 second address: 4BD07B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 jmp 00007F335854CBBCh 0x0000000e mov dword ptr [esp], ebp 0x00000011 pushad 0x00000012 jmp 00007F335854CBBEh 0x00000017 pushad 0x00000018 call 00007F335854CBC0h 0x0000001d pop eax 0x0000001e call 00007F335854CBBBh 0x00000023 pop esi 0x00000024 popad 0x00000025 popad 0x00000026 mov ebp, esp 0x00000028 jmp 00007F335854CBBFh 0x0000002d xchg eax, ecx 0x0000002e jmp 00007F335854CBC6h 0x00000033 push eax 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 pushad 0x00000039 popad 0x0000003a rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BD07B8 second address: 4BD07BC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BD07BC second address: 4BD07C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BD07C2 second address: 4BD07FF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, dx 0x00000006 mov eax, edi 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ecx 0x0000000c jmp 00007F335931F153h 0x00000011 mov dword ptr [ebp-04h], 55534552h 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F335931F155h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BD07FF second address: 4BD080F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F335854CBBCh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BD080F second address: 4BD0813 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BD0824 second address: 4BD0862 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 leave 0x00000006 pushad 0x00000007 call 00007F335854CBBCh 0x0000000c mov edi, eax 0x0000000e pop esi 0x0000000f pushad 0x00000010 pushfd 0x00000011 jmp 00007F335854CBBDh 0x00000016 xor si, 28F6h 0x0000001b jmp 00007F335854CBC1h 0x00000020 popfd 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0A4E second address: 4BE0A88 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F159h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F335931F158h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0A88 second address: 4BE0A8E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0A8E second address: 4BE0AD9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F14Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b movsx edx, si 0x0000000e call 00007F335931F14Ah 0x00000013 mov edi, ecx 0x00000015 pop eax 0x00000016 popad 0x00000017 xchg eax, ebp 0x00000018 pushad 0x00000019 mov cx, dx 0x0000001c movsx edx, ax 0x0000001f popad 0x00000020 mov ebp, esp 0x00000022 jmp 00007F335931F14Eh 0x00000027 cmp dword ptr [769B459Ch], 05h 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 push edx 0x00000032 pushad 0x00000033 popad 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0AD9 second address: 4BE0AF6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBC9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0AF6 second address: 4BE0B17 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F151h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F33CB08D03Ah 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0B17 second address: 4BE0B1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0B1B second address: 4BE0B1F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0B1F second address: 4BE0B25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0B86 second address: 4BE0B8C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0B8C second address: 4BE0BAD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBC2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 call 00007F33CA2C1B86h 0x0000000e push 76952B70h 0x00000013 push dword ptr fs:[00000000h] 0x0000001a mov eax, dword ptr [esp+10h] 0x0000001e mov dword ptr [esp+10h], ebp 0x00000022 lea ebp, dword ptr [esp+10h] 0x00000026 sub esp, eax 0x00000028 push ebx 0x00000029 push esi 0x0000002a push edi 0x0000002b mov eax, dword ptr [769B4538h] 0x00000030 xor dword ptr [ebp-04h], eax 0x00000033 xor eax, ebp 0x00000035 push eax 0x00000036 mov dword ptr [ebp-18h], esp 0x00000039 push dword ptr [ebp-08h] 0x0000003c mov eax, dword ptr [ebp-04h] 0x0000003f mov dword ptr [ebp-04h], FFFFFFFEh 0x00000046 mov dword ptr [ebp-08h], eax 0x00000049 lea eax, dword ptr [ebp-10h] 0x0000004c mov dword ptr fs:[00000000h], eax 0x00000052 ret 0x00000053 push eax 0x00000054 push edx 0x00000055 pushad 0x00000056 pushad 0x00000057 popad 0x00000058 popad 0x00000059 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BE0BAD second address: 4BE0C3B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335931F154h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 sub esi, esi 0x0000000b pushad 0x0000000c mov esi, ebx 0x0000000e pushfd 0x0000000f jmp 00007F335931F153h 0x00000014 xor ecx, 6E92E21Eh 0x0000001a jmp 00007F335931F159h 0x0000001f popfd 0x00000020 popad 0x00000021 mov dword ptr [ebp-1Ch], esi 0x00000024 push eax 0x00000025 push edx 0x00000026 pushad 0x00000027 mov edi, 013DC77Eh 0x0000002c pushfd 0x0000002d jmp 00007F335931F14Fh 0x00000032 adc eax, 3C290C2Eh 0x00000038 jmp 00007F335931F159h 0x0000003d popfd 0x0000003e popad 0x0000003f rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0B08 second address: 4BF0B0E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0B0E second address: 4BF0B12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0B12 second address: 4BF0B16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0B16 second address: 4BF0BB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 jmp 00007F335931F14Fh 0x0000000e mov ebp, esp 0x00000010 jmp 00007F335931F156h 0x00000015 xchg eax, esi 0x00000016 pushad 0x00000017 mov ax, 483Dh 0x0000001b mov dh, ch 0x0000001d popad 0x0000001e push eax 0x0000001f jmp 00007F335931F154h 0x00000024 xchg eax, esi 0x00000025 jmp 00007F335931F150h 0x0000002a mov esi, dword ptr [ebp+0Ch] 0x0000002d jmp 00007F335931F150h 0x00000032 test esi, esi 0x00000034 pushad 0x00000035 call 00007F335931F14Eh 0x0000003a mov dh, al 0x0000003c pop ebx 0x0000003d popad 0x0000003e je 00007F33CB07C960h 0x00000044 push eax 0x00000045 push edx 0x00000046 push eax 0x00000047 push edx 0x00000048 jmp 00007F335931F14Bh 0x0000004d rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0BB2 second address: 4BF0BB8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0BB8 second address: 4BF0C36 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop edi 0x00000005 movzx eax, di 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b cmp dword ptr [769B459Ch], 05h 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007F335931F14Fh 0x00000019 sbb ecx, 347A6AFEh 0x0000001f jmp 00007F335931F159h 0x00000024 popfd 0x00000025 pushfd 0x00000026 jmp 00007F335931F150h 0x0000002b sbb al, FFFFFFF8h 0x0000002e jmp 00007F335931F14Bh 0x00000033 popfd 0x00000034 popad 0x00000035 je 00007F33CB0949C1h 0x0000003b push eax 0x0000003c push edx 0x0000003d push eax 0x0000003e push edx 0x0000003f jmp 00007F335931F150h 0x00000044 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0C36 second address: 4BF0C45 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F335854CBBBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0C45 second address: 4BF0C70 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov di, EF7Ah 0x00000007 mov edi, 19868946h 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push esp 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F335931F159h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0C70 second address: 4BF0C76 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\k7T6akLcAr.exe | RDTSC instruction interceptor: First address: 4BF0C76 second address: 4BF0C7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |