Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: F3163 second address: F316F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: F316F second address: F3173 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: F3173 second address: F3179 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: F3179 second address: F2A2E instructions: 0x00000000 rdtsc 0x00000002 jl 00007FB8D4BFEE0Ch 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b mov dword ptr [ebp+122D18EDh], edx 0x00000011 push dword ptr [ebp+122D0199h] 0x00000017 jmp 00007FB8D4BFEDFAh 0x0000001c sub dword ptr [ebp+122D1CB3h], esi 0x00000022 call dword ptr [ebp+122D2D5Eh] 0x00000028 pushad 0x00000029 stc 0x0000002a xor eax, eax 0x0000002c or dword ptr [ebp+122D2573h], ecx 0x00000032 mov edx, dword ptr [esp+28h] 0x00000036 xor dword ptr [ebp+122D27B2h], edi 0x0000003c mov dword ptr [ebp+122D2A80h], eax 0x00000042 jp 00007FB8D4BFEE0Ah 0x00000048 jmp 00007FB8D4BFEE04h 0x0000004d jmp 00007FB8D4BFEE02h 0x00000052 mov esi, 0000003Ch 0x00000057 mov dword ptr [ebp+122D27B2h], ebx 0x0000005d add esi, dword ptr [esp+24h] 0x00000061 pushad 0x00000062 xor si, C950h 0x00000067 mov ebx, 0AF191DCh 0x0000006c popad 0x0000006d lodsw 0x0000006f sub dword ptr [ebp+122D27B2h], eax 0x00000075 jo 00007FB8D4BFEE07h 0x0000007b jmp 00007FB8D4BFEE01h 0x00000080 add eax, dword ptr [esp+24h] 0x00000084 clc 0x00000085 mov ebx, dword ptr [esp+24h] 0x00000089 jmp 00007FB8D4BFEE05h 0x0000008e nop 0x0000008f push edx 0x00000090 push ecx 0x00000091 push eax 0x00000092 push edx 0x00000093 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: F2A2E second address: F2A3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 256E65 second address: 256E6B instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2755ED second address: 275622 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBCDh 0x00000007 pushad 0x00000008 jmp 00007FB8D4EECBD5h 0x0000000d pushad 0x0000000e popad 0x0000000f jne 00007FB8D4EECBC6h 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b push edx 0x0000001c pop edx 0x0000001d rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 275622 second address: 275626 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 275745 second address: 275763 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FB8D4EECBD5h 0x0000000c push eax 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2771BE second address: 2771C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2771C3 second address: F2A2E instructions: 0x00000000 rdtsc 0x00000002 jne 00007FB8D4EECBCCh 0x00000008 jnc 00007FB8D4EECBC6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 xor dword ptr [esp], 1F2C22FDh 0x00000017 movsx edx, di 0x0000001a push dword ptr [ebp+122D0199h] 0x00000020 call dword ptr [ebp+122D2D5Eh] 0x00000026 pushad 0x00000027 stc 0x00000028 xor eax, eax 0x0000002a or dword ptr [ebp+122D2573h], ecx 0x00000030 mov edx, dword ptr [esp+28h] 0x00000034 xor dword ptr [ebp+122D27B2h], edi 0x0000003a mov dword ptr [ebp+122D2A80h], eax 0x00000040 jp 00007FB8D4EECBDAh 0x00000046 jmp 00007FB8D4EECBD4h 0x0000004b jmp 00007FB8D4EECBD2h 0x00000050 mov esi, 0000003Ch 0x00000055 mov dword ptr [ebp+122D27B2h], ebx 0x0000005b add esi, dword ptr [esp+24h] 0x0000005f pushad 0x00000060 xor si, C950h 0x00000065 mov ebx, 0AF191DCh 0x0000006a popad 0x0000006b lodsw 0x0000006d sub dword ptr [ebp+122D27B2h], eax 0x00000073 jo 00007FB8D4EECBD7h 0x00000079 jmp 00007FB8D4EECBD1h 0x0000007e add eax, dword ptr [esp+24h] 0x00000082 clc 0x00000083 mov ebx, dword ptr [esp+24h] 0x00000087 jmp 00007FB8D4EECBD5h 0x0000008c nop 0x0000008d push edx 0x0000008e push ecx 0x0000008f push eax 0x00000090 push edx 0x00000091 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 27732D second address: 277331 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 277433 second address: 277447 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 277447 second address: 277451 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnl 00007FB8D4BFEDF6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 277451 second address: 277463 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c jo 00007FB8D4EECBC6h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 277463 second address: 27747B instructions: 0x00000000 rdtsc 0x00000002 je 00007FB8D4BFEDF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FB8D4BFEDFCh 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 27747B second address: 27747F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 27747F second address: 2774A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 mov edi, 0D6D8721h 0x0000000d push 00000000h 0x0000000f mov dword ptr [ebp+122D18BAh], edx 0x00000015 call 00007FB8D4BFEDF9h 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d ja 00007FB8D4BFEDF6h 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2774A6 second address: 2774CF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnc 00007FB8D4EECBCCh 0x0000000c popad 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FB8D4EECBD3h 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2774CF second address: 277542 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB8D4BFEDFFh 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 jc 00007FB8D4BFEE08h 0x00000017 jmp 00007FB8D4BFEE02h 0x0000001c mov eax, dword ptr [eax] 0x0000001e ja 00007FB8D4BFEE0Dh 0x00000024 mov dword ptr [esp+04h], eax 0x00000028 pushad 0x00000029 jmp 00007FB8D4BFEE08h 0x0000002e push eax 0x0000002f push edx 0x00000030 pushad 0x00000031 popad 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 277542 second address: 277573 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pop eax 0x00000008 add ecx, 5AF667E2h 0x0000000e push 00000003h 0x00000010 mov si, F2F2h 0x00000014 push 00000000h 0x00000016 mov dword ptr [ebp+122D1D40h], ecx 0x0000001c push 00000003h 0x0000001e mov dl, 81h 0x00000020 push E5089488h 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007FB8D4EECBCAh 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 277573 second address: 2775E4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE03h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor dword ptr [esp], 25089488h 0x00000010 push 00000000h 0x00000012 push eax 0x00000013 call 00007FB8D4BFEDF8h 0x00000018 pop eax 0x00000019 mov dword ptr [esp+04h], eax 0x0000001d add dword ptr [esp+04h], 00000017h 0x00000025 inc eax 0x00000026 push eax 0x00000027 ret 0x00000028 pop eax 0x00000029 ret 0x0000002a sub edx, dword ptr [ebp+122D2960h] 0x00000030 sub dword ptr [ebp+122D246Fh], edi 0x00000036 lea ebx, dword ptr [ebp+12458137h] 0x0000003c jnc 00007FB8D4BFEDF9h 0x00000042 xchg eax, ebx 0x00000043 push eax 0x00000044 push ebx 0x00000045 jmp 00007FB8D4BFEDFEh 0x0000004a pop ebx 0x0000004b pop eax 0x0000004c push eax 0x0000004d pushad 0x0000004e push eax 0x0000004f push edx 0x00000050 push eax 0x00000051 push edx 0x00000052 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2775E4 second address: 2775E8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 277681 second address: 2776CF instructions: 0x00000000 rdtsc 0x00000002 ja 00007FB8D4BFEDFCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e pushad 0x0000000f jnc 00007FB8D4BFEDFCh 0x00000015 push eax 0x00000016 jmp 00007FB8D4BFEDFCh 0x0000001b pop eax 0x0000001c popad 0x0000001d mov eax, dword ptr [eax] 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 pushad 0x00000023 popad 0x00000024 jmp 00007FB8D4BFEE06h 0x00000029 popad 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2776CF second address: 2776D9 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FB8D4EECBCCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 26B0C0 second address: 26B0CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push edi 0x0000000a pop edi 0x0000000b push esi 0x0000000c pop esi 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 295E9A second address: 295EA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 295EA0 second address: 295ECC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8D4BFEDFCh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FB8D4BFEE07h 0x00000011 push eax 0x00000012 pop eax 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 296391 second address: 2963AA instructions: 0x00000000 rdtsc 0x00000002 jo 00007FB8D4EECBD2h 0x00000008 jl 00007FB8D4EECBC6h 0x0000000e jnp 00007FB8D4EECBC6h 0x00000014 pushad 0x00000015 push edx 0x00000016 pop edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2964EC second address: 2964F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2964F4 second address: 296500 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007FB8D4EECBC6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 296500 second address: 29652B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 jmp 00007FB8D4BFEE01h 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f pushad 0x00000010 popad 0x00000011 jmp 00007FB8D4BFEDFDh 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 29652B second address: 296537 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FB8D4EECBCEh 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 296A74 second address: 296A80 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop ebx 0x00000006 pushad 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 296A80 second address: 296AC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jmp 00007FB8D4EECBD1h 0x0000000b popad 0x0000000c pushad 0x0000000d jp 00007FB8D4EECBC6h 0x00000013 jmp 00007FB8D4EECBD3h 0x00000018 ja 00007FB8D4EECBC6h 0x0000001e push esi 0x0000001f pop esi 0x00000020 popad 0x00000021 jnp 00007FB8D4EECBC8h 0x00000027 pushad 0x00000028 popad 0x00000029 pushad 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 296BE8 second address: 296BEE instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 296BEE second address: 296C13 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FB8D4EECBD1h 0x00000008 push ecx 0x00000009 jmp 00007FB8D4EECBCFh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 296D6C second address: 296D87 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8D4BFEE07h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 296D87 second address: 296DA4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ecx 0x0000000c pop ecx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 258898 second address: 25889C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 297E4A second address: 297E4F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 297E4F second address: 297E55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 29AB03 second address: 29AB09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 29B043 second address: 29B047 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 29B047 second address: 29B04D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2999DA second address: 2999E1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 29B15A second address: 29B164 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FB8D4EECBC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A2C97 second address: 2A2C9D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A2C9D second address: 2A2CA3 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A2CA3 second address: 2A2CAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A2CAD second address: 2A2CB3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A2CB3 second address: 2A2CB7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A20EB second address: 2A20F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A20F1 second address: 2A2113 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jo 00007FB8D4BFEE11h 0x0000000b jmp 00007FB8D4BFEE05h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A23BD second address: 2A23C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A23C2 second address: 2A23D5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8D4BFEDFDh 0x00000009 push esi 0x0000000a pop esi 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A23D5 second address: 2A23D9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A255B second address: 2A2560 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A4963 second address: 2A498A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b jmp 00007FB8D4EECBD0h 0x00000010 mov eax, dword ptr [eax] 0x00000012 jng 00007FB8D4EECBD0h 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A4E0A second address: 2A4E0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A58C8 second address: 2A58EE instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 je 00007FB8D4EECBD1h 0x0000000c jmp 00007FB8D4EECBCBh 0x00000011 popad 0x00000012 push eax 0x00000013 pushad 0x00000014 je 00007FB8D4EECBC8h 0x0000001a pushad 0x0000001b popad 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A58EE second address: 2A58F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A59BA second address: 2A59C0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A5BFE second address: 2A5C69 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 ja 00007FB8D4BFEDF6h 0x0000000d jmp 00007FB8D4BFEE05h 0x00000012 popad 0x00000013 popad 0x00000014 push eax 0x00000015 pushad 0x00000016 pushad 0x00000017 jmp 00007FB8D4BFEE02h 0x0000001c push ebx 0x0000001d pop ebx 0x0000001e popad 0x0000001f push ebx 0x00000020 pushad 0x00000021 popad 0x00000022 pop ebx 0x00000023 popad 0x00000024 nop 0x00000025 push 00000000h 0x00000027 push esi 0x00000028 call 00007FB8D4BFEDF8h 0x0000002d pop esi 0x0000002e mov dword ptr [esp+04h], esi 0x00000032 add dword ptr [esp+04h], 00000017h 0x0000003a inc esi 0x0000003b push esi 0x0000003c ret 0x0000003d pop esi 0x0000003e ret 0x0000003f pushad 0x00000040 stc 0x00000041 popad 0x00000042 xchg eax, ebx 0x00000043 pushad 0x00000044 pushad 0x00000045 push edx 0x00000046 pop edx 0x00000047 push eax 0x00000048 push edx 0x00000049 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A5C69 second address: 2A5C82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007FB8D4EECBCEh 0x0000000a popad 0x0000000b push eax 0x0000000c push esi 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A889C second address: 2A88A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A85D3 second address: 2A85DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A85DC second address: 2A85E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A85E0 second address: 2A85EE instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push edx 0x0000000d pop edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A85EE second address: 2A85F8 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FB8D4BFEDF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A912B second address: 2A9130 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A93A2 second address: 2A93A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A9130 second address: 2A9157 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8D4EECBCAh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e jmp 00007FB8D4EECBD1h 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A93A6 second address: 2A93CF instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 popad 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d jmp 00007FB8D4BFEE04h 0x00000012 jc 00007FB8D4BFEDFCh 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A93CF second address: 2A943C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 nop 0x00000006 mov dword ptr [ebp+12455A8Dh], eax 0x0000000c push 00000000h 0x0000000e mov dword ptr [ebp+122D188Bh], ebx 0x00000014 push 00000000h 0x00000016 push 00000000h 0x00000018 push esi 0x00000019 call 00007FB8D4EECBC8h 0x0000001e pop esi 0x0000001f mov dword ptr [esp+04h], esi 0x00000023 add dword ptr [esp+04h], 0000001Dh 0x0000002b inc esi 0x0000002c push esi 0x0000002d ret 0x0000002e pop esi 0x0000002f ret 0x00000030 xchg eax, ebx 0x00000031 pushad 0x00000032 pushad 0x00000033 push ecx 0x00000034 pop ecx 0x00000035 pushad 0x00000036 popad 0x00000037 popad 0x00000038 pushad 0x00000039 jmp 00007FB8D4EECBD6h 0x0000003e push eax 0x0000003f pop eax 0x00000040 popad 0x00000041 popad 0x00000042 push eax 0x00000043 push eax 0x00000044 push edx 0x00000045 jmp 00007FB8D4EECBCCh 0x0000004a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A9EAD second address: 2A9EB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A9C59 second address: 2A9C5D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A9EB1 second address: 2A9EC7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jl 00007FB8D4BFEDFCh 0x00000010 jns 00007FB8D4BFEDF6h 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A9C5D second address: 2A9C66 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A9EC7 second address: 2A9ECD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2A9ECD second address: 2A9ED1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AAA4D second address: 2AAA51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AAA51 second address: 2AAA67 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AAA67 second address: 2AAA93 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FB8D4BFEDFAh 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FB8D4BFEE09h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AAB25 second address: 2AAB2A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AE1A5 second address: 2AE1AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AE75E second address: 2AE7EB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB8D4EECBD9h 0x00000008 pushad 0x00000009 popad 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d nop 0x0000000e call 00007FB8D4EECBCFh 0x00000013 or di, 4549h 0x00000018 pop ebx 0x00000019 push 00000000h 0x0000001b push 00000000h 0x0000001d push esi 0x0000001e call 00007FB8D4EECBC8h 0x00000023 pop esi 0x00000024 mov dword ptr [esp+04h], esi 0x00000028 add dword ptr [esp+04h], 00000015h 0x00000030 inc esi 0x00000031 push esi 0x00000032 ret 0x00000033 pop esi 0x00000034 ret 0x00000035 adc bh, FFFFFFC7h 0x00000038 push 00000000h 0x0000003a push 00000000h 0x0000003c push edx 0x0000003d call 00007FB8D4EECBC8h 0x00000042 pop edx 0x00000043 mov dword ptr [esp+04h], edx 0x00000047 add dword ptr [esp+04h], 0000001Bh 0x0000004f inc edx 0x00000050 push edx 0x00000051 ret 0x00000052 pop edx 0x00000053 ret 0x00000054 xchg eax, esi 0x00000055 push eax 0x00000056 push edx 0x00000057 jne 00007FB8D4EECBCCh 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AE7EB second address: 2AE7F0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AE7F0 second address: 2AE817 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FB8D4EECBD9h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AE817 second address: 2AE82C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE01h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AFAA6 second address: 2AFAAC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AEA7B second address: 2AEA7F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AEA7F second address: 2AEA85 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B19C2 second address: 2B1A3F instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FB8D4BFEDFEh 0x0000000b popad 0x0000000c push eax 0x0000000d jmp 00007FB8D4BFEE00h 0x00000012 nop 0x00000013 push 00000000h 0x00000015 push ebx 0x00000016 call 00007FB8D4BFEDF8h 0x0000001b pop ebx 0x0000001c mov dword ptr [esp+04h], ebx 0x00000020 add dword ptr [esp+04h], 00000019h 0x00000028 inc ebx 0x00000029 push ebx 0x0000002a ret 0x0000002b pop ebx 0x0000002c ret 0x0000002d mov ebx, esi 0x0000002f push 00000000h 0x00000031 mov edi, dword ptr [ebp+122D1A1Ah] 0x00000037 push 00000000h 0x00000039 push 00000000h 0x0000003b push ecx 0x0000003c call 00007FB8D4BFEDF8h 0x00000041 pop ecx 0x00000042 mov dword ptr [esp+04h], ecx 0x00000046 add dword ptr [esp+04h], 00000018h 0x0000004e inc ecx 0x0000004f push ecx 0x00000050 ret 0x00000051 pop ecx 0x00000052 ret 0x00000053 mov ebx, edi 0x00000055 xchg eax, esi 0x00000056 push eax 0x00000057 push edx 0x00000058 push eax 0x00000059 push edx 0x0000005a pushad 0x0000005b popad 0x0000005c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B0C87 second address: 2B0C8C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B1A3F second address: 2B1A45 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B1A45 second address: 2B1A6C instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 jmp 00007FB8D4EECBD3h 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FB8D4EECBCAh 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B3BA7 second address: 2B3BB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FB8D4BFEDF6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B2C9D second address: 2B2CA7 instructions: 0x00000000 rdtsc 0x00000002 jns 00007FB8D4EECBC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B2CA7 second address: 2B2D86 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FB8D4BFEDF8h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d jg 00007FB8D4BFEE00h 0x00000013 nop 0x00000014 push 00000000h 0x00000016 push eax 0x00000017 call 00007FB8D4BFEDF8h 0x0000001c pop eax 0x0000001d mov dword ptr [esp+04h], eax 0x00000021 add dword ptr [esp+04h], 0000001Ah 0x00000029 inc eax 0x0000002a push eax 0x0000002b ret 0x0000002c pop eax 0x0000002d ret 0x0000002e mov ebx, dword ptr [ebp+122D289Ch] 0x00000034 push dword ptr fs:[00000000h] 0x0000003b push 00000000h 0x0000003d push eax 0x0000003e call 00007FB8D4BFEDF8h 0x00000043 pop eax 0x00000044 mov dword ptr [esp+04h], eax 0x00000048 add dword ptr [esp+04h], 00000015h 0x00000050 inc eax 0x00000051 push eax 0x00000052 ret 0x00000053 pop eax 0x00000054 ret 0x00000055 jmp 00007FB8D4BFEE03h 0x0000005a mov dword ptr fs:[00000000h], esp 0x00000061 xor dword ptr [ebp+122D21ABh], edx 0x00000067 mov eax, dword ptr [ebp+122D02DDh] 0x0000006d call 00007FB8D4BFEE07h 0x00000072 mov dword ptr [ebp+122D1871h], edi 0x00000078 pop ebx 0x00000079 push FFFFFFFFh 0x0000007b mov edi, 655DF01Dh 0x00000080 push eax 0x00000081 pushad 0x00000082 jmp 00007FB8D4BFEE07h 0x00000087 push eax 0x00000088 push edx 0x00000089 jmp 00007FB8D4BFEDFFh 0x0000008e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B3CCA second address: 2B3CCE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B2D86 second address: 2B2D8A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B4BB4 second address: 2B4BB9 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B3CCE second address: 2B3CD8 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FB8D4BFEDF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B3CD8 second address: 2B3CF4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8D4EECBD8h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B3CF4 second address: 2B3D94 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEDFCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d push ecx 0x0000000e push esi 0x0000000f pop esi 0x00000010 pop ecx 0x00000011 jg 00007FB8D4BFEDFCh 0x00000017 popad 0x00000018 nop 0x00000019 cld 0x0000001a push dword ptr fs:[00000000h] 0x00000021 push esi 0x00000022 xor dword ptr [ebp+122D1C4Bh], ebx 0x00000028 pop edi 0x00000029 mov dword ptr fs:[00000000h], esp 0x00000030 push 00000000h 0x00000032 push ebx 0x00000033 call 00007FB8D4BFEDF8h 0x00000038 pop ebx 0x00000039 mov dword ptr [esp+04h], ebx 0x0000003d add dword ptr [esp+04h], 0000001Ah 0x00000045 inc ebx 0x00000046 push ebx 0x00000047 ret 0x00000048 pop ebx 0x00000049 ret 0x0000004a mov edi, ebx 0x0000004c mov eax, dword ptr [ebp+122D08ADh] 0x00000052 call 00007FB8D4BFEDFFh 0x00000057 pushad 0x00000058 adc ecx, 6622303Ah 0x0000005e add cl, FFFFFFABh 0x00000061 popad 0x00000062 pop edi 0x00000063 push FFFFFFFFh 0x00000065 nop 0x00000066 jmp 00007FB8D4BFEE01h 0x0000006b push eax 0x0000006c pushad 0x0000006d push eax 0x0000006e push edx 0x0000006f js 00007FB8D4BFEDF6h 0x00000075 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B78BF second address: 2B78C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B8705 second address: 2B876B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEDFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push ebp 0x0000000f call 00007FB8D4BFEDF8h 0x00000014 pop ebp 0x00000015 mov dword ptr [esp+04h], ebp 0x00000019 add dword ptr [esp+04h], 0000001Bh 0x00000021 inc ebp 0x00000022 push ebp 0x00000023 ret 0x00000024 pop ebp 0x00000025 ret 0x00000026 push 00000000h 0x00000028 mov edi, dword ptr [ebp+122D26FAh] 0x0000002e push 00000000h 0x00000030 mov dword ptr [ebp+12484C59h], edx 0x00000036 xchg eax, esi 0x00000037 pushad 0x00000038 push ebx 0x00000039 jmp 00007FB8D4BFEE05h 0x0000003e pop ebx 0x0000003f push eax 0x00000040 push edx 0x00000041 jne 00007FB8D4BFEDF6h 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B876B second address: 2B8783 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FB8D4EECBCDh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B8783 second address: 2B878C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B878C second address: 2B8792 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B5BA1 second address: 2B5BA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B5BA7 second address: 2B5C4C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e movzx edi, si 0x00000011 push dword ptr fs:[00000000h] 0x00000018 push 00000000h 0x0000001a push ebx 0x0000001b call 00007FB8D4EECBC8h 0x00000020 pop ebx 0x00000021 mov dword ptr [esp+04h], ebx 0x00000025 add dword ptr [esp+04h], 00000019h 0x0000002d inc ebx 0x0000002e push ebx 0x0000002f ret 0x00000030 pop ebx 0x00000031 ret 0x00000032 mov dword ptr [ebp+122D1B0Ch], edi 0x00000038 mov dword ptr fs:[00000000h], esp 0x0000003f mov edi, dword ptr [ebp+1245A27Dh] 0x00000045 mov eax, dword ptr [ebp+122D0819h] 0x0000004b push 00000000h 0x0000004d push esi 0x0000004e call 00007FB8D4EECBC8h 0x00000053 pop esi 0x00000054 mov dword ptr [esp+04h], esi 0x00000058 add dword ptr [esp+04h], 00000014h 0x00000060 inc esi 0x00000061 push esi 0x00000062 ret 0x00000063 pop esi 0x00000064 ret 0x00000065 mov dword ptr [ebp+122D2674h], edi 0x0000006b push FFFFFFFFh 0x0000006d pushad 0x0000006e and edi, 6A3909F2h 0x00000074 mov ah, bl 0x00000076 popad 0x00000077 mov ebx, dword ptr [ebp+122DB530h] 0x0000007d nop 0x0000007e js 00007FB8D4EECBD0h 0x00000084 push eax 0x00000085 push edx 0x00000086 pushad 0x00000087 popad 0x00000088 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2BA4F2 second address: 2BA4F6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2BA4F6 second address: 2BA53C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 mov dword ptr [esp], eax 0x0000000a push 00000000h 0x0000000c push ebp 0x0000000d call 00007FB8D4EECBC8h 0x00000012 pop ebp 0x00000013 mov dword ptr [esp+04h], ebp 0x00000017 add dword ptr [esp+04h], 00000018h 0x0000001f inc ebp 0x00000020 push ebp 0x00000021 ret 0x00000022 pop ebp 0x00000023 ret 0x00000024 mov edi, 3193D034h 0x00000029 push 00000000h 0x0000002b mov di, E4D5h 0x0000002f push 00000000h 0x00000031 mov bx, ax 0x00000034 mov dword ptr [ebp+1245688Dh], esi 0x0000003a xchg eax, esi 0x0000003b push edi 0x0000003c push eax 0x0000003d push edx 0x0000003e pushad 0x0000003f popad 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B7A2D second address: 2B7A31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B7A31 second address: 2B7A35 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B7A35 second address: 2B7ACB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop esi 0x00000007 nop 0x00000008 mov ebx, dword ptr [ebp+122D2AA0h] 0x0000000e jmp 00007FB8D4BFEE08h 0x00000013 push dword ptr fs:[00000000h] 0x0000001a mov dword ptr [ebp+12452CEBh], eax 0x00000020 mov dword ptr fs:[00000000h], esp 0x00000027 adc edi, 178A07E2h 0x0000002d mov eax, dword ptr [ebp+122D0F61h] 0x00000033 mov dword ptr [ebp+1245A351h], esi 0x00000039 push FFFFFFFFh 0x0000003b push 00000000h 0x0000003d push ecx 0x0000003e call 00007FB8D4BFEDF8h 0x00000043 pop ecx 0x00000044 mov dword ptr [esp+04h], ecx 0x00000048 add dword ptr [esp+04h], 0000001Ch 0x00000050 inc ecx 0x00000051 push ecx 0x00000052 ret 0x00000053 pop ecx 0x00000054 ret 0x00000055 mov edi, dword ptr [ebp+122D18D0h] 0x0000005b mov ebx, 2050BF5Eh 0x00000060 push eax 0x00000061 pushad 0x00000062 push eax 0x00000063 push edx 0x00000064 jmp 00007FB8D4BFEE05h 0x00000069 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2B7ACB second address: 2B7ACF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2BC565 second address: 2BC56A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2BD4C9 second address: 2BD54F instructions: 0x00000000 rdtsc 0x00000002 ja 00007FB8D4EECBC8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push ebx 0x0000000c push eax 0x0000000d jno 00007FB8D4EECBC6h 0x00000013 pop eax 0x00000014 pop ebx 0x00000015 nop 0x00000016 mov bx, si 0x00000019 push dword ptr fs:[00000000h] 0x00000020 mov dword ptr fs:[00000000h], esp 0x00000027 movsx edi, dx 0x0000002a mov eax, dword ptr [ebp+122D130Dh] 0x00000030 push 00000000h 0x00000032 push esi 0x00000033 call 00007FB8D4EECBC8h 0x00000038 pop esi 0x00000039 mov dword ptr [esp+04h], esi 0x0000003d add dword ptr [esp+04h], 00000017h 0x00000045 inc esi 0x00000046 push esi 0x00000047 ret 0x00000048 pop esi 0x00000049 ret 0x0000004a push FFFFFFFFh 0x0000004c push 00000000h 0x0000004e push ebx 0x0000004f call 00007FB8D4EECBC8h 0x00000054 pop ebx 0x00000055 mov dword ptr [esp+04h], ebx 0x00000059 add dword ptr [esp+04h], 00000017h 0x00000061 inc ebx 0x00000062 push ebx 0x00000063 ret 0x00000064 pop ebx 0x00000065 ret 0x00000066 or ebx, dword ptr [ebp+122D2848h] 0x0000006c push eax 0x0000006d pushad 0x0000006e push edi 0x0000006f jbe 00007FB8D4EECBC6h 0x00000075 pop edi 0x00000076 push eax 0x00000077 push edx 0x00000078 pushad 0x00000079 popad 0x0000007a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2C6106 second address: 2C615B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEDFEh 0x00000007 push edx 0x00000008 je 00007FB8D4BFEDF6h 0x0000000e pushad 0x0000000f popad 0x00000010 pop edx 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push eax 0x00000014 push edx 0x00000015 jo 00007FB8D4BFEE06h 0x0000001b jmp 00007FB8D4BFEE00h 0x00000020 push eax 0x00000021 push edx 0x00000022 jp 00007FB8D4BFEDF6h 0x00000028 jmp 00007FB8D4BFEE09h 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2C615B second address: 2C615F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2C615F second address: 2C616B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FB8D4BFEDF6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2C616B second address: 2C6175 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007FB8D4EECBC6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2C92CD second address: 2C92E2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 pushad 0x00000009 push edi 0x0000000a pushad 0x0000000b popad 0x0000000c pop edi 0x0000000d jl 00007FB8D4BFEDFCh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2C92E2 second address: 2C9341 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 mov eax, dword ptr [esp+04h] 0x00000009 pushad 0x0000000a jo 00007FB8D4EECBC8h 0x00000010 pushad 0x00000011 popad 0x00000012 pushad 0x00000013 jmp 00007FB8D4EECBD4h 0x00000018 pushad 0x00000019 popad 0x0000001a popad 0x0000001b popad 0x0000001c mov eax, dword ptr [eax] 0x0000001e pushad 0x0000001f jmp 00007FB8D4EECBD5h 0x00000024 jmp 00007FB8D4EECBCBh 0x00000029 popad 0x0000002a mov dword ptr [esp+04h], eax 0x0000002e push eax 0x0000002f push edx 0x00000030 jmp 00007FB8D4EECBCAh 0x00000035 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2C9341 second address: 2C9346 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2C93EE second address: 2C93F8 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FB8D4EECBC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2C93F8 second address: 2C9456 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 jmp 00007FB8D4BFEE00h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e jc 00007FB8D4BFEDFEh 0x00000014 jbe 00007FB8D4BFEDF8h 0x0000001a pushad 0x0000001b popad 0x0000001c mov eax, dword ptr [esp+04h] 0x00000020 jmp 00007FB8D4BFEE09h 0x00000025 mov eax, dword ptr [eax] 0x00000027 jmp 00007FB8D4BFEE00h 0x0000002c mov dword ptr [esp+04h], eax 0x00000030 push edx 0x00000031 pushad 0x00000032 push eax 0x00000033 push edx 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2C9456 second address: 2C945C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2C951A second address: F2A2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 xor dword ptr [esp], 18CCEA61h 0x0000000c jmp 00007FB8D4BFEDFBh 0x00000011 push dword ptr [ebp+122D0199h] 0x00000017 stc 0x00000018 call dword ptr [ebp+122D2D5Eh] 0x0000001e pushad 0x0000001f stc 0x00000020 xor eax, eax 0x00000022 or dword ptr [ebp+122D2573h], ecx 0x00000028 mov edx, dword ptr [esp+28h] 0x0000002c xor dword ptr [ebp+122D27B2h], edi 0x00000032 mov dword ptr [ebp+122D2A80h], eax 0x00000038 jp 00007FB8D4BFEE0Ah 0x0000003e jmp 00007FB8D4BFEE02h 0x00000043 mov esi, 0000003Ch 0x00000048 mov dword ptr [ebp+122D27B2h], ebx 0x0000004e add esi, dword ptr [esp+24h] 0x00000052 pushad 0x00000053 xor si, C950h 0x00000058 mov ebx, 0AF191DCh 0x0000005d popad 0x0000005e lodsw 0x00000060 sub dword ptr [ebp+122D27B2h], eax 0x00000066 jo 00007FB8D4BFEE07h 0x0000006c jmp 00007FB8D4BFEE01h 0x00000071 add eax, dword ptr [esp+24h] 0x00000075 clc 0x00000076 mov ebx, dword ptr [esp+24h] 0x0000007a jmp 00007FB8D4BFEE05h 0x0000007f nop 0x00000080 push edx 0x00000081 push ecx 0x00000082 push eax 0x00000083 push edx 0x00000084 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 267A6C second address: 267A72 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 267A72 second address: 267A80 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jl 00007FB8D4BFEE02h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D236C second address: 2D2372 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D25F1 second address: 2D2600 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jng 00007FB8D4BFEDF6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D2600 second address: 2D260A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pushad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D2761 second address: 2D2779 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jmp 00007FB8D4BFEDFDh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D2B99 second address: 2D2BA0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D2BA0 second address: 2D2BA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D2D41 second address: 2D2D4D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jo 00007FB8D4EECBC6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D2E95 second address: 2D2E99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D2E99 second address: 2D2E9D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D8765 second address: 2D8769 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D8769 second address: 2D877B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8D4EECBCCh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D74FB second address: 2D74FF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D76AC second address: 2D76D8 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FB8D4EECBC6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FB8D4EECBD3h 0x00000011 jp 00007FB8D4EECBC8h 0x00000017 popad 0x00000018 push ebx 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D76D8 second address: 2D76FB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FB8D4BFEDF6h 0x0000000a jmp 00007FB8D4BFEE05h 0x0000000f popad 0x00000010 push edi 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D7835 second address: 2D783B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D783B second address: 2D7847 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push esi 0x00000004 pop esi 0x00000005 pop edx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ecx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D7847 second address: 2D785A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8D4EECBCDh 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D7CC8 second address: 2D7CD8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jbe 00007FB8D4BFEDFEh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D7CD8 second address: 2D7CDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2D8603 second address: 2D8607 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2DE1B4 second address: 2DE1C4 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 jnp 00007FB8D4EECBC6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2DE1C4 second address: 2DE1C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AC84F second address: 2AC853 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AC853 second address: 2AC86B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE04h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AC86B second address: 2AC8E0 instructions: 0x00000000 rdtsc 0x00000002 jg 00007FB8D4EECBC8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d push 00000000h 0x0000000f push ebp 0x00000010 call 00007FB8D4EECBC8h 0x00000015 pop ebp 0x00000016 mov dword ptr [esp+04h], ebp 0x0000001a add dword ptr [esp+04h], 0000001Ch 0x00000022 inc ebp 0x00000023 push ebp 0x00000024 ret 0x00000025 pop ebp 0x00000026 ret 0x00000027 pushad 0x00000028 mov ebx, 79F4087Ah 0x0000002d mov bl, D7h 0x0000002f popad 0x00000030 mov ecx, ebx 0x00000032 lea eax, dword ptr [ebp+1248D5C7h] 0x00000038 mov dword ptr [ebp+12467CE4h], edi 0x0000003e nop 0x0000003f jng 00007FB8D4EECBD4h 0x00000045 jmp 00007FB8D4EECBCEh 0x0000004a push eax 0x0000004b push eax 0x0000004c push edx 0x0000004d jmp 00007FB8D4EECBD3h 0x00000052 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2ACFDA second address: 2ACFDE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2ACFDE second address: 2ACFFD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edi 0x00000009 push ecx 0x0000000a pushad 0x0000000b popad 0x0000000c pop ecx 0x0000000d pop edi 0x0000000e xchg eax, esi 0x0000000f add dx, 8227h 0x00000014 nop 0x00000015 push eax 0x00000016 push edx 0x00000017 push esi 0x00000018 jno 00007FB8D4EECBC6h 0x0000001e pop esi 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2ACFFD second address: 2AD014 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FB8D4BFEDF8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e jc 00007FB8D4BFEDF6h 0x00000014 pop ecx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AD1D3 second address: 2AD1D8 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2ADA12 second address: 2ADA23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FB8D4BFEDF6h 0x0000000a popad 0x0000000b push eax 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2ADA23 second address: 2ADA4B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FB8D4EECBCEh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2ADA4B second address: 2ADA4F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2ADA4F second address: 2ADA6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 nop 0x00000008 mov ecx, dword ptr [ebp+122D1B5Ch] 0x0000000e lea eax, dword ptr [ebp+1248D60Bh] 0x00000014 adc cx, 52E6h 0x00000019 push eax 0x0000001a pushad 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2ADA6E second address: 2ADA72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2ADA72 second address: 2ADA8A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBCFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push edi 0x0000000b pop edi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2ADA8A second address: 28FE83 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 push 00000000h 0x0000000b push ebx 0x0000000c call 00007FB8D4BFEDF8h 0x00000011 pop ebx 0x00000012 mov dword ptr [esp+04h], ebx 0x00000016 add dword ptr [esp+04h], 00000015h 0x0000001e inc ebx 0x0000001f push ebx 0x00000020 ret 0x00000021 pop ebx 0x00000022 ret 0x00000023 mov dword ptr [ebp+122D19E1h], esi 0x00000029 lea eax, dword ptr [ebp+1248D5C7h] 0x0000002f sub dword ptr [ebp+1245EC06h], edx 0x00000035 nop 0x00000036 jmp 00007FB8D4BFEE09h 0x0000003b push eax 0x0000003c ja 00007FB8D4BFEE06h 0x00000042 nop 0x00000043 movsx edi, ax 0x00000046 call dword ptr [ebp+122D2D7Bh] 0x0000004c push eax 0x0000004d push edx 0x0000004e push edx 0x0000004f pushad 0x00000050 popad 0x00000051 pop edx 0x00000052 jmp 00007FB8D4BFEE04h 0x00000057 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2E1B03 second address: 2E1B09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2E1B09 second address: 2E1B0D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2E1B0D second address: 2E1B2F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FB8D4EECBCEh 0x0000000b push eax 0x0000000c push edx 0x0000000d jno 00007FB8D4EECBCCh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2E1B2F second address: 2E1B40 instructions: 0x00000000 rdtsc 0x00000002 ja 00007FB8D4BFEDFCh 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2E1E22 second address: 2E1E31 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 jnc 00007FB8D4EECBC6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2E1E31 second address: 2E1E3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jo 00007FB8D4BFEDFCh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2E1FDE second address: 2E1FE2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2E95ED second address: 2E95F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2E989C second address: 2E98AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8D4EECBCAh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2E98AA second address: 2E98F0 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jng 00007FB8D4BFEDFEh 0x0000000c jmp 00007FB8D4BFEE07h 0x00000011 push eax 0x00000012 jmp 00007FB8D4BFEE08h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2E9E7D second address: 2E9E81 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2EA2B4 second address: 2EA2B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 26436C second address: 264372 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2ED990 second address: 2ED99A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2ED99A second address: 2ED9A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2ED9A4 second address: 2ED9AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2EFC2F second address: 2EFC39 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 pop edx 0x00000006 push eax 0x00000007 push edx 0x00000008 push edi 0x00000009 pop edi 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F4CB5 second address: 2F4CD3 instructions: 0x00000000 rdtsc 0x00000002 je 00007FB8D4BFEE04h 0x00000008 push eax 0x00000009 pop eax 0x0000000a jmp 00007FB8D4BFEDFCh 0x0000000f push eax 0x00000010 push edx 0x00000011 jne 00007FB8D4BFEDF6h 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F4039 second address: 2F403E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F403E second address: 2F4059 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8D4BFEE07h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F4211 second address: 2F4233 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FB8D4EECBD9h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F4233 second address: 2F423F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F423F second address: 2F4243 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F4243 second address: 2F424C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F439C second address: 2F43A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FB8D4EECBC6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F43A6 second address: 2F43BA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jc 00007FB8D4BFEDF6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ebx 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F43BA second address: 2F43BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F4568 second address: 2F456C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F482F second address: 2F4847 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F99BC second address: 2F99C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F9C5F second address: 2F9C71 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FB8D4EECBCCh 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F9C71 second address: 2F9C7D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007FB8D4BFEDF6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F9C7D second address: 2F9C81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F9C81 second address: 2F9C85 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F9C85 second address: 2F9CB7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007FB8D4EECBD9h 0x0000000e jmp 00007FB8D4EECBCEh 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F9DEA second address: 2F9E09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push edx 0x00000008 pop edx 0x00000009 jns 00007FB8D4BFEDF6h 0x0000000f pop ebx 0x00000010 popad 0x00000011 jg 00007FB8D4BFEE10h 0x00000017 jg 00007FB8D4BFEDFCh 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F9E09 second address: 2F9E17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FB8D4EECBCEh 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2F9F68 second address: 2F9F6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2FA0BD second address: 2FA0C3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2FA0C3 second address: 2FA0E5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 jmp 00007FB8D4BFEE08h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AD549 second address: 2AD584 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop eax 0x00000005 push edx 0x00000006 pop edx 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jnc 00007FB8D4EECBD2h 0x00000011 nop 0x00000012 mov ecx, eax 0x00000014 call 00007FB8D4EECBCAh 0x00000019 mov ecx, 65CA761Eh 0x0000001e pop ecx 0x0000001f push 00000004h 0x00000021 adc ch, FFFFFFBCh 0x00000024 nop 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 push eax 0x00000029 push edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AD584 second address: 2AD58B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2AD58B second address: 2AD5B8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jne 00007FB8D4EECBCCh 0x00000011 push esi 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2FDD8A second address: 2FDD98 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pushad 0x00000004 popad 0x00000005 pop eax 0x00000006 jc 00007FB8D4BFEE02h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2FDD98 second address: 2FDDBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FB8D4EECBC6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jnp 00007FB8D4EECC02h 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FB8D4EECBCCh 0x00000019 jns 00007FB8D4EECBC6h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2FDDBE second address: 2FDDC2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2FDDC2 second address: 2FDDDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FB8D4EECBD0h 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2FDDDC second address: 2FDDE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2FD513 second address: 2FD517 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2FD517 second address: 2FD523 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 2FD523 second address: 2FD53A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8D4EECBD3h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 304FA4 second address: 304FB3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEDFAh 0x00000007 push edi 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 3030C8 second address: 3030D4 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FB8D4EECBC6h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 30353A second address: 303555 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jo 00007FB8D4BFEDF6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jg 00007FB8D4BFEDFAh 0x00000012 pushad 0x00000013 popad 0x00000014 push edi 0x00000015 pop edi 0x00000016 pushad 0x00000017 push ecx 0x00000018 pop ecx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 303555 second address: 303589 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8D4EECBCEh 0x00000009 popad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jp 00007FB8D4EECBDEh 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 303E87 second address: 303E99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FB8D4BFEDFBh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 303E99 second address: 303EA9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB8D4EECBCBh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 304C41 second address: 304C67 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE07h 0x00000007 jmp 00007FB8D4BFEDFBh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 304C67 second address: 304C8A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnp 00007FB8D4EECBC6h 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b pushad 0x0000000c popad 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push edx 0x00000013 jmp 00007FB8D4EECBCFh 0x00000018 pop edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 30939C second address: 3093A6 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FB8D4BFEDF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 265F07 second address: 265F0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 265F0B second address: 265F39 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE03h 0x00000007 jmp 00007FB8D4BFEE07h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 31603F second address: 31605A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD7h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 31605A second address: 31606D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FB8D4BFEDFBh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 31646D second address: 3164A3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b pop eax 0x0000000c jmp 00007FB8D4EECBD4h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 316649 second address: 316653 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FB8D4BFEE02h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 316653 second address: 316659 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 316659 second address: 316669 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007FB8D4BFEE12h 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 316669 second address: 316677 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007FB8D4EECBD2h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 3167FF second address: 316818 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FB8D4BFEE00h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 31761E second address: 317649 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBCFh 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FB8D4EECBD4h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 315509 second address: 315528 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007FB8D4BFEDF6h 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FB8D4BFEE00h 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 31AB0F second address: 31AB1A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 320B40 second address: 320B44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 320B44 second address: 320B6F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD2h 0x00000007 ja 00007FB8D4EECBC6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 jne 00007FB8D4EECBC6h 0x00000016 jo 00007FB8D4EECBC6h 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 320B6F second address: 320B84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FB8D4BFEDFEh 0x0000000c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 3208A4 second address: 3208B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jc 00007FB8D4EECBCCh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 32F25E second address: 32F262 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 32F262 second address: 32F26C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 32F26C second address: 32F270 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 32EB84 second address: 32EB88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 32EB88 second address: 32EB9F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FB8D4BFEDFFh 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 32ED36 second address: 32ED41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007FB8D4EECBC6h 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 32ED41 second address: 32ED5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8D4BFEE07h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 332051 second address: 332055 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 25F31B second address: 25F334 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FB8D4BFEE00h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 25F334 second address: 25F341 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FB8D4EECBC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 331EE1 second address: 331EE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 331EE5 second address: 331EE9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 331EE9 second address: 331F0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8D4BFEE08h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e push ecx 0x0000000f pop ecx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 3355BF second address: 3355D1 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jbe 00007FB8D4EECBC6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ebx 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 pop eax 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 3355D1 second address: 3355E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jns 00007FB8D4BFEDFAh 0x0000000e pushad 0x0000000f popad 0x00000010 push edx 0x00000011 pop edx 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 33DF3E second address: 33DF42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 342D22 second address: 342D28 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 342D28 second address: 342D2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 256E38 second address: 256E65 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8D4BFEDFEh 0x00000009 popad 0x0000000a jns 00007FB8D4BFEDFEh 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 push esi 0x00000015 pop esi 0x00000016 js 00007FB8D4BFEDF6h 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 342BC8 second address: 342BEE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 js 00007FB8D4EECBC6h 0x0000000b jmp 00007FB8D4EECBD3h 0x00000010 popad 0x00000011 pushad 0x00000012 push ebx 0x00000013 pop ebx 0x00000014 push esi 0x00000015 pop esi 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 3442BC second address: 3442C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 3442C2 second address: 3442C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 3442C8 second address: 3442D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 346C24 second address: 346C4A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBCEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FB8D4EECBD4h 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 351071 second address: 35108B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8D4BFEE06h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 35108B second address: 35108F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 35108F second address: 3510AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FB8D4BFEE02h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push esi 0x0000000e pop esi 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 3510AB second address: 3510AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 34FB97 second address: 34FB9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 34FB9B second address: 34FBAB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007FB8D4EECBC6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 34FFE5 second address: 34FFEB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 35013C second address: 350147 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 355E0B second address: 355E11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 357837 second address: 35783B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 35783B second address: 357841 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 357841 second address: 35784B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jno 00007FB8D4EECBC6h 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 357984 second address: 357993 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jng 00007FB8D4BFEDF6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 38D75A second address: 38D75F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 38C94A second address: 38C94E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 38C94E second address: 38C954 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 38CF9C second address: 38CFBB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push edx 0x0000000a pop edx 0x0000000b jmp 00007FB8D4BFEE02h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 38CFBB second address: 38CFCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jns 00007FB8D4EECBC6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 38CFCA second address: 38CFCE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 38D2BF second address: 38D2D7 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FB8D4EECBCEh 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 38D2D7 second address: 38D2F4 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FB8D4BFEDF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FB8D4BFEDFFh 0x00000011 push edx 0x00000012 pop edx 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 38D2F4 second address: 38D30C instructions: 0x00000000 rdtsc 0x00000002 jp 00007FB8D4EECBC6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push ecx 0x0000000b push eax 0x0000000c pop eax 0x0000000d pop ecx 0x0000000e popad 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 jg 00007FB8D4EECBC6h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 39174B second address: 39174F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 39174F second address: 391755 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 3917C9 second address: 3917E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE02h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edi 0x0000000a push eax 0x0000000b push ecx 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 391A13 second address: 391A80 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jnl 00007FB8D4EECBC6h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp], eax 0x0000000f and edx, dword ptr [ebp+122D25DBh] 0x00000015 push 00000004h 0x00000017 push edi 0x00000018 stc 0x00000019 pop edx 0x0000001a call 00007FB8D4EECBC9h 0x0000001f jmp 00007FB8D4EECBD9h 0x00000024 push eax 0x00000025 jmp 00007FB8D4EECBD3h 0x0000002a mov eax, dword ptr [esp+04h] 0x0000002e jne 00007FB8D4EECBD1h 0x00000034 mov eax, dword ptr [eax] 0x00000036 pushad 0x00000037 pushad 0x00000038 pushad 0x00000039 popad 0x0000003a push eax 0x0000003b push edx 0x0000003c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 391A80 second address: 391A8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jne 00007FB8D4BFEDF6h 0x0000000d rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 391A8D second address: 391AB7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b jng 00007FB8D4EECBE9h 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FB8D4EECBD7h 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 391CFD second address: 391D0B instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FB8D4BFEDF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 391D0B second address: 391D0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 391D0F second address: 391D40 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FB8D4BFEDF6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b mov dword ptr [esp], eax 0x0000000e mov edx, dword ptr [ebp+122D2B0Ch] 0x00000014 push dword ptr [ebp+122D27A4h] 0x0000001a pushad 0x0000001b mov edi, dword ptr [ebp+122D2AE4h] 0x00000021 mov dword ptr [ebp+122D1C01h], edi 0x00000027 popad 0x00000028 push AD5866B3h 0x0000002d push edi 0x0000002e pushad 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0DC3 second address: 49F0DC8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A4078A second address: 4A407B2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEDFDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FB8D4BFEE01h 0x0000000f xchg eax, ebp 0x00000010 pushad 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A407B2 second address: 4A407FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushfd 0x00000006 jmp 00007FB8D4EECBCFh 0x0000000b jmp 00007FB8D4EECBD3h 0x00000010 popfd 0x00000011 popad 0x00000012 mov ebp, esp 0x00000014 pushad 0x00000015 mov dx, cx 0x00000018 pushad 0x00000019 jmp 00007FB8D4EECBCEh 0x0000001e mov esi, 4A2A2F01h 0x00000023 popad 0x00000024 popad 0x00000025 pop ebp 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 push edx 0x0000002a pushad 0x0000002b popad 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A407FF second address: 4A40818 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE05h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49B0C10 second address: 49B0C2B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49B0C2B second address: 49B0C74 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 pushad 0x0000000a movzx eax, bx 0x0000000d pushfd 0x0000000e jmp 00007FB8D4BFEE09h 0x00000013 jmp 00007FB8D4BFEDFBh 0x00000018 popfd 0x00000019 popad 0x0000001a push eax 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e mov edx, eax 0x00000020 jmp 00007FB8D4BFEDFEh 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49B0C74 second address: 49B0D1E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FB8D4EECBCDh 0x00000009 add cx, 1C46h 0x0000000e jmp 00007FB8D4EECBD1h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 xchg eax, ebp 0x00000018 pushad 0x00000019 movzx ecx, dx 0x0000001c mov di, 80FCh 0x00000020 popad 0x00000021 mov ebp, esp 0x00000023 pushad 0x00000024 pushfd 0x00000025 jmp 00007FB8D4EECBD1h 0x0000002a sub eax, 1C4B5456h 0x00000030 jmp 00007FB8D4EECBD1h 0x00000035 popfd 0x00000036 pushfd 0x00000037 jmp 00007FB8D4EECBD0h 0x0000003c adc esi, 44C98E78h 0x00000042 jmp 00007FB8D4EECBCBh 0x00000047 popfd 0x00000048 popad 0x00000049 push dword ptr [ebp+04h] 0x0000004c pushad 0x0000004d pushad 0x0000004e jmp 00007FB8D4EECBD2h 0x00000053 popad 0x00000054 mov bh, ah 0x00000056 popad 0x00000057 push dword ptr [ebp+0Ch] 0x0000005a push eax 0x0000005b push edx 0x0000005c push eax 0x0000005d push edx 0x0000005e pushad 0x0000005f popad 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49B0D1E second address: 49B0D30 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEDFEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49B0D30 second address: 49B0D46 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FB8D4EECBD1h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0A7E second address: 49F0A86 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 movsx edi, ax 0x00000007 popad 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0A86 second address: 49F0A9A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bx, 107Ch 0x00000007 movsx ebx, si 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov ecx, edx 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0A9A second address: 49F0AC9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cl, E4h 0x00000005 movsx ebx, cx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007FB8D4BFEDFCh 0x00000015 adc ch, FFFFFFF8h 0x00000018 jmp 00007FB8D4BFEDFBh 0x0000001d popfd 0x0000001e movzx ecx, di 0x00000021 popad 0x00000022 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0AC9 second address: 49F0ACE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49E09CD second address: 49E09D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49E09D3 second address: 49E09E4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8D4EECBCDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49E09E4 second address: 49E0A50 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE01h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d pushad 0x0000000e movzx esi, di 0x00000011 pushfd 0x00000012 jmp 00007FB8D4BFEE09h 0x00000017 adc cx, 0CC6h 0x0000001c jmp 00007FB8D4BFEE01h 0x00000021 popfd 0x00000022 popad 0x00000023 pop ebp 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007FB8D4BFEE08h 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49E0A50 second address: 49E0A5F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBCBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49E0A5F second address: 49E0A65 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49E0A65 second address: 49E0A69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A30E64 second address: 4A30E68 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A30E68 second address: 4A30E6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A30E6E second address: 4A30E74 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A30E74 second address: 4A30E78 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A30E78 second address: 4A30EBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a pushad 0x0000000b jmp 00007FB8D4BFEE02h 0x00000010 push eax 0x00000011 push edx 0x00000012 pushfd 0x00000013 jmp 00007FB8D4BFEE00h 0x00000018 adc esi, 01C0C198h 0x0000001e jmp 00007FB8D4BFEDFBh 0x00000023 popfd 0x00000024 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A30EBA second address: 4A30EF1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pop ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FB8D4EECBD7h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0B33 second address: 49F0B45 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEDFEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0B45 second address: 49F0B4B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0B4B second address: 49F0B4F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0B4F second address: 49F0B5E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0B5E second address: 49F0B62 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0B62 second address: 49F0B68 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0B68 second address: 49F0B6E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0B6E second address: 49F0B91 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b jmp 00007FB8D4EECBD0h 0x00000010 mov ebp, esp 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0B91 second address: 49F0B95 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0B95 second address: 49F0BB2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0BB2 second address: 49F0C23 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE01h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007FB8D4BFEE03h 0x00000013 add esi, 5DB726AEh 0x00000019 jmp 00007FB8D4BFEE09h 0x0000001e popfd 0x0000001f pushfd 0x00000020 jmp 00007FB8D4BFEE00h 0x00000025 add ecx, 6ECEE028h 0x0000002b jmp 00007FB8D4BFEDFBh 0x00000030 popfd 0x00000031 popad 0x00000032 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A4029F second address: 4A402AE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBCBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A402AE second address: 4A402B4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A402B4 second address: 4A402B8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A402B8 second address: 4A40321 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEDFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d call 00007FB8D4BFEDFFh 0x00000012 pushfd 0x00000013 jmp 00007FB8D4BFEE08h 0x00000018 or eax, 36307F58h 0x0000001e jmp 00007FB8D4BFEDFBh 0x00000023 popfd 0x00000024 pop eax 0x00000025 call 00007FB8D4BFEE09h 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A40321 second address: 4A403A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 xchg eax, ebp 0x00000007 pushad 0x00000008 call 00007FB8D4EECBD3h 0x0000000d pushfd 0x0000000e jmp 00007FB8D4EECBD8h 0x00000013 xor eax, 3879E348h 0x00000019 jmp 00007FB8D4EECBCBh 0x0000001e popfd 0x0000001f pop eax 0x00000020 jmp 00007FB8D4EECBD9h 0x00000025 popad 0x00000026 mov ebp, esp 0x00000028 jmp 00007FB8D4EECBCEh 0x0000002d mov eax, dword ptr [ebp+08h] 0x00000030 push eax 0x00000031 push edx 0x00000032 push eax 0x00000033 push edx 0x00000034 jmp 00007FB8D4EECBCAh 0x00000039 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A403A3 second address: 4A403A9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A403A9 second address: 4A403F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBCEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 and dword ptr [eax], 00000000h 0x0000000c pushad 0x0000000d movzx esi, bx 0x00000010 call 00007FB8D4EECBD3h 0x00000015 movzx eax, bx 0x00000018 pop edi 0x00000019 popad 0x0000001a and dword ptr [eax+04h], 00000000h 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007FB8D4EECBD7h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A403F7 second address: 4A403FF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, bx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A403FF second address: 4A4040D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pop ebp 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A4040D second address: 4A40411 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A40411 second address: 4A40415 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A40415 second address: 4A4041B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A4041B second address: 4A4042D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8D4EECBCEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A4042D second address: 4A40431 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49E086F second address: 49E08E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, bx 0x00000006 pushfd 0x00000007 jmp 00007FB8D4EECBD3h 0x0000000c adc al, 0000007Eh 0x0000000f jmp 00007FB8D4EECBD9h 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 xchg eax, ebp 0x00000019 jmp 00007FB8D4EECBCEh 0x0000001e push eax 0x0000001f pushad 0x00000020 call 00007FB8D4EECBCCh 0x00000025 mov dl, cl 0x00000027 pop edi 0x00000028 popad 0x00000029 xchg eax, ebp 0x0000002a push eax 0x0000002b push edx 0x0000002c push eax 0x0000002d push edx 0x0000002e jmp 00007FB8D4EECBD4h 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49E08E3 second address: 49E08F2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEDFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A307A6 second address: 4A307AD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov al, bl 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A307AD second address: 4A307C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 xchg eax, ebp 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b mov dx, D90Ch 0x0000000f mov edx, 4DDC79F8h 0x00000014 popad 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A307C2 second address: 4A307D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8D4EECBCDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A307D3 second address: 4A307D7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A307D7 second address: 4A307F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FB8D4EECBD3h 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A307F5 second address: 4A307FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A307FB second address: 4A30810 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FB8D4EECBCAh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A30810 second address: 4A30816 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A30816 second address: 4A3081A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A3081A second address: 4A3081E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A10DF3 second address: 4A10DF9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C0113 second address: 49C0117 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C0117 second address: 49C012A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBCFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C012A second address: 49C0130 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C0130 second address: 49C0134 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C0134 second address: 49C0167 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a movzx ecx, bx 0x0000000d pushad 0x0000000e mov ecx, edi 0x00000010 mov eax, edi 0x00000012 popad 0x00000013 popad 0x00000014 xchg eax, ebp 0x00000015 jmp 00007FB8D4BFEDFDh 0x0000001a mov ebp, esp 0x0000001c push eax 0x0000001d push edx 0x0000001e jmp 00007FB8D4BFEDFDh 0x00000023 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C0167 second address: 49C0185 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 and esp, FFFFFFF8h 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C0185 second address: 49C0189 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C0189 second address: 49C018D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C018D second address: 49C0193 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C0193 second address: 49C01C6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov cl, A3h 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push esp 0x0000000b jmp 00007FB8D4EECBD6h 0x00000010 mov dword ptr [esp], ecx 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FB8D4EECBCCh 0x0000001b rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C01C6 second address: 49C0232 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FB8D4BFEE02h 0x00000008 or al, 00000078h 0x0000000b jmp 00007FB8D4BFEDFBh 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 push ecx 0x00000014 mov dl, 18h 0x00000016 pop ecx 0x00000017 popad 0x00000018 push ebx 0x00000019 pushad 0x0000001a mov eax, 194A2AF9h 0x0000001f popad 0x00000020 mov dword ptr [esp], ebx 0x00000023 pushad 0x00000024 movzx eax, dx 0x00000027 pushfd 0x00000028 jmp 00007FB8D4BFEE03h 0x0000002d jmp 00007FB8D4BFEE03h 0x00000032 popfd 0x00000033 popad 0x00000034 mov ebx, dword ptr [ebp+10h] 0x00000037 push eax 0x00000038 push edx 0x00000039 push eax 0x0000003a push edx 0x0000003b pushad 0x0000003c popad 0x0000003d rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C0232 second address: 49C0238 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C0238 second address: 49C023E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C023E second address: 49C0242 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C0242 second address: 49C0251 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, esi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C0251 second address: 49C0255 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C0255 second address: 49C0272 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE09h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C0272 second address: 49C02B6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FB8D4EECBD1h 0x0000000f xchg eax, esi 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FB8D4EECBD8h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C02B6 second address: 49C02C5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEDFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C02C5 second address: 49C032E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esi, dword ptr [ebp+08h] 0x0000000c jmp 00007FB8D4EECBCEh 0x00000011 xchg eax, edi 0x00000012 jmp 00007FB8D4EECBD0h 0x00000017 push eax 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b pushfd 0x0000001c jmp 00007FB8D4EECBCCh 0x00000021 jmp 00007FB8D4EECBD5h 0x00000026 popfd 0x00000027 mov edx, esi 0x00000029 popad 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C032E second address: 49C0346 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEDFDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, edi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C0346 second address: 49C034A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C034A second address: 49C0350 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C0350 second address: 49C03A6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test esi, esi 0x0000000b pushad 0x0000000c mov di, si 0x0000000f mov ch, AFh 0x00000011 popad 0x00000012 je 00007FB94828AE6Ch 0x00000018 pushad 0x00000019 pushfd 0x0000001a jmp 00007FB8D4EECBCBh 0x0000001f xor ecx, 6E59C4AEh 0x00000025 jmp 00007FB8D4EECBD9h 0x0000002a popfd 0x0000002b push eax 0x0000002c push edx 0x0000002d mov dl, al 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C03A6 second address: 49C03F1 instructions: 0x00000000 rdtsc 0x00000002 mov dh, 32h 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007FB8D4BFEE07h 0x00000017 adc ecx, 0D3ACF6Eh 0x0000001d jmp 00007FB8D4BFEE09h 0x00000022 popfd 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49C03F1 second address: 49C03F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0014 second address: 49F001A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F001A second address: 49F001E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F001E second address: 49F0051 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEDFDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007FB8D4BFEDFEh 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FB8D4BFEDFEh 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0051 second address: 49F0057 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0057 second address: 49F005B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F005B second address: 49F006A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F006A second address: 49F0070 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0070 second address: 49F00C7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBCDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b jmp 00007FB8D4EECBCEh 0x00000010 and esp, FFFFFFF8h 0x00000013 jmp 00007FB8D4EECBD0h 0x00000018 xchg eax, ebx 0x00000019 jmp 00007FB8D4EECBD0h 0x0000001e push eax 0x0000001f jmp 00007FB8D4EECBCBh 0x00000024 xchg eax, ebx 0x00000025 pushad 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 pop edx 0x0000002a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F00C7 second address: 49F0146 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FB8D4BFEDFEh 0x00000008 jmp 00007FB8D4BFEE05h 0x0000000d popfd 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 mov di, 1222h 0x00000015 pop ebx 0x00000016 popad 0x00000017 xchg eax, esi 0x00000018 jmp 00007FB8D4BFEE06h 0x0000001d push eax 0x0000001e pushad 0x0000001f mov ebx, 00679264h 0x00000024 pushfd 0x00000025 jmp 00007FB8D4BFEDFDh 0x0000002a xor cx, 36A6h 0x0000002f jmp 00007FB8D4BFEE01h 0x00000034 popfd 0x00000035 popad 0x00000036 xchg eax, esi 0x00000037 push eax 0x00000038 push edx 0x00000039 pushad 0x0000003a mov ax, di 0x0000003d mov ax, bx 0x00000040 popad 0x00000041 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0146 second address: 49F0161 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8D4EECBD7h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0161 second address: 49F017E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov esi, dword ptr [ebp+08h] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FB8D4BFEE00h 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F017E second address: 49F01BC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FB8D4EECBD1h 0x00000009 adc cl, FFFFFFC6h 0x0000000c jmp 00007FB8D4EECBD1h 0x00000011 popfd 0x00000012 mov ecx, 1447EB77h 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a sub ebx, ebx 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f mov ax, 268Bh 0x00000023 pushad 0x00000024 popad 0x00000025 popad 0x00000026 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F01BC second address: 49F021F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FB8D4BFEDFDh 0x00000009 jmp 00007FB8D4BFEDFBh 0x0000000e popfd 0x0000000f pushfd 0x00000010 jmp 00007FB8D4BFEE08h 0x00000015 xor ax, B0F8h 0x0000001a jmp 00007FB8D4BFEDFBh 0x0000001f popfd 0x00000020 popad 0x00000021 pop edx 0x00000022 pop eax 0x00000023 test esi, esi 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007FB8D4BFEE05h 0x0000002c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F021F second address: 49F023F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FB948252D20h 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F023F second address: 49F0275 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007FB8D4BFEE09h 0x0000000a xor si, C1A6h 0x0000000f jmp 00007FB8D4BFEE01h 0x00000014 popfd 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0275 second address: 49F02BA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [esi+08h], DDEEDDEEh 0x00000010 jmp 00007FB8D4EECBCEh 0x00000015 mov ecx, esi 0x00000017 push eax 0x00000018 push edx 0x00000019 jmp 00007FB8D4EECBD7h 0x0000001e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F02BA second address: 49F02D3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dl, 3Ch 0x00000005 mov esi, 2AECC497h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d je 00007FB947F64ED2h 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F02D3 second address: 49F02D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F02D7 second address: 49F02DD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F02DD second address: 49F031A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 call 00007FB8D4EECBCAh 0x0000000a pop esi 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e test byte ptr [77DE6968h], 00000002h 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 pushfd 0x00000019 jmp 00007FB8D4EECBCAh 0x0000001e xor ecx, 006AC668h 0x00000024 jmp 00007FB8D4EECBCBh 0x00000029 popfd 0x0000002a mov edx, eax 0x0000002c popad 0x0000002d rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F031A second address: 49F032E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8D4BFEE00h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F032E second address: 49F0357 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jne 00007FB948252C46h 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov edx, esi 0x00000013 call 00007FB8D4EECBD4h 0x00000018 pop ecx 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0357 second address: 49F035D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F035D second address: 49F0361 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0361 second address: 49F0365 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F0365 second address: 49F037B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov edx, dword ptr [ebp+0Ch] 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e mov edx, 655AF896h 0x00000013 push edx 0x00000014 pop eax 0x00000015 popad 0x00000016 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49F04B5 second address: 49F04BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49D0D67 second address: 49D0D6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49D0D6B second address: 49D0D6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49D0D6F second address: 49D0D75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49D0D75 second address: 49D0D7B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49D0D7B second address: 49D0D93 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FB8D4EECBCBh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49D0D93 second address: 49D0D99 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49D0D99 second address: 49D0D9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A50EE9 second address: 4A50F36 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE09h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007FB8D4BFEDFEh 0x0000000f push eax 0x00000010 jmp 00007FB8D4BFEDFBh 0x00000015 xchg eax, ebp 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FB8D4BFEE00h 0x0000001f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A50F36 second address: 4A50F3A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A50F3A second address: 4A50F40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A50F40 second address: 4A50F51 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8D4EECBCDh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A50212 second address: 4A50218 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A50218 second address: 4A50299 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b jmp 00007FB8D4EECBCEh 0x00000010 mov ch, 98h 0x00000012 popad 0x00000013 mov ebp, esp 0x00000015 pushad 0x00000016 pushfd 0x00000017 jmp 00007FB8D4EECBD3h 0x0000001c or esi, 7E17479Eh 0x00000022 jmp 00007FB8D4EECBD9h 0x00000027 popfd 0x00000028 mov edx, esi 0x0000002a popad 0x0000002b pop ebp 0x0000002c push eax 0x0000002d push edx 0x0000002e jmp 00007FB8D4EECBD9h 0x00000033 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A50299 second address: 4A5029F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 49E06BE second address: 49E06F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 call 00007FB8D4EECBD4h 0x00000009 pop eax 0x0000000a popad 0x0000000b popad 0x0000000c push ebp 0x0000000d pushad 0x0000000e call 00007FB8D4EECBD3h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A505D9 second address: 4A505E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEDFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A204BD second address: 4A205BB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b push edi 0x0000000c mov edx, ecx 0x0000000e pop ecx 0x0000000f mov esi, edx 0x00000011 popad 0x00000012 xchg eax, ebp 0x00000013 pushad 0x00000014 pushfd 0x00000015 jmp 00007FB8D4EECBD7h 0x0000001a xor esi, 48122C7Eh 0x00000020 jmp 00007FB8D4EECBD9h 0x00000025 popfd 0x00000026 call 00007FB8D4EECBD0h 0x0000002b pushad 0x0000002c popad 0x0000002d pop eax 0x0000002e popad 0x0000002f mov ebp, esp 0x00000031 pushad 0x00000032 mov ebx, 69726590h 0x00000037 call 00007FB8D4EECBD9h 0x0000003c mov di, si 0x0000003f pop eax 0x00000040 popad 0x00000041 and esp, FFFFFFF0h 0x00000044 pushad 0x00000045 pushfd 0x00000046 jmp 00007FB8D4EECBD4h 0x0000004b jmp 00007FB8D4EECBD5h 0x00000050 popfd 0x00000051 popad 0x00000052 sub esp, 44h 0x00000055 jmp 00007FB8D4EECBCEh 0x0000005a xchg eax, ebx 0x0000005b push eax 0x0000005c push edx 0x0000005d pushad 0x0000005e pushfd 0x0000005f jmp 00007FB8D4EECBD9h 0x00000064 jmp 00007FB8D4EECBCBh 0x00000069 popfd 0x0000006a popad 0x0000006b rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A205BB second address: 4A205D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8D4BFEE04h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A205D3 second address: 4A205D7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A205D7 second address: 4A205EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FB8D4BFEDFDh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A205EF second address: 4A206BA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FB8D4EECBD7h 0x00000009 and ch, FFFFFFCEh 0x0000000c jmp 00007FB8D4EECBD9h 0x00000011 popfd 0x00000012 jmp 00007FB8D4EECBD0h 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a xchg eax, ebx 0x0000001b pushad 0x0000001c jmp 00007FB8D4EECBCEh 0x00000021 mov bx, cx 0x00000024 popad 0x00000025 xchg eax, esi 0x00000026 pushad 0x00000027 mov ch, 45h 0x00000029 push ebx 0x0000002a jmp 00007FB8D4EECBD2h 0x0000002f pop eax 0x00000030 popad 0x00000031 push eax 0x00000032 pushad 0x00000033 call 00007FB8D4EECBCEh 0x00000038 call 00007FB8D4EECBD2h 0x0000003d pop eax 0x0000003e pop edx 0x0000003f mov ecx, 4A39B277h 0x00000044 popad 0x00000045 xchg eax, esi 0x00000046 pushad 0x00000047 pushad 0x00000048 mov esi, 2746AB05h 0x0000004d mov cx, F281h 0x00000051 popad 0x00000052 mov cx, 35BDh 0x00000056 popad 0x00000057 xchg eax, edi 0x00000058 push eax 0x00000059 push edx 0x0000005a push eax 0x0000005b push edx 0x0000005c jmp 00007FB8D4EECBD2h 0x00000061 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A206BA second address: 4A206C9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEDFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A206C9 second address: 4A206E1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8D4EECBD4h 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A206E1 second address: 4A206E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A206E5 second address: 4A206FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FB8D4EECBCDh 0x00000010 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A206FD second address: 4A2072F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE01h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, edi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FB8D4BFEE08h 0x00000013 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A2072F second address: 4A20735 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20735 second address: 4A207BC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop ebx 0x00000005 pushfd 0x00000006 jmp 00007FB8D4BFEE08h 0x0000000b sbb cx, BA48h 0x00000010 jmp 00007FB8D4BFEDFBh 0x00000015 popfd 0x00000016 popad 0x00000017 pop edx 0x00000018 pop eax 0x00000019 mov edi, dword ptr [ebp+08h] 0x0000001c jmp 00007FB8D4BFEE06h 0x00000021 mov dword ptr [esp+24h], 00000000h 0x00000029 jmp 00007FB8D4BFEE00h 0x0000002e lock bts dword ptr [edi], 00000000h 0x00000033 jmp 00007FB8D4BFEE00h 0x00000038 jc 00007FB947EE0A7Ch 0x0000003e push eax 0x0000003f push edx 0x00000040 pushad 0x00000041 mov dl, 97h 0x00000043 mov bx, cx 0x00000046 popad 0x00000047 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A207BC second address: 4A207CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8D4EECBCEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A207CE second address: 4A20801 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEDFBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop edi 0x0000000c jmp 00007FB8D4BFEE06h 0x00000011 pop esi 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 mov dl, 63h 0x00000017 mov cx, 6355h 0x0000001b popad 0x0000001c rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20801 second address: 4A20807 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20807 second address: 4A2080B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A2080B second address: 4A20823 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FB8D4EECBCBh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20823 second address: 4A20840 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE09h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20840 second address: 4A20866 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esp, ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FB8D4EECBCDh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20866 second address: 4A208CE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FB8D4BFEE07h 0x00000009 or eax, 28F4B22Eh 0x0000000f jmp 00007FB8D4BFEE09h 0x00000014 popfd 0x00000015 jmp 00007FB8D4BFEE00h 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d pop ebp 0x0000001e push eax 0x0000001f push edx 0x00000020 jmp 00007FB8D4BFEE07h 0x00000025 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A200A8 second address: 4A2010B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FB8D4EECBD8h 0x00000009 sbb eax, 01A69F68h 0x0000000f jmp 00007FB8D4EECBCBh 0x00000014 popfd 0x00000015 mov ax, 515Fh 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c mov ebp, esp 0x0000001e jmp 00007FB8D4EECBD2h 0x00000023 xchg eax, ebx 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007FB8D4EECBD7h 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A2010B second address: 4A20133 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE09h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f mov ax, 640Fh 0x00000013 popad 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20133 second address: 4A20139 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20139 second address: 4A2013D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A2013D second address: 4A20141 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20141 second address: 4A2014F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A2014F second address: 4A20159 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov eax, 0EACBB91h 0x00000009 popad 0x0000000a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20159 second address: 4A20218 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE07h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007FB8D4BFEE04h 0x00000011 and al, 00000048h 0x00000014 jmp 00007FB8D4BFEDFBh 0x00000019 popfd 0x0000001a mov edi, ecx 0x0000001c popad 0x0000001d push eax 0x0000001e jmp 00007FB8D4BFEE05h 0x00000023 xchg eax, esi 0x00000024 pushad 0x00000025 push esi 0x00000026 push ebx 0x00000027 pop eax 0x00000028 pop ebx 0x00000029 pushfd 0x0000002a jmp 00007FB8D4BFEE04h 0x0000002f jmp 00007FB8D4BFEE05h 0x00000034 popfd 0x00000035 popad 0x00000036 mov esi, dword ptr [ebp+08h] 0x00000039 jmp 00007FB8D4BFEDFEh 0x0000003e sub ecx, ecx 0x00000040 push eax 0x00000041 push edx 0x00000042 pushad 0x00000043 pushfd 0x00000044 jmp 00007FB8D4BFEDFAh 0x00000049 add si, 4598h 0x0000004e jmp 00007FB8D4BFEDFBh 0x00000053 popfd 0x00000054 popad 0x00000055 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20218 second address: 4A2021E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A2021E second address: 4A20222 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20222 second address: 4A20231 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, edi 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c mov esi, edx 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20231 second address: 4A20283 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE07h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FB8D4BFEE09h 0x0000000f xchg eax, edi 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 jmp 00007FB8D4BFEE08h 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20283 second address: 4A20292 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBCBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20292 second address: 4A202BF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE09h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, 00000001h 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 mov dh, EBh 0x00000013 mov eax, 56FD3ADBh 0x00000018 popad 0x00000019 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A202BF second address: 4A202EE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 lock cmpxchg dword ptr [esi], ecx 0x0000000d jmp 00007FB8D4EECBCEh 0x00000012 mov ecx, eax 0x00000014 push eax 0x00000015 push edx 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A202EE second address: 4A202F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A202F2 second address: 4A2030F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A2030F second address: 4A20332 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE01h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp ecx, 01h 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f mov bx, CBFEh 0x00000013 movsx edx, si 0x00000016 popad 0x00000017 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20332 second address: 4A20352 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007FB9481CEE4Dh 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20352 second address: 4A20356 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20356 second address: 4A203E2 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FB8D4EECBD8h 0x00000008 and esi, 255B9A28h 0x0000000e jmp 00007FB8D4EECBCBh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 pushfd 0x00000017 jmp 00007FB8D4EECBD8h 0x0000001c adc ah, FFFFFF88h 0x0000001f jmp 00007FB8D4EECBCBh 0x00000024 popfd 0x00000025 popad 0x00000026 pop edi 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a pushfd 0x0000002b jmp 00007FB8D4EECBCBh 0x00000030 adc ax, 08CEh 0x00000035 jmp 00007FB8D4EECBD9h 0x0000003a popfd 0x0000003b mov ax, 62D7h 0x0000003f popad 0x00000040 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A203E2 second address: 4A203E8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A203E8 second address: 4A20402 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop esi 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FB8D4EECBCDh 0x00000012 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20402 second address: 4A20408 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A20408 second address: 4A20470 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx esi, bx 0x00000006 jmp 00007FB8D4EECBCFh 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 pushfd 0x00000013 jmp 00007FB8D4EECBCBh 0x00000018 jmp 00007FB8D4EECBD3h 0x0000001d popfd 0x0000001e pushfd 0x0000001f jmp 00007FB8D4EECBD8h 0x00000024 and eax, 01F41868h 0x0000002a jmp 00007FB8D4EECBCBh 0x0000002f popfd 0x00000030 popad 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A3001F second address: 4A3007C instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FB8D4BFEE08h 0x00000008 and si, DD98h 0x0000000d jmp 00007FB8D4BFEDFBh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 xchg eax, ebp 0x00000017 pushad 0x00000018 pushfd 0x00000019 jmp 00007FB8D4BFEE04h 0x0000001e xor cx, 07F8h 0x00000023 jmp 00007FB8D4BFEDFBh 0x00000028 popfd 0x00000029 pushad 0x0000002a mov dx, ax 0x0000002d push eax 0x0000002e push edx 0x0000002f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A3007C second address: 4A300D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 jmp 00007FB8D4EECBD1h 0x0000000c xchg eax, ebp 0x0000000d pushad 0x0000000e mov di, ax 0x00000011 mov edi, eax 0x00000013 popad 0x00000014 mov ebp, esp 0x00000016 jmp 00007FB8D4EECBD2h 0x0000001b push FFFFFFFEh 0x0000001d pushad 0x0000001e mov cl, 3Eh 0x00000020 jmp 00007FB8D4EECBD3h 0x00000025 popad 0x00000026 call 00007FB8D4EECBC9h 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A300D8 second address: 4A300DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A300DC second address: 4A300F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBD7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A300F7 second address: 4A300FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A300FD second address: 4A30101 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A30101 second address: 4A301D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jmp 00007FB8D4BFEDFEh 0x0000000e mov eax, dword ptr [esp+04h] 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007FB8D4BFEE01h 0x00000019 adc cx, 0216h 0x0000001e jmp 00007FB8D4BFEE01h 0x00000023 popfd 0x00000024 pushfd 0x00000025 jmp 00007FB8D4BFEE00h 0x0000002a or si, 7638h 0x0000002f jmp 00007FB8D4BFEDFBh 0x00000034 popfd 0x00000035 popad 0x00000036 mov eax, dword ptr [eax] 0x00000038 jmp 00007FB8D4BFEE09h 0x0000003d mov dword ptr [esp+04h], eax 0x00000041 pushad 0x00000042 mov di, 4862h 0x00000046 pushfd 0x00000047 jmp 00007FB8D4BFEE03h 0x0000004c add si, 795Eh 0x00000051 jmp 00007FB8D4BFEE09h 0x00000056 popfd 0x00000057 popad 0x00000058 pop eax 0x00000059 push eax 0x0000005a push edx 0x0000005b jmp 00007FB8D4BFEDFDh 0x00000060 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A301D1 second address: 4A30249 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FB8D4EECBD7h 0x00000009 and ax, B41Eh 0x0000000e jmp 00007FB8D4EECBD9h 0x00000013 popfd 0x00000014 pushfd 0x00000015 jmp 00007FB8D4EECBD0h 0x0000001a sub ax, 3A18h 0x0000001f jmp 00007FB8D4EECBCBh 0x00000024 popfd 0x00000025 popad 0x00000026 pop edx 0x00000027 pop eax 0x00000028 push 2651A557h 0x0000002d push eax 0x0000002e push edx 0x0000002f jmp 00007FB8D4EECBD2h 0x00000034 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A30249 second address: 4A3024F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A3024F second address: 4A30253 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A30253 second address: 4A30257 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A30257 second address: 4A3027A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 add dword ptr [esp], 518208A9h 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 push esi 0x00000013 pop edi 0x00000014 jmp 00007FB8D4EECBCEh 0x00000019 popad 0x0000001a rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A3027A second address: 4A3028C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FB8D4BFEDFEh 0x00000009 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A3028C second address: 4A30290 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A30290 second address: 4A302AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr fs:[00000000h] 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FB8D4BFEDFAh 0x00000015 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A302AA second address: 4A302BF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4EECBCBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A302BF second address: 4A30373 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, 0FCF4167h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov edi, ecx 0x0000000b popad 0x0000000c push eax 0x0000000d jmp 00007FB8D4BFEE09h 0x00000012 nop 0x00000013 pushad 0x00000014 pushfd 0x00000015 jmp 00007FB8D4BFEDFCh 0x0000001a adc cx, 2DF8h 0x0000001f jmp 00007FB8D4BFEDFBh 0x00000024 popfd 0x00000025 movzx eax, dx 0x00000028 popad 0x00000029 sub esp, 1Ch 0x0000002c jmp 00007FB8D4BFEDFBh 0x00000031 xchg eax, ebx 0x00000032 jmp 00007FB8D4BFEE06h 0x00000037 push eax 0x00000038 jmp 00007FB8D4BFEDFBh 0x0000003d xchg eax, ebx 0x0000003e pushad 0x0000003f mov ax, 711Bh 0x00000043 pushad 0x00000044 pushfd 0x00000045 jmp 00007FB8D4BFEDFEh 0x0000004a jmp 00007FB8D4BFEE05h 0x0000004f popfd 0x00000050 mov cx, C9D7h 0x00000054 popad 0x00000055 popad 0x00000056 xchg eax, esi 0x00000057 push eax 0x00000058 push edx 0x00000059 push eax 0x0000005a push edx 0x0000005b pushad 0x0000005c popad 0x0000005d rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A30373 second address: 4A30377 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A30377 second address: 4A3037D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A3037D second address: 4A303E0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FB8D4EECBCCh 0x00000009 adc ch, 00000078h 0x0000000c jmp 00007FB8D4EECBCBh 0x00000011 popfd 0x00000012 push eax 0x00000013 pop edx 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push eax 0x00000018 jmp 00007FB8D4EECBD5h 0x0000001d xchg eax, esi 0x0000001e jmp 00007FB8D4EECBCEh 0x00000023 xchg eax, edi 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007FB8D4EECBD7h 0x0000002b rdtsc |
Source: C:\Users\user\Desktop\rRYQiGZ4K3.exe |
RDTSC instruction interceptor: First address: 4A303E0 second address: 4A3046F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FB8D4BFEE09h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov ecx, edi 0x0000000d pushfd 0x0000000e jmp 00007FB8D4BFEE03h 0x00000013 sbb ax, 4F5Eh 0x00000018 jmp 00007FB8D4BFEE09h 0x0000001d popfd 0x0000001e popad 0x0000001f xchg eax, edi 0x00000020 jmp 00007FB8D4BFEDFEh 0x00000025 mov eax, dword ptr [77DEB370h] 0x0000002a jmp 00007FB8D4BFEE00h 0x0000002f xor dword ptr [ebp-08h], eax 0x00000032 push eax 0x00000033 push edx 0x00000034 pushad 0x00000035 jmp 00007FB8D4BFEDFDh 0x0000003a push eax 0x0000003b pop edx 0x0000003c popad 0x0000003d rdtsc |