Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0 |
Source: F_4_T_U_R_4___nf____0992344.4354.msi, MSIFE0F.tmp.1.dr, MSIFD51.tmp.1.dr, MSIFDB0.tmp.1.dr, 58f706.msi.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA.crt0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0 |
Source: F_4_T_U_R_4___nf____0992344.4354.msi, MSIFE0F.tmp.1.dr, MSIFD51.tmp.1.dr, MSIFDB0.tmp.1.dr, 58f706.msi.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: F_4_T_U_R_4___nf____0992344.4354.msi, MSIFE0F.tmp.1.dr, MSIFD51.tmp.1.dr, MSIFDB0.tmp.1.dr, 58f706.msi.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: abd1 .exe, 00000003.00000002.571627415.0000000000930000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: F_4_T_U_R_4___nf____0992344.4354.msi, MSIFE0F.tmp.1.dr, MSIFD51.tmp.1.dr, MSIFDB0.tmp.1.dr, 58f706.msi.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0 |
Source: F_4_T_U_R_4___nf____0992344.4354.msi, MSIFE0F.tmp.1.dr, MSIFD51.tmp.1.dr, MSIFDB0.tmp.1.dr, 58f706.msi.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: F_4_T_U_R_4___nf____0992344.4354.msi, MSIFE0F.tmp.1.dr, MSIFD51.tmp.1.dr, MSIFDB0.tmp.1.dr, 58f706.msi.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/EVCodeSigning-g1.crl03 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0: |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/EVCodeSigning-g1.crl0K |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0 |
Source: F_4_T_U_R_4___nf____0992344.4354.msi, MSIFE0F.tmp.1.dr, MSIFD51.tmp.1.dr, MSIFDB0.tmp.1.dr, 58f706.msi.1.dr | String found in binary or memory: http://ocsp.digicert.com0A |
Source: F_4_T_U_R_4___nf____0992344.4354.msi, MSIFE0F.tmp.1.dr, MSIFD51.tmp.1.dr, MSIFDB0.tmp.1.dr, abd1 .exe.1.dr, 58f706.msi.1.dr | String found in binary or memory: http://ocsp.digicert.com0C |
Source: abd1 .exe.1.dr | String found in binary or memory: http://ocsp.digicert.com0H |
Source: abd1 .exe.1.dr | String found in binary or memory: http://ocsp.digicert.com0I |
Source: abd1 .exe.1.dr | String found in binary or memory: http://ocsp.digicert.com0O |
Source: F_4_T_U_R_4___nf____0992344.4354.msi, MSIFE0F.tmp.1.dr, MSIFD51.tmp.1.dr, MSIFDB0.tmp.1.dr, 58f706.msi.1.dr | String found in binary or memory: http://ocsp.digicert.com0X |
Source: abd1 .exe, 00000003.00000000.309835873.0000000000401000.00000020.00000001.01000000.00000003.sdmp, abd1 .exe.1.dr | String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/ |
Source: abd1 .exe, 00000003.00000000.309835873.0000000000401000.00000020.00000001.01000000.00000003.sdmp, abd1 .exe.1.dr | String found in binary or memory: http://stats.itopvpn.com/iusage.php |
Source: F_4_T_U_R_4___nf____0992344.4354.msi, MSIFE0F.tmp.1.dr, MSIFD51.tmp.1.dr, MSIFDB0.tmp.1.dr, 58f706.msi.1.dr | String found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0 |
Source: F_4_T_U_R_4___nf____0992344.4354.msi, MSIFE0F.tmp.1.dr, MSIFD51.tmp.1.dr, MSIFDB0.tmp.1.dr, 58f706.msi.1.dr | String found in binary or memory: http://t2.symcb.com0 |
Source: F_4_T_U_R_4___nf____0992344.4354.msi, MSIFE0F.tmp.1.dr, MSIFD51.tmp.1.dr, MSIFDB0.tmp.1.dr, 58f706.msi.1.dr | String found in binary or memory: http://tl.symcb.com/tl.crl0 |
Source: F_4_T_U_R_4___nf____0992344.4354.msi, MSIFE0F.tmp.1.dr, MSIFD51.tmp.1.dr, MSIFDB0.tmp.1.dr, 58f706.msi.1.dr | String found in binary or memory: http://tl.symcb.com/tl.crt0 |
Source: F_4_T_U_R_4___nf____0992344.4354.msi, MSIFE0F.tmp.1.dr, MSIFD51.tmp.1.dr, MSIFDB0.tmp.1.dr, 58f706.msi.1.dr | String found in binary or memory: http://tl.symcd.com0& |
Source: abd1 .exe.1.dr | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0 |
Source: abd1 .exe, abd1 .exe, 00000007.00000002.571458526.0000000000FAF000.00000040.00000001.01000000.00000004.sdmp | String found in binary or memory: http://www.indyproject.org/ |
Source: abd1 .exe, 00000003.00000002.571627415.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, abd1 .exe, 00000003.00000002.571627415.0000000000930000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/ |
Source: abd1 .exe, 00000003.00000002.571627415.0000000000930000.00000004.00000020.00020000.00000000.sdmp, abd1 .exe, 00000003.00000002.572900338.0000000000BE1000.00000040.00000001.01000000.00000004.sdmp, abd1 .exe, 00000003.00000002.613044083.0000000008AC8000.00000004.00000800.00020000.00000000.sdmp, abd1 .exe, 00000003.00000002.613702934.0000000009085000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php |
Source: abd1 .exe, 00000003.00000002.613416696.0000000008D90000.00000004.00000020.00020000.00000000.sdmp, abd1 .exe, 00000003.00000002.571627415.00000000008BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php... |
Source: abd1 .exe, 00000003.00000002.571627415.0000000000930000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php: |
Source: abd1 .exe, 00000003.00000002.613416696.0000000008D90000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpC: |
Source: abd1 .exe, 00000003.00000002.571627415.00000000008AC000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpI |
Source: abd1 .exe, 00000003.00000002.571627415.00000000008BB000.00000004.00000020.00020000.00000000.sdmp, abd1 .exe, 00000003.00000002.571627415.0000000000930000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpJ |
Source: abd1 .exe, 00000003.00000002.571627415.0000000000930000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpU |
Source: abd1 .exe, 00000003.00000002.613416696.0000000008D90000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpiu |
Source: abd1 .exe, 00000003.00000002.571627415.00000000008BB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpokiesm_ |
Source: abd1 .exe, 00000003.00000002.571627415.0000000000930000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phps/bo/inspecionando.phpo.php |
Source: abd1 .exe, 00000003.00000002.571627415.0000000000901000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.live.comt |
Source: F_4_T_U_R_4___nf____0992344.4354.msi, MSIFE0F.tmp.1.dr, MSIFD51.tmp.1.dr, MSIFDB0.tmp.1.dr, 58f706.msi.1.dr | String found in binary or memory: https://www.advancedinstaller.com |
Source: abd1 .exe.1.dr | String found in binary or memory: https://www.digicert.com/CPS0 |
Source: F_4_T_U_R_4___nf____0992344.4354.msi, MSIFE0F.tmp.1.dr, MSIFD51.tmp.1.dr, MSIFDB0.tmp.1.dr, 58f706.msi.1.dr | String found in binary or memory: https://www.thawte.com/cps0/ |
Source: F_4_T_U_R_4___nf____0992344.4354.msi, MSIFE0F.tmp.1.dr, MSIFD51.tmp.1.dr, MSIFDB0.tmp.1.dr, 58f706.msi.1.dr | String found in binary or memory: https://www.thawte.com/repository0W |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002EECFE4 second address: 0000000002EED03D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68A48A2Ah 0x00000004 sub esp, 0Fh 0x00000007 mov ax, dx 0x0000000a call 00007F0B68A48A88h 0x0000000f mov dword ptr [esp+10h], eax 0x00000013 or ch, FFFFFF81h 0x00000016 push word ptr [esp+06h] 0x0000001b pushad 0x0000001c jmp 00007F0B68A48A2Dh 0x0000001e mov dx, 0084h 0x00000022 bsf ebx, edx 0x00000025 mov ebx, dword ptr [esp+2Fh] 0x00000029 mov bx, cx 0x0000002c jmp 00007F0B68A48AB3h 0x0000002e xchg word ptr [esp+14h], bx 0x00000033 mov word ptr [esp+07h], si 0x00000038 push word ptr [esp+2Bh] 0x0000003d sub esp, 01h 0x00000040 pop edx 0x00000041 xchg dword ptr [esp+28h], eax 0x00000045 jmp 00007F0B68A48A12h 0x00000047 lea ebp, dword ptr [edi+2363DC3Fh] 0x0000004d mov ecx, 1D25122Fh 0x00000052 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002EED03D second address: 0000000002EED134 instructions: 0x00000000 rdtsc 0x00000002 pop si 0x00000004 mov bh, dl 0x00000006 cld 0x00000007 jmp 00007F0B68A48A7Eh 0x00000009 mov dword ptr [esp+24h], edi 0x0000000d stc 0x0000000e popad 0x0000000f push word ptr [esp+0Ch] 0x00000014 mov word ptr [esp+01h], di 0x00000019 xchg word ptr [esp+06h], ax 0x0000001e jmp 00007F0B68A48A9Dh 0x00000020 mov bx, word ptr [esp+0Dh] 0x00000025 pop word ptr [esp+0Ah] 0x0000002a sub esp, 03h 0x0000002d rcr dl, 00000000h 0x00000030 pop dword ptr [esp+06h] 0x00000034 dec ebx 0x00000035 jmp 00007F0B68A48A14h 0x00000037 sub esp, 12h 0x0000003a bswap esi 0x0000003c mov ecx, esp 0x0000003e setnl cl 0x00000041 cmc 0x00000042 xchg edi, eax 0x00000044 jmp 00007F0B68A48AC8h 0x00000046 xchg ax, di 0x00000048 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002EED134 second address: 0000000002EED0C4 instructions: 0x00000000 rdtsc 0x00000002 call 00007F0B68C4F2C6h 0x00000007 bts cx, bp 0x0000000b pop ebp 0x0000000c rol dx, cl 0x0000000f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002EED0C4 second address: 0000000002EED111 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68A48A8Bh 0x00000004 lea edi, dword ptr [edi+ebp] 0x00000007 mov dword ptr [esp+11h], eax 0x0000000b sub bp, E0F4h 0x00000010 xchg dword ptr [esp+1Bh], ebx 0x00000014 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002EED42F second address: 0000000002EED40B instructions: 0x00000000 rdtsc 0x00000002 or edx, esi 0x00000004 jmp 00007F0B68C4F2B9h 0x00000009 mov edx, 8C0A744Fh 0x0000000e cmc 0x0000000f xor cl, 0000005Fh 0x00000012 rcl dx, cl 0x00000015 mov dword ptr [esp+07h], ebp 0x00000019 jmp 00007F0B68C4F369h 0x0000001b push dword ptr [esp+0Ch] 0x0000001f not eax 0x00000021 setp bl 0x00000024 setbe bl 0x00000027 not si 0x0000002a mov word ptr [esp+11h], dx 0x0000002f jmp 00007F0B68C4F316h 0x00000031 bswap ebp 0x00000033 push word ptr [esp+05h] 0x00000038 lea edi, dword ptr [eax+edi] 0x0000003b mov si, B3B3h 0x0000003f jmp 00007F0B68C4F35Eh 0x00000041 mov dh, byte ptr [esp+16h] 0x00000045 add esp, 15h 0x00000048 mov bl, F0h 0x0000004a mov cx, word ptr [esp+04h] 0x0000004f pop bp 0x00000051 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002EED40B second address: 0000000002EED495 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68A48AAFh 0x00000004 xchg ebx, ecx 0x00000006 pushad 0x00000007 pop dword ptr [esp+1Bh] 0x0000000b pop dword ptr [esp+04h] 0x0000000f bsr bx, ax 0x00000013 mov dl, F8h 0x00000015 jmp 00007F0B68A48A21h 0x00000017 xchg esi, edx 0x00000019 mov ch, ah 0x0000001b pop bx 0x0000001d pop edi 0x0000001e lea ebp, dword ptr [eax-0000F067h] 0x00000024 mov dx, 84EDh 0x00000028 jmp 00007F0B68A48A29h 0x0000002a mov edi, 9BCCFFF5h 0x0000002f add ebx, eax 0x00000031 add ax, 000084CAh 0x00000035 mov word ptr [esp+11h], ax 0x0000003a jmp 00007F0B68A48A9Dh 0x0000003c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002EED525 second address: 0000000002EED5A8 instructions: 0x00000000 rdtsc 0x00000002 mov ax, bp 0x00000005 bsr ax, cx 0x00000009 push dword ptr [esp+12h] 0x0000000d pop ax 0x0000000f jmp 00007F0B68C4F377h 0x00000011 xchg dword ptr [esp+0Dh], ecx 0x00000015 lea esp, dword ptr [esp+0Bh] 0x00000019 mov byte ptr [esp+05h], dl 0x0000001d xchg bl, bh 0x0000001f lea esp, dword ptr [esp+10h] 0x00000023 mov dh, AFh 0x00000025 jmp 00007F0B68C4F316h 0x00000027 std 0x00000028 call 00007F0B68C4F3EBh 0x0000002d push dword ptr [esp+02h] 0x00000031 mov esi, 77201D02h 0x00000036 lea edx, dword ptr [esp+1F709682h] 0x0000003d bswap edi 0x0000003f cpuid 0x00000041 jmp 00007F0B68C4F2FDh 0x00000043 sbb bx, si 0x00000046 xchg word ptr [esp], di 0x0000004a lea eax, dword ptr [00000000h+edi*4] 0x00000051 xchg word ptr [esp+03h], cx 0x00000056 xchg byte ptr [esp+04h], dl 0x0000005a cpuid 0x0000005c jmp 00007F0B68C4F30Ch 0x0000005e sub esp, 10h 0x00000061 push dword ptr [esp+06h] 0x00000065 lea esp, dword ptr [esp+15h] 0x00000069 lea esi, dword ptr [00000000h+esi*4] 0x00000070 jmp 00007F0B68C4F318h 0x00000072 lea esp, dword ptr [esp+08h] 0x00000076 bsr ebx, esi 0x00000079 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002EED7DE second address: 0000000002EED861 instructions: 0x00000000 rdtsc 0x00000002 lea esi, dword ptr [eax+6F971120h] 0x00000008 xchg bx, si 0x0000000b jmp 00007F0B68A48A67h 0x0000000d mov dl, cl 0x0000000f std 0x00000010 mov bx, word ptr [esp] 0x00000014 xchg ebx, ebp 0x00000016 xchg ebp, edx 0x00000018 lea edi, dword ptr [edx+ebx] 0x0000001b jmp 00007F0B68A48A98h 0x0000001d xchg eax, ebp 0x0000001e mov di, ax 0x00000021 std 0x00000022 neg bx 0x00000025 setb ah 0x00000028 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002EED9FA second address: 0000000002EED9D6 instructions: 0x00000000 rdtsc 0x00000002 dec cx 0x00000004 push dword ptr [esp+05h] 0x00000008 mov ebp, dword ptr [esp+33h] 0x0000000c lea edx, dword ptr [00000000h+ebp*4] 0x00000013 push dword ptr [esp+32h] 0x00000017 jmp 00007F0B68C4F2FEh 0x00000019 mov dword ptr [esp+25h], ecx 0x0000001d setnl dh 0x00000020 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002EED9D6 second address: 0000000002EEDA7E instructions: 0x00000000 rdtsc 0x00000002 xchg ecx, esi 0x00000004 lea ebx, dword ptr [ecx+edi] 0x00000007 xchg byte ptr [esp+19h], cl 0x0000000b call 00007F0B68A48A99h 0x00000010 jmp 00007F0B68A48A39h 0x00000012 push bp 0x00000014 xchg byte ptr [esp+11h], cl 0x00000018 pop edx 0x00000019 mov bh, dh 0x0000001b mov byte ptr [esp+2Dh], dh 0x0000001f mov ebp, ebx 0x00000021 jmp 00007F0B68A48A76h 0x00000023 pop word ptr [esp+13h] 0x00000028 mov word ptr [esp+2Ch], bx 0x0000002d bt ecx, ebp 0x00000030 mov edx, ebx 0x00000032 neg si 0x00000035 clc 0x00000036 jmp 00007F0B68A48A21h 0x00000038 sbb esi, E0A84136h 0x0000003e mov word ptr [esp+02h], di 0x00000043 lea esi, dword ptr [378A0432h] 0x00000049 xchg di, bp 0x0000004c xchg edi, ebp 0x0000004e jmp 00007F0B68A48A81h 0x00000050 push dword ptr [esp+29h] 0x00000054 mov ebp, DF4D6296h 0x00000059 pop bp 0x0000005b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002EEDDF5 second address: 0000000002EEDDBC instructions: 0x00000000 rdtsc 0x00000002 lea esp, dword ptr [esp+01h] 0x00000006 push word ptr [esp+02h] 0x0000000b mov esi, 2EED7EFDh 0x00000010 sub esp, 0Dh 0x00000013 jmp 00007F0B68C4F2F4h 0x00000015 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002DF4997 second address: 0000000002DF49D9 instructions: 0x00000000 rdtsc 0x00000002 btc cx, bx 0x00000006 je 00007F0B68A48A0Ah 0x00000008 clc 0x00000009 jmp 00007F0B68A48A26h 0x0000000b xor dx, A906h 0x00000010 jmp 00007F0B68A48A9Fh 0x00000012 lea ecx, dword ptr [edi+50h] 0x00000015 mov dx, ax 0x00000018 mov dl, byte ptr [esp] 0x0000001b lea eax, dword ptr [eax+0000D183h] 0x00000021 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002DFDCA2 second address: 0000000002DFDC76 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, 4D026007h 0x00000007 sub esi, 04h 0x0000000a jmp 00007F0B68C4F303h 0x0000000c lea edx, dword ptr [00000000h+ecx*4] 0x00000013 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002DEF054 second address: 0000000002DEF276 instructions: 0x00000000 rdtsc 0x00000002 mov ax, CFB1h 0x00000006 push dword ptr [esp+10h] 0x0000000a retn 0014h 0x0000000d call 00007F0B68A489EEh 0x00000012 lea esp, dword ptr [esp+02h] 0x00000016 call 00007F0B68A48AFAh 0x0000001b mov cx, word ptr [esp] 0x0000001f sub esp, 09h 0x00000022 mov ah, D2h 0x00000024 dec edx 0x00000025 inc al 0x00000027 jmp 00007F0B68A48A2Eh 0x00000029 lea esp, dword ptr [esp+01h] 0x0000002d xchg dword ptr [esp+08h], eax 0x00000031 sets ch 0x00000034 mov edx, ebx 0x00000036 pushfd 0x00000037 jmp 00007F0B68A48A66h 0x00000039 lea esp, dword ptr [esp+01h] 0x0000003d lea ecx, dword ptr [A28040EFh] 0x00000043 lea esp, dword ptr [esp+03h] 0x00000047 jmp 00007F0B68A48F0Eh 0x0000004c lea eax, dword ptr [eax+6Bh] 0x0000004f mov dh, AEh 0x00000051 setp dh 0x00000054 push bx 0x00000056 lea ecx, dword ptr [00000000h+ecx*4] 0x0000005d lea esp, dword ptr [esp+02h] 0x00000061 jmp 00007F0B68A48732h 0x00000066 xchg dword ptr [esp+08h], eax 0x0000006a inc eax 0x0000006b mov al, 99h 0x0000006d sets cl 0x00000070 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002DEF276 second address: 0000000002DEF106 instructions: 0x00000000 rdtsc 0x00000002 push dword ptr [esp+08h] 0x00000006 retn 000Ch 0x00000009 jmp 00007F0B68C4F3E2h 0x0000000e rol edi, 00000000h 0x00000011 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002DEF106 second address: 0000000002DEF145 instructions: 0x00000000 rdtsc 0x00000002 mov ax, dx 0x00000005 shl al, cl 0x00000007 jc 00007F0B68A48A2Fh 0x00000009 jnc 00007F0B68A48A17h 0x0000000b mov ch, byte ptr [esp] 0x0000000e mov dl, 36h 0x00000010 jmp 00007F0B68A48B0Eh 0x00000015 lea esp, dword ptr [esp+18h] 0x00000019 neg edi 0x0000001b rol al, 00000006h 0x0000001e jns 00007F0B68A48A07h 0x00000020 bswap ecx 0x00000022 push esp 0x00000023 rol edi, 00000000h 0x00000026 lea eax, dword ptr [00000000h+ebp*4] 0x0000002d call 00007F0B68A48A2Ch 0x00000032 lea ecx, dword ptr [edx+edi] 0x00000035 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E00B44 second address: 0000000002E00BE4 instructions: 0x00000000 rdtsc 0x00000002 setnb ah 0x00000005 bsr ax, bx 0x00000009 jle 00007F0B68C4F34Fh 0x0000000b jnle 00007F0B68C4F34Dh 0x0000000d add esi, 04h 0x00000010 jmp 00007F0B68C4F346h 0x00000012 mov eax, A32D9BDBh 0x00000017 sub esp, 0Dh 0x0000001a jo 00007F0B68C4F36Eh 0x0000001c pop cx 0x0000001e jmp 00007F0B68C4F354h 0x00000020 xchg dword ptr [esp+04h], edx 0x00000024 lea esp, dword ptr [esp+03h] 0x00000028 jmp 00007F0B68C4F358h 0x0000002a push ebp 0x0000002b xchg al, cl 0x0000002d jmp 00007F0B68C4F37Ch 0x0000002f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E3867B second address: 0000000002E3870C instructions: 0x00000000 rdtsc 0x00000002 dec edx 0x00000003 lea ecx, dword ptr [00000000h+ebx*4] 0x0000000a xchg cx, dx 0x0000000d cmc 0x0000000e jmp 00007F0B68A48AC7h 0x00000010 xchg dword ptr [esp], ecx 0x00000013 not dx 0x00000016 bsr dx, bx 0x0000001a ror dh, cl 0x0000001c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E0726B second address: 0000000002E02051 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68C4A11Ch 0x00000007 neg al 0x00000009 jmp 00007F0B68C4F380h 0x0000000b jnle 00007F0B68C4F306h 0x0000000d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E01E2B second address: 0000000002E01E6B instructions: 0x00000000 rdtsc 0x00000002 sub esp, 1Fh 0x00000005 js 00007F0B68A48A2Eh 0x00000007 jns 00007F0B68A48A5Ah 0x00000009 add esp, 02h 0x0000000c xor dx, di 0x0000000f push dword ptr [esp+10h] 0x00000013 jmp 00007F0B68A48A8Bh 0x00000015 pop dword ptr [esp+12h] 0x00000019 lea esp, dword ptr [esp+01h] 0x0000001d jmp 00007F0B68A48A28h 0x0000001f lea esp, dword ptr [esp+1Ch] 0x00000023 inc cl 0x00000025 bswap edx 0x00000027 jmp 00007F0B68A48A88h 0x00000029 mov dl, D7h 0x0000002b sub cl, 0000005Ah 0x0000002e lea eax, dword ptr [esi+edi] 0x00000031 mov eax, 459BDAAEh 0x00000036 mov eax, 797942E0h 0x0000003b jmp 00007F0B68A48A08h 0x0000003d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E01E6B second address: 0000000002E01E99 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 setle al 0x00000006 mov word ptr [esp+01h], dx 0x0000000b jmp 00007F0B68C4F355h 0x0000000d lea esp, dword ptr [esp+04h] 0x00000011 add cl, FFFFFF8Ah 0x00000014 lea eax, dword ptr [00000000h+ecx*4] 0x0000001b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E07224 second address: 0000000002E02051 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68A43873h 0x00000007 neg al 0x00000009 jmp 00007F0B68A48A90h 0x0000000b jnle 00007F0B68A48A16h 0x0000000d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E0CB10 second address: 0000000002E0C193 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68C4E9BDh 0x00000007 mov ecx, edi 0x00000009 not al 0x0000000b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E0024C second address: 0000000002E00402 instructions: 0x00000000 rdtsc 0x00000002 not cx 0x00000005 mov dx, di 0x00000008 neg ax 0x0000000b jmp 00007F0B68A48BF2h 0x00000010 jnc 00007F0B68A488C9h 0x00000016 mov bx, sp 0x00000019 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E00402 second address: 0000000002DEEF12 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68C4F2B9h 0x00000007 lea edx, dword ptr [esi+2B069A91h] 0x0000000d jmp 00007F0B68C4F23Ah 0x00000012 lea eax, dword ptr [00000000h+edi*4] 0x00000019 sets bl 0x0000001c neg dx 0x0000001f jmp 00007F0B68C4F350h 0x00000021 jl 00007F0B68C4F369h 0x00000023 mov ebx, dword ptr [esp] 0x00000026 lea esp, dword ptr [esp+04h] 0x0000002a jmp 00007F0B68C3DECCh 0x0000002f mov ebx, edi 0x00000031 jmp 00007F0B68C4F31Ah 0x00000033 xor cx, 1B47h 0x00000038 jno 00007F0B68C4F325h 0x0000003a lea ecx, dword ptr [00000000h+edx*4] 0x00000041 mov edx, dword ptr [esp] 0x00000044 jmp 00007F0B68C4F38Ah 0x00000046 mov dx, word ptr [esp] 0x0000004a sub esp, 0Eh 0x0000004d pop dword ptr [esp+02h] 0x00000051 jmp 00007F0B68C4F31Fh 0x00000053 add esp, 06h 0x00000056 push bp 0x00000058 cmc 0x00000059 jnbe 00007F0B68C4F3B9h 0x0000005b xchg dword ptr [esp], edx 0x0000005e lea esp, dword ptr [esp+02h] 0x00000062 call 00007F0B68C4F377h 0x00000067 lea ecx, dword ptr [ebp-0E4DF243h] 0x0000006d xchg dx, cx 0x00000070 mov eax, esi 0x00000072 jmp 00007F0B68C4F373h 0x00000074 or ch, FFFFFFA1h 0x00000077 dec eax 0x00000078 xchg dword ptr [esp], edi 0x0000007b dec dl 0x0000007d mov ax, bx 0x00000080 lea eax, dword ptr [D78CC83Fh] 0x00000086 jmp 00007F0B68C4F380h 0x00000088 lea edx, dword ptr [esi+ebp] 0x0000008b lea edi, dword ptr [edi+4Ch] 0x0000008e pushfd 0x0000008f bswap edx 0x00000091 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E01475 second address: 0000000002E015DC instructions: 0x00000000 rdtsc 0x00000002 lea edx, dword ptr [ecx+67h] 0x00000005 push ebx 0x00000006 clc 0x00000007 jle 00007F0B68A48AA3h 0x00000009 bswap ebp 0x0000000b lea ebp, dword ptr [esi+edi] 0x0000000e xchg dl, cl 0x00000010 call 00007F0B68A48B65h 0x00000015 mov bh, byte ptr [esp] 0x00000018 mov ch, bh 0x0000001a btc dx, bx 0x0000001e jmp 00007F0B68A48A89h 0x00000020 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E43DA9 second address: 0000000002E43DAB instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E44726 second address: 0000000002E44652 instructions: 0x00000000 rdtsc 0x00000002 stc 0x00000003 jmp 00007F0B68A488B4h 0x00000008 mov dl, byte ptr [esp] 0x0000000b not ax 0x0000000e push dword ptr [esp+08h] 0x00000012 retn 000Ch 0x00000015 mov ecx, 49808F39h 0x0000001a lea ecx, dword ptr [edx+esi] 0x0000001d lea esp, dword ptr [esp+02h] 0x00000021 jmp 00007F0B68A48AAEh 0x00000023 mov edx, esi 0x00000025 mov ecx, dword ptr [edx] 0x00000027 mov dh, byte ptr [esp] 0x0000002a call 00007F0B68A48ACFh 0x0000002f setl dh 0x00000032 jmp 00007F0B68A489FFh 0x00000034 mov edx, dword ptr [esp+01h] 0x00000038 add esi, 04h 0x0000003b call 00007F0B68A48A31h 0x00000040 push dword ptr [esp] 0x00000043 je 00007F0B68A48A87h 0x00000045 jne 00007F0B68A48A6Fh 0x00000047 bsf dx, dx 0x0000004b call 00007F0B68A48B64h 0x00000050 lea edx, dword ptr [00000000h+edi*4] 0x00000057 mov ax, word ptr [esp] 0x0000005b mov dx, word ptr [esp] 0x0000005f bts ax, dx 0x00000063 xchg ax, dx 0x00000065 jmp 00007F0B68A4898Ch 0x0000006a xchg dword ptr [esp], edi 0x0000006d push edx 0x0000006e pop dx 0x00000070 xchg al, dh 0x00000072 bt eax, ecx 0x00000075 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E3DB28 second address: 0000000002E0C193 instructions: 0x00000000 rdtsc 0x00000002 mov cl, byte ptr [esp] 0x00000005 mov ecx, 6AB4FF8Eh 0x0000000a mov cl, al 0x0000000c jmp 00007F0B68C4F6BBh 0x00000011 sub esi, 08h 0x00000014 bsf ecx, ebp 0x00000017 je 00007F0B68C4F012h 0x0000001d lea ecx, dword ptr [B11B85EFh] 0x00000023 sub esp, 1Ch 0x00000026 jmp 00007F0B68C4EFDEh 0x0000002b mov dword ptr [esi], edx 0x0000002d sub esp, 10h 0x00000030 jmp 00007F0B68C4F466h 0x00000035 jg 00007F0B68C4F220h 0x0000003b lea ecx, dword ptr [97B3A23Bh] 0x00000041 jmp 00007F0B68C4F415h 0x00000046 mov dword ptr [esi+04h], eax 0x00000049 mov ax, word ptr [esp] 0x0000004d not ax 0x00000050 mov dh, CEh 0x00000052 lea eax, dword ptr [00000000h+ebx*4] 0x00000059 jmp 00007F0B68C1D874h 0x0000005e mov ecx, edi 0x00000060 not al 0x00000062 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E2FC3D second address: 0000000002E2FC27 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 18h 0x00000005 mov eax, 1C7ADB84h 0x0000000a jmp 00007F0B68A48A2Dh 0x0000000c mov ecx, dword ptr [ebp+08h] 0x0000000f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E2FF18 second address: 0000000002E2FF1E instructions: 0x00000000 rdtsc 0x00000002 bsf ax, di 0x00000006 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E0A0A5 second address: 0000000002E0A101 instructions: 0x00000000 rdtsc 0x00000002 rol cl, 00000006h 0x00000005 jns 00007F0B68A48B5Ah 0x0000000b xchg eax, edx 0x0000000c sub esi, 04h 0x0000000f xchg dx, ax 0x00000012 adc cx, si 0x00000015 jnl 00007F0B68A48975h 0x0000001b inc cl 0x0000001d cmc 0x0000001e jmp 00007F0B68A48985h 0x00000023 mov cx, ss 0x00000025 mov al, byte ptr [esp] 0x00000028 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E57A67 second address: 0000000002E57AE8 instructions: 0x00000000 rdtsc 0x00000002 mov eax, dword ptr [esp] 0x00000005 mov ah, ch 0x00000007 jmp 00007F0B68C4F362h 0x00000009 sub esi, 02h 0x0000000c xchg eax, edx 0x0000000d stc 0x0000000e jmp 00007F0B68C4F389h 0x00000010 jle 00007F0B68C4F2FDh 0x00000012 jnle 00007F0B68C4F2FBh 0x00000014 or word ptr [esi+04h], cx 0x00000018 mov edx, esp 0x0000001a call 00007F0B68C4F367h 0x0000001f mov al, B4h 0x00000021 jmp 00007F0B68C4F31Ch 0x00000023 pushfd 0x00000024 jmp 00007F0B68C4F37Bh 0x00000026 pop dword ptr [esi] 0x00000028 mov al, C9h 0x0000002a mov edx, esp 0x0000002c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E57AE8 second address: 0000000002E02051 instructions: 0x00000000 rdtsc 0x00000002 xchg dl, al 0x00000004 jmp 00007F0B689F2FADh 0x00000009 neg al 0x0000000b jmp 00007F0B68A48A90h 0x0000000d jnle 00007F0B68A48A16h 0x0000000f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E38778 second address: 0000000002E38788 instructions: 0x00000000 rdtsc 0x00000002 bsf dx, di 0x00000006 jmp 00007F0B68C4F346h 0x00000008 jo 00007F0B68C4F316h 0x0000000a neg edx 0x0000000c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E3F6A1 second address: 0000000002E02051 instructions: 0x00000000 rdtsc 0x00000002 mov ax, D373h 0x00000006 mov dx, word ptr [esp] 0x0000000a xchg eax, edx 0x0000000b mov ax, 0531h 0x0000000f shl eax, 13h 0x00000012 jmp 00007F0B68A48AF5h 0x00000017 jbe 00007F0B68A489BCh 0x0000001d ja 00007F0B68A489B6h 0x00000023 inc cx 0x00000025 mov dx, word ptr [esp] 0x00000029 mov ax, word ptr [esp] 0x0000002d mov dl, byte ptr [esp] 0x00000030 jmp 00007F0B68A48A87h 0x00000032 sub cx, 635Ah 0x00000037 not dh 0x00000039 lea edx, dword ptr [eax+esi] 0x0000003c mov edx, dword ptr [esp] 0x0000003f mov dx, word ptr [esp] 0x00000043 jmp 00007F0B68A48A0Ah 0x00000045 xchg edx, eax 0x00000047 dec dl 0x00000049 jns 00007F0B68A48A6Bh 0x0000004b add cx, 108Ah 0x00000050 lea edx, dword ptr [edx+esi] 0x00000053 jmp 00007F0B68A48A87h 0x00000055 mov ah, 76h 0x00000057 mov dx, 6461h 0x0000005b call 00007F0B68A48A34h 0x00000060 mov word ptr [esi], cx 0x00000063 pushad 0x00000064 lea eax, dword ptr [00000000h+ebx*4] 0x0000006b jmp 00007F0B68A48A66h 0x0000006d lea ecx, dword ptr [esp+42h] 0x00000071 lea edx, dword ptr [00000000h+ebx*4] 0x00000078 jmp 00007F0B68A0B352h 0x0000007d neg al 0x0000007f jmp 00007F0B68A48A90h 0x00000081 jnle 00007F0B68A48A16h 0x00000083 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E35A2C second address: 0000000002E0C193 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68C4F315h 0x00000004 call 00007F0B68C4F328h 0x00000009 jmp 00007F0B68C4F35Dh 0x0000000b xchg eax, ecx 0x0000000c sets dh 0x0000000f lea edx, dword ptr [00000000h+edi*4] 0x00000016 bswap edx 0x00000018 jmp 00007F0B68C4F44Dh 0x0000001d cbw 0x0000001f mov dh, C8h 0x00000021 not dl 0x00000023 lea edx, dword ptr [eax+ebx] 0x00000026 sub esp, 1Eh 0x00000029 jmp 00007F0B68C4F279h 0x0000002e jnc 00007F0B68C4F3A4h 0x00000030 lea esp, dword ptr [esp+02h] 0x00000034 xchg eax, ecx 0x00000035 mov dx, word ptr [esp] 0x00000039 jmp 00007F0B68C4F2B2h 0x0000003e mov edx, esp 0x00000040 lea edx, dword ptr [edi-31FB5232h] 0x00000046 bswap edx 0x00000048 mov word ptr [esi], cx 0x0000004b setle dl 0x0000004e jmp 00007F0B68C4F31Ah 0x00000050 lea edx, dword ptr [00000000h+edi*4] 0x00000057 btc edx, esi 0x0000005a jle 00007F0B68C4F38Bh 0x0000005c mov dx, word ptr [esp] 0x00000060 jmp 00007F0B68C25A8Fh 0x00000065 mov ecx, edi 0x00000067 not al 0x00000069 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E403BA second address: 0000000002E403BA instructions: 0x00000000 rdtsc 0x00000002 xor dx, E322h 0x00000007 mov dword ptr [esp+1Ch], ecx 0x0000000b popad 0x0000000c sub esp, 19h 0x0000000f jmp 00007F0B68A489D8h 0x00000011 lea esp, dword ptr [esp+01h] 0x00000015 shr eax, 10h 0x00000018 lea esp, dword ptr [esp+18h] 0x0000001c test ax, ax 0x0000001f jmp 00007F0B68A489E5h 0x00000021 je 00007F0B68A488D0h 0x00000027 inc edx 0x00000028 jmp 00007F0B68A48B49h 0x0000002d push bp 0x0000002f lea esp, dword ptr [esp+02h] 0x00000033 jmp 00007F0B68A48A6Ah 0x00000035 inc edx 0x00000036 dec esi 0x00000037 jne 00007F0B68A48976h 0x0000003d movzx eax, word ptr [edx] 0x00000040 jmp 00007F0B68A48E3Ch 0x00000045 cmc 0x00000046 add ecx, eax 0x00000048 xor ax, ax 0x0000004b pushad 0x0000004c jmp 00007F0B68A4885Bh 0x00000051 xchg dx, bp 0x00000054 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E38D61 second address: 0000000002E0C193 instructions: 0x00000000 rdtsc 0x00000002 xchg ax, dx 0x00000004 sub esi, 02h 0x00000007 jmp 00007F0B68C4F372h 0x00000009 mov edx, esi 0x0000000b lea edx, dword ptr [ebx+ebx] 0x0000000e mov al, 56h 0x00000010 call 00007F0B68C4F323h 0x00000015 add word ptr [esi+04h], cx 0x00000019 mov al, dl 0x0000001b jmp 00007F0B68C4F35Ch 0x0000001d xchg dx, ax 0x00000020 pushfd 0x00000021 pop dword ptr [esi] 0x00000023 xchg dh, ah 0x00000025 jmp 00007F0B68C4F38Bh 0x00000027 mov ax, 7B2Bh 0x0000002b xchg ax, dx 0x0000002d mov dh, 75h 0x0000002f jmp 00007F0B68C226CEh 0x00000034 mov ecx, edi 0x00000036 not al 0x00000038 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002ED543E second address: 0000000002ED5440 instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002ED5440 second address: 0000000002ED5442 instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D1CFE4 second address: 0000000002D1D03D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68A48A2Ah 0x00000004 sub esp, 0Fh 0x00000007 mov ax, dx 0x0000000a call 00007F0B68A48A88h 0x0000000f mov dword ptr [esp+10h], eax 0x00000013 or ch, FFFFFF81h 0x00000016 push word ptr [esp+06h] 0x0000001b pushad 0x0000001c jmp 00007F0B68A48A2Dh 0x0000001e mov dx, 0084h 0x00000022 bsf ebx, edx 0x00000025 mov ebx, dword ptr [esp+2Fh] 0x00000029 mov bx, cx 0x0000002c jmp 00007F0B68A48AB3h 0x0000002e xchg word ptr [esp+14h], bx 0x00000033 mov word ptr [esp+07h], si 0x00000038 push word ptr [esp+2Bh] 0x0000003d sub esp, 01h 0x00000040 pop edx 0x00000041 xchg dword ptr [esp+28h], eax 0x00000045 jmp 00007F0B68A48A12h 0x00000047 lea ebp, dword ptr [edi+2363DC3Fh] 0x0000004d mov ecx, 1D25122Fh 0x00000052 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D1D03D second address: 0000000002D1D134 instructions: 0x00000000 rdtsc 0x00000002 pop si 0x00000004 mov bh, dl 0x00000006 cld 0x00000007 jmp 00007F0B68C4F36Eh 0x00000009 mov dword ptr [esp+24h], edi 0x0000000d stc 0x0000000e popad 0x0000000f push word ptr [esp+0Ch] 0x00000014 mov word ptr [esp+01h], di 0x00000019 xchg word ptr [esp+06h], ax 0x0000001e jmp 00007F0B68C4F38Dh 0x00000020 mov bx, word ptr [esp+0Dh] 0x00000025 pop word ptr [esp+0Ah] 0x0000002a sub esp, 03h 0x0000002d rcr dl, 00000000h 0x00000030 pop dword ptr [esp+06h] 0x00000034 dec ebx 0x00000035 jmp 00007F0B68C4F304h 0x00000037 sub esp, 12h 0x0000003a bswap esi 0x0000003c mov ecx, esp 0x0000003e setnl cl 0x00000041 cmc 0x00000042 xchg edi, eax 0x00000044 jmp 00007F0B68C4F3B8h 0x00000046 xchg ax, di 0x00000048 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D1D134 second address: 0000000002D1D0C4 instructions: 0x00000000 rdtsc 0x00000002 call 00007F0B68A489D6h 0x00000007 bts cx, bp 0x0000000b pop ebp 0x0000000c rol dx, cl 0x0000000f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D1D0C4 second address: 0000000002D1D111 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68C4F37Bh 0x00000004 lea edi, dword ptr [edi+ebp] 0x00000007 mov dword ptr [esp+11h], eax 0x0000000b sub bp, E0F4h 0x00000010 xchg dword ptr [esp+1Bh], ebx 0x00000014 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D1D42F second address: 0000000002D1D40B instructions: 0x00000000 rdtsc 0x00000002 or edx, esi 0x00000004 jmp 00007F0B68A489C9h 0x00000009 mov edx, 8C0A744Fh 0x0000000e cmc 0x0000000f xor cl, 0000005Fh 0x00000012 rcl dx, cl 0x00000015 mov dword ptr [esp+07h], ebp 0x00000019 jmp 00007F0B68A48A79h 0x0000001b push dword ptr [esp+0Ch] 0x0000001f not eax 0x00000021 setp bl 0x00000024 setbe bl 0x00000027 not si 0x0000002a mov word ptr [esp+11h], dx 0x0000002f jmp 00007F0B68A48A26h 0x00000031 bswap ebp 0x00000033 push word ptr [esp+05h] 0x00000038 lea edi, dword ptr [eax+edi] 0x0000003b mov si, B3B3h 0x0000003f jmp 00007F0B68A48A6Eh 0x00000041 mov dh, byte ptr [esp+16h] 0x00000045 add esp, 15h 0x00000048 mov bl, F0h 0x0000004a mov cx, word ptr [esp+04h] 0x0000004f pop bp 0x00000051 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D1D40B second address: 0000000002D1D495 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68C4F39Fh 0x00000004 xchg ebx, ecx 0x00000006 pushad 0x00000007 pop dword ptr [esp+1Bh] 0x0000000b pop dword ptr [esp+04h] 0x0000000f bsr bx, ax 0x00000013 mov dl, F8h 0x00000015 jmp 00007F0B68C4F311h 0x00000017 xchg esi, edx 0x00000019 mov ch, ah 0x0000001b pop bx 0x0000001d pop edi 0x0000001e lea ebp, dword ptr [eax-0000F067h] 0x00000024 mov dx, 84EDh 0x00000028 jmp 00007F0B68C4F319h 0x0000002a mov edi, 9BCCFFF5h 0x0000002f add ebx, eax 0x00000031 add ax, 000084CAh 0x00000035 mov word ptr [esp+11h], ax 0x0000003a jmp 00007F0B68C4F38Dh 0x0000003c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D1D525 second address: 0000000002D1D5A8 instructions: 0x00000000 rdtsc 0x00000002 mov ax, bp 0x00000005 bsr ax, cx 0x00000009 push dword ptr [esp+12h] 0x0000000d pop ax 0x0000000f jmp 00007F0B68A48A87h 0x00000011 xchg dword ptr [esp+0Dh], ecx 0x00000015 lea esp, dword ptr [esp+0Bh] 0x00000019 mov byte ptr [esp+05h], dl 0x0000001d xchg bl, bh 0x0000001f lea esp, dword ptr [esp+10h] 0x00000023 mov dh, AFh 0x00000025 jmp 00007F0B68A48A26h 0x00000027 std 0x00000028 call 00007F0B68A48AFBh 0x0000002d push dword ptr [esp+02h] 0x00000031 mov esi, 77201D02h 0x00000036 lea edx, dword ptr [esp+1F709682h] 0x0000003d bswap edi 0x0000003f cpuid 0x00000041 jmp 00007F0B68A48A0Dh 0x00000043 sbb bx, si 0x00000046 xchg word ptr [esp], di 0x0000004a lea eax, dword ptr [00000000h+edi*4] 0x00000051 xchg word ptr [esp+03h], cx 0x00000056 xchg byte ptr [esp+04h], dl 0x0000005a cpuid 0x0000005c jmp 00007F0B68A48A1Ch 0x0000005e sub esp, 10h 0x00000061 push dword ptr [esp+06h] 0x00000065 lea esp, dword ptr [esp+15h] 0x00000069 lea esi, dword ptr [00000000h+esi*4] 0x00000070 jmp 00007F0B68A48A28h 0x00000072 lea esp, dword ptr [esp+08h] 0x00000076 bsr ebx, esi 0x00000079 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D1D7DE second address: 0000000002D1D861 instructions: 0x00000000 rdtsc 0x00000002 lea esi, dword ptr [eax+6F971120h] 0x00000008 xchg bx, si 0x0000000b jmp 00007F0B68C4F357h 0x0000000d mov dl, cl 0x0000000f std 0x00000010 mov bx, word ptr [esp] 0x00000014 xchg ebx, ebp 0x00000016 xchg ebp, edx 0x00000018 lea edi, dword ptr [edx+ebx] 0x0000001b jmp 00007F0B68C4F388h 0x0000001d xchg eax, ebp 0x0000001e mov di, ax 0x00000021 std 0x00000022 neg bx 0x00000025 setb ah 0x00000028 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D1D9FA second address: 0000000002D1D9D6 instructions: 0x00000000 rdtsc 0x00000002 dec cx 0x00000004 push dword ptr [esp+05h] 0x00000008 mov ebp, dword ptr [esp+33h] 0x0000000c lea edx, dword ptr [00000000h+ebp*4] 0x00000013 push dword ptr [esp+32h] 0x00000017 jmp 00007F0B68A48A0Eh 0x00000019 mov dword ptr [esp+25h], ecx 0x0000001d setnl dh 0x00000020 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D1D9D6 second address: 0000000002D1DA7E instructions: 0x00000000 rdtsc 0x00000002 xchg ecx, esi 0x00000004 lea ebx, dword ptr [ecx+edi] 0x00000007 xchg byte ptr [esp+19h], cl 0x0000000b call 00007F0B68C4F389h 0x00000010 jmp 00007F0B68C4F329h 0x00000012 push bp 0x00000014 xchg byte ptr [esp+11h], cl 0x00000018 pop edx 0x00000019 mov bh, dh 0x0000001b mov byte ptr [esp+2Dh], dh 0x0000001f mov ebp, ebx 0x00000021 jmp 00007F0B68C4F366h 0x00000023 pop word ptr [esp+13h] 0x00000028 mov word ptr [esp+2Ch], bx 0x0000002d bt ecx, ebp 0x00000030 mov edx, ebx 0x00000032 neg si 0x00000035 clc 0x00000036 jmp 00007F0B68C4F311h 0x00000038 sbb esi, E0A84136h 0x0000003e mov word ptr [esp+02h], di 0x00000043 lea esi, dword ptr [378A0432h] 0x00000049 xchg di, bp 0x0000004c xchg edi, ebp 0x0000004e jmp 00007F0B68C4F371h 0x00000050 push dword ptr [esp+29h] 0x00000054 mov ebp, DF4D6296h 0x00000059 pop bp 0x0000005b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D1DDF5 second address: 0000000002D1DDBC instructions: 0x00000000 rdtsc 0x00000002 lea esp, dword ptr [esp+01h] 0x00000006 push word ptr [esp+02h] 0x0000000b mov esi, 2EED7EFDh 0x00000010 sub esp, 0Dh 0x00000013 jmp 00007F0B68A48A04h 0x00000015 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C24997 second address: 0000000002C249D9 instructions: 0x00000000 rdtsc 0x00000002 btc cx, bx 0x00000006 je 00007F0B68C4F2FAh 0x00000008 clc 0x00000009 jmp 00007F0B68C4F316h 0x0000000b xor dx, A906h 0x00000010 jmp 00007F0B68C4F38Fh 0x00000012 lea ecx, dword ptr [edi+50h] 0x00000015 mov dx, ax 0x00000018 mov dl, byte ptr [esp] 0x0000001b lea eax, dword ptr [eax+0000D183h] 0x00000021 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C2DCA2 second address: 0000000002C2DC76 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, 4D026007h 0x00000007 sub esi, 04h 0x0000000a jmp 00007F0B68A48A13h 0x0000000c lea edx, dword ptr [00000000h+ecx*4] 0x00000013 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C1F054 second address: 0000000002C1F276 instructions: 0x00000000 rdtsc 0x00000002 mov ax, CFB1h 0x00000006 push dword ptr [esp+10h] 0x0000000a retn 0014h 0x0000000d call 00007F0B68C4F2DEh 0x00000012 lea esp, dword ptr [esp+02h] 0x00000016 call 00007F0B68C4F3EAh 0x0000001b mov cx, word ptr [esp] 0x0000001f sub esp, 09h 0x00000022 mov ah, D2h 0x00000024 dec edx 0x00000025 inc al 0x00000027 jmp 00007F0B68C4F31Eh 0x00000029 lea esp, dword ptr [esp+01h] 0x0000002d xchg dword ptr [esp+08h], eax 0x00000031 sets ch 0x00000034 mov edx, ebx 0x00000036 pushfd 0x00000037 jmp 00007F0B68C4F356h 0x00000039 lea esp, dword ptr [esp+01h] 0x0000003d lea ecx, dword ptr [A28040EFh] 0x00000043 lea esp, dword ptr [esp+03h] 0x00000047 jmp 00007F0B68C4F7FEh 0x0000004c lea eax, dword ptr [eax+6Bh] 0x0000004f mov dh, AEh 0x00000051 setp dh 0x00000054 push bx 0x00000056 lea ecx, dword ptr [00000000h+ecx*4] 0x0000005d lea esp, dword ptr [esp+02h] 0x00000061 jmp 00007F0B68C4F022h 0x00000066 xchg dword ptr [esp+08h], eax 0x0000006a inc eax 0x0000006b mov al, 99h 0x0000006d sets cl 0x00000070 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C1F276 second address: 0000000002C1F106 instructions: 0x00000000 rdtsc 0x00000002 push dword ptr [esp+08h] 0x00000006 retn 000Ch 0x00000009 jmp 00007F0B68A48AF2h 0x0000000e rol edi, 00000000h 0x00000011 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C1F106 second address: 0000000002C1F145 instructions: 0x00000000 rdtsc 0x00000002 mov ax, dx 0x00000005 shl al, cl 0x00000007 jc 00007F0B68C4F31Fh 0x00000009 jnc 00007F0B68C4F307h 0x0000000b mov ch, byte ptr [esp] 0x0000000e mov dl, 36h 0x00000010 jmp 00007F0B68C4F3FEh 0x00000015 lea esp, dword ptr [esp+18h] 0x00000019 neg edi 0x0000001b rol al, 00000006h 0x0000001e jns 00007F0B68C4F2F7h 0x00000020 bswap ecx 0x00000022 push esp 0x00000023 rol edi, 00000000h 0x00000026 lea eax, dword ptr [00000000h+ebp*4] 0x0000002d call 00007F0B68C4F31Ch 0x00000032 lea ecx, dword ptr [edx+edi] 0x00000035 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C30B44 second address: 0000000002C30BE4 instructions: 0x00000000 rdtsc 0x00000002 setnb ah 0x00000005 bsr ax, bx 0x00000009 jle 00007F0B68A48A5Fh 0x0000000b jnle 00007F0B68A48A5Dh 0x0000000d add esi, 04h 0x00000010 jmp 00007F0B68A48A56h 0x00000012 mov eax, A32D9BDBh 0x00000017 sub esp, 0Dh 0x0000001a jo 00007F0B68A48A7Eh 0x0000001c pop cx 0x0000001e jmp 00007F0B68A48A64h 0x00000020 xchg dword ptr [esp+04h], edx 0x00000024 lea esp, dword ptr [esp+03h] 0x00000028 jmp 00007F0B68A48A68h 0x0000002a push ebp 0x0000002b xchg al, cl 0x0000002d jmp 00007F0B68A48A8Ch 0x0000002f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C6867B second address: 0000000002C6870C instructions: 0x00000000 rdtsc 0x00000002 dec edx 0x00000003 lea ecx, dword ptr [00000000h+ebx*4] 0x0000000a xchg cx, dx 0x0000000d cmc 0x0000000e jmp 00007F0B68C4F3B7h 0x00000010 xchg dword ptr [esp], ecx 0x00000013 not dx 0x00000016 bsr dx, bx 0x0000001a ror dh, cl 0x0000001c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C3726B second address: 0000000002C32051 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68A4382Ch 0x00000007 neg al 0x00000009 jmp 00007F0B68A48A90h 0x0000000b jnle 00007F0B68A48A16h 0x0000000d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C31E2B second address: 0000000002C31E6B instructions: 0x00000000 rdtsc 0x00000002 sub esp, 1Fh 0x00000005 js 00007F0B68C4F31Eh 0x00000007 jns 00007F0B68C4F34Ah 0x00000009 add esp, 02h 0x0000000c xor dx, di 0x0000000f push dword ptr [esp+10h] 0x00000013 jmp 00007F0B68C4F37Bh 0x00000015 pop dword ptr [esp+12h] 0x00000019 lea esp, dword ptr [esp+01h] 0x0000001d jmp 00007F0B68C4F318h 0x0000001f lea esp, dword ptr [esp+1Ch] 0x00000023 inc cl 0x00000025 bswap edx 0x00000027 jmp 00007F0B68C4F378h 0x00000029 mov dl, D7h 0x0000002b sub cl, 0000005Ah 0x0000002e lea eax, dword ptr [esi+edi] 0x00000031 mov eax, 459BDAAEh 0x00000036 mov eax, 797942E0h 0x0000003b jmp 00007F0B68C4F2F8h 0x0000003d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C31E6B second address: 0000000002C31E99 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 setle al 0x00000006 mov word ptr [esp+01h], dx 0x0000000b jmp 00007F0B68A48A65h 0x0000000d lea esp, dword ptr [esp+04h] 0x00000011 add cl, FFFFFF8Ah 0x00000014 lea eax, dword ptr [00000000h+ecx*4] 0x0000001b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C37224 second address: 0000000002C3208D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68C4A163h 0x00000007 neg al 0x00000009 jmp 00007F0B68C4F380h 0x0000000b jnle 00007F0B68C4F306h 0x0000000d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C3CB10 second address: 0000000002C3C193 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68A480CDh 0x00000007 mov ecx, edi 0x00000009 not al 0x0000000b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C3024C second address: 0000000002C30402 instructions: 0x00000000 rdtsc 0x00000002 not cx 0x00000005 mov dx, di 0x00000008 neg ax 0x0000000b jmp 00007F0B68C4F4E2h 0x00000010 jnc 00007F0B68C4F1B9h 0x00000016 mov bx, sp 0x00000019 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C30402 second address: 0000000002C1EF12 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68A489C9h 0x00000007 lea edx, dword ptr [esi+2B069A91h] 0x0000000d jmp 00007F0B68A4894Ah 0x00000012 lea eax, dword ptr [00000000h+edi*4] 0x00000019 sets bl 0x0000001c neg dx 0x0000001f jmp 00007F0B68A48A60h 0x00000021 jl 00007F0B68A48A79h 0x00000023 mov ebx, dword ptr [esp] 0x00000026 lea esp, dword ptr [esp+04h] 0x0000002a jmp 00007F0B68A375DCh 0x0000002f mov ebx, edi 0x00000031 jmp 00007F0B68A48A2Ah 0x00000033 xor cx, 1B47h 0x00000038 jno 00007F0B68A48A35h 0x0000003a lea ecx, dword ptr [00000000h+edx*4] 0x00000041 mov edx, dword ptr [esp] 0x00000044 jmp 00007F0B68A48A9Ah 0x00000046 mov dx, word ptr [esp] 0x0000004a sub esp, 0Eh 0x0000004d pop dword ptr [esp+02h] 0x00000051 jmp 00007F0B68A48A2Fh 0x00000053 add esp, 06h 0x00000056 push bp 0x00000058 cmc 0x00000059 jnbe 00007F0B68A48AC9h 0x0000005b xchg dword ptr [esp], edx 0x0000005e lea esp, dword ptr [esp+02h] 0x00000062 call 00007F0B68A48A87h 0x00000067 lea ecx, dword ptr [ebp-0E4DF243h] 0x0000006d xchg dx, cx 0x00000070 mov eax, esi 0x00000072 jmp 00007F0B68A48A83h 0x00000074 or ch, FFFFFFA1h 0x00000077 dec eax 0x00000078 xchg dword ptr [esp], edi 0x0000007b dec dl 0x0000007d mov ax, bx 0x00000080 lea eax, dword ptr [D78CC83Fh] 0x00000086 jmp 00007F0B68A48A90h 0x00000088 lea edx, dword ptr [esi+ebp] 0x0000008b lea edi, dword ptr [edi+4Ch] 0x0000008e pushfd 0x0000008f bswap edx 0x00000091 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C31475 second address: 0000000002C315DC instructions: 0x00000000 rdtsc 0x00000002 lea edx, dword ptr [ecx+67h] 0x00000005 push ebx 0x00000006 clc 0x00000007 jle 00007F0B68C4F393h 0x00000009 bswap ebp 0x0000000b lea ebp, dword ptr [esi+edi] 0x0000000e xchg dl, cl 0x00000010 call 00007F0B68C4F455h 0x00000015 mov bh, byte ptr [esp] 0x00000018 mov ch, bh 0x0000001a btc dx, bx 0x0000001e jmp 00007F0B68C4F379h 0x00000020 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C73DA9 second address: 0000000002C73DAB instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C74726 second address: 0000000002C74652 instructions: 0x00000000 rdtsc 0x00000002 stc 0x00000003 jmp 00007F0B68C4F1A4h 0x00000008 mov dl, byte ptr [esp] 0x0000000b not ax 0x0000000e push dword ptr [esp+08h] 0x00000012 retn 000Ch 0x00000015 mov ecx, 49808F39h 0x0000001a lea ecx, dword ptr [edx+esi] 0x0000001d lea esp, dword ptr [esp+02h] 0x00000021 jmp 00007F0B68C4F39Eh 0x00000023 mov edx, esi 0x00000025 mov ecx, dword ptr [edx] 0x00000027 mov dh, byte ptr [esp] 0x0000002a call 00007F0B68C4F3BFh 0x0000002f setl dh 0x00000032 jmp 00007F0B68C4F2EFh 0x00000034 mov edx, dword ptr [esp+01h] 0x00000038 add esi, 04h 0x0000003b call 00007F0B68C4F321h 0x00000040 push dword ptr [esp] 0x00000043 je 00007F0B68C4F377h 0x00000045 jne 00007F0B68C4F35Fh 0x00000047 bsf dx, dx 0x0000004b call 00007F0B68C4F454h 0x00000050 lea edx, dword ptr [00000000h+edi*4] 0x00000057 mov ax, word ptr [esp] 0x0000005b mov dx, word ptr [esp] 0x0000005f bts ax, dx 0x00000063 xchg ax, dx 0x00000065 jmp 00007F0B68C4F27Ch 0x0000006a xchg dword ptr [esp], edi 0x0000006d push edx 0x0000006e pop dx 0x00000070 xchg al, dh 0x00000072 bt eax, ecx 0x00000075 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C6DB28 second address: 0000000002C3C193 instructions: 0x00000000 rdtsc 0x00000002 mov cl, byte ptr [esp] 0x00000005 mov ecx, 6AB4FF8Eh 0x0000000a mov cl, al 0x0000000c jmp 00007F0B68A48DCBh 0x00000011 sub esi, 08h 0x00000014 bsf ecx, ebp 0x00000017 je 00007F0B68A48722h 0x0000001d lea ecx, dword ptr [B11B85EFh] 0x00000023 sub esp, 1Ch 0x00000026 jmp 00007F0B68A486EEh 0x0000002b mov dword ptr [esi], edx 0x0000002d sub esp, 10h 0x00000030 jmp 00007F0B68A48B76h 0x00000035 jg 00007F0B68A48930h 0x0000003b lea ecx, dword ptr [97B3A23Bh] 0x00000041 jmp 00007F0B68A48B25h 0x00000046 mov dword ptr [esi+04h], eax 0x00000049 mov ax, word ptr [esp] 0x0000004d not ax 0x00000050 mov dh, CEh 0x00000052 lea eax, dword ptr [00000000h+ebx*4] 0x00000059 jmp 00007F0B68A16F84h 0x0000005e mov ecx, edi 0x00000060 not al 0x00000062 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C5FC3D second address: 0000000002C5FC27 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 18h 0x00000005 mov eax, 1C7ADB84h 0x0000000a jmp 00007F0B68C4F31Dh 0x0000000c mov ecx, dword ptr [ebp+08h] 0x0000000f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C5FF18 second address: 0000000002C5FF1E instructions: 0x00000000 rdtsc 0x00000002 bsf ax, di 0x00000006 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C3A0A5 second address: 0000000002C3A101 instructions: 0x00000000 rdtsc 0x00000002 rol cl, 00000006h 0x00000005 jns 00007F0B68C4F44Ah 0x0000000b xchg eax, edx 0x0000000c sub esi, 04h 0x0000000f xchg dx, ax 0x00000012 adc cx, si 0x00000015 jnl 00007F0B68C4F265h 0x0000001b inc cl 0x0000001d cmc 0x0000001e jmp 00007F0B68C4F275h 0x00000023 mov cx, ss 0x00000025 mov al, byte ptr [esp] 0x00000028 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C87A67 second address: 0000000002C87AE8 instructions: 0x00000000 rdtsc 0x00000002 mov eax, dword ptr [esp] 0x00000005 mov ah, ch 0x00000007 jmp 00007F0B68A48A72h 0x00000009 sub esi, 02h 0x0000000c xchg eax, edx 0x0000000d stc 0x0000000e jmp 00007F0B68A48A99h 0x00000010 jle 00007F0B68A48A0Dh 0x00000012 jnle 00007F0B68A48A0Bh 0x00000014 or word ptr [esi+04h], cx 0x00000018 mov edx, esp 0x0000001a call 00007F0B68A48A77h 0x0000001f mov al, B4h 0x00000021 jmp 00007F0B68A48A2Ch 0x00000023 pushfd 0x00000024 jmp 00007F0B68A48A8Bh 0x00000026 pop dword ptr [esi] 0x00000028 mov al, C9h 0x0000002a mov edx, esp 0x0000002c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C87AE8 second address: 0000000002C32051 instructions: 0x00000000 rdtsc 0x00000002 xchg dl, al 0x00000004 jmp 00007F0B68BF989Dh 0x00000009 neg al 0x0000000b jmp 00007F0B68C4F380h 0x0000000d jnle 00007F0B68C4F306h 0x0000000f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C68778 second address: 0000000002C68788 instructions: 0x00000000 rdtsc 0x00000002 bsf dx, di 0x00000006 jmp 00007F0B68A48A56h 0x00000008 jo 00007F0B68A48A26h 0x0000000a neg edx 0x0000000c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E3CFE4 second address: 0000000002E3D03D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68C4F31Ah 0x00000004 sub esp, 0Fh 0x00000007 mov ax, dx 0x0000000a call 00007F0B68C4F378h 0x0000000f mov dword ptr [esp+10h], eax 0x00000013 or ch, FFFFFF81h 0x00000016 push word ptr [esp+06h] 0x0000001b pushad 0x0000001c jmp 00007F0B68C4F31Dh 0x0000001e mov dx, 0084h 0x00000022 bsf ebx, edx 0x00000025 mov ebx, dword ptr [esp+2Fh] 0x00000029 mov bx, cx 0x0000002c jmp 00007F0B68C4F3A3h 0x0000002e xchg word ptr [esp+14h], bx 0x00000033 mov word ptr [esp+07h], si 0x00000038 push word ptr [esp+2Bh] 0x0000003d sub esp, 01h 0x00000040 pop edx 0x00000041 xchg dword ptr [esp+28h], eax 0x00000045 jmp 00007F0B68C4F302h 0x00000047 lea ebp, dword ptr [edi+2363DC3Fh] 0x0000004d mov ecx, 1D25122Fh 0x00000052 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E3D03D second address: 0000000002E3D134 instructions: 0x00000000 rdtsc 0x00000002 pop si 0x00000004 mov bh, dl 0x00000006 cld 0x00000007 jmp 00007F0B68A48A7Eh 0x00000009 mov dword ptr [esp+24h], edi 0x0000000d stc 0x0000000e popad 0x0000000f push word ptr [esp+0Ch] 0x00000014 mov word ptr [esp+01h], di 0x00000019 xchg word ptr [esp+06h], ax 0x0000001e jmp 00007F0B68A48A9Dh 0x00000020 mov bx, word ptr [esp+0Dh] 0x00000025 pop word ptr [esp+0Ah] 0x0000002a sub esp, 03h 0x0000002d rcr dl, 00000000h 0x00000030 pop dword ptr [esp+06h] 0x00000034 dec ebx 0x00000035 jmp 00007F0B68A48A14h 0x00000037 sub esp, 12h 0x0000003a bswap esi 0x0000003c mov ecx, esp 0x0000003e setnl cl 0x00000041 cmc 0x00000042 xchg edi, eax 0x00000044 jmp 00007F0B68A48AC8h 0x00000046 xchg ax, di 0x00000048 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E3D134 second address: 0000000002E3D0C4 instructions: 0x00000000 rdtsc 0x00000002 call 00007F0B68C4F2C6h 0x00000007 bts cx, bp 0x0000000b pop ebp 0x0000000c rol dx, cl 0x0000000f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E3D0C4 second address: 0000000002E3D111 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68A48A8Bh 0x00000004 lea edi, dword ptr [edi+ebp] 0x00000007 mov dword ptr [esp+11h], eax 0x0000000b sub bp, E0F4h 0x00000010 xchg dword ptr [esp+1Bh], ebx 0x00000014 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E3D42F second address: 0000000002E3D40B instructions: 0x00000000 rdtsc 0x00000002 or edx, esi 0x00000004 jmp 00007F0B68C4F2B9h 0x00000009 mov edx, 8C0A744Fh 0x0000000e cmc 0x0000000f xor cl, 0000005Fh 0x00000012 rcl dx, cl 0x00000015 mov dword ptr [esp+07h], ebp 0x00000019 jmp 00007F0B68C4F369h 0x0000001b push dword ptr [esp+0Ch] 0x0000001f not eax 0x00000021 setp bl 0x00000024 setbe bl 0x00000027 not si 0x0000002a mov word ptr [esp+11h], dx 0x0000002f jmp 00007F0B68C4F316h 0x00000031 bswap ebp 0x00000033 push word ptr [esp+05h] 0x00000038 lea edi, dword ptr [eax+edi] 0x0000003b mov si, B3B3h 0x0000003f jmp 00007F0B68C4F35Eh 0x00000041 mov dh, byte ptr [esp+16h] 0x00000045 add esp, 15h 0x00000048 mov bl, F0h 0x0000004a mov cx, word ptr [esp+04h] 0x0000004f pop bp 0x00000051 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E3D40B second address: 0000000002E3D495 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68A48AAFh 0x00000004 xchg ebx, ecx 0x00000006 pushad 0x00000007 pop dword ptr [esp+1Bh] 0x0000000b pop dword ptr [esp+04h] 0x0000000f bsr bx, ax 0x00000013 mov dl, F8h 0x00000015 jmp 00007F0B68A48A21h 0x00000017 xchg esi, edx 0x00000019 mov ch, ah 0x0000001b pop bx 0x0000001d pop edi 0x0000001e lea ebp, dword ptr [eax-0000F067h] 0x00000024 mov dx, 84EDh 0x00000028 jmp 00007F0B68A48A29h 0x0000002a mov edi, 9BCCFFF5h 0x0000002f add ebx, eax 0x00000031 add ax, 000084CAh 0x00000035 mov word ptr [esp+11h], ax 0x0000003a jmp 00007F0B68A48A9Dh 0x0000003c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E3D525 second address: 0000000002E3D5A8 instructions: 0x00000000 rdtsc 0x00000002 mov ax, bp 0x00000005 bsr ax, cx 0x00000009 push dword ptr [esp+12h] 0x0000000d pop ax 0x0000000f jmp 00007F0B68C4F377h 0x00000011 xchg dword ptr [esp+0Dh], ecx 0x00000015 lea esp, dword ptr [esp+0Bh] 0x00000019 mov byte ptr [esp+05h], dl 0x0000001d xchg bl, bh 0x0000001f lea esp, dword ptr [esp+10h] 0x00000023 mov dh, AFh 0x00000025 jmp 00007F0B68C4F316h 0x00000027 std 0x00000028 call 00007F0B68C4F3EBh 0x0000002d push dword ptr [esp+02h] 0x00000031 mov esi, 77201D02h 0x00000036 lea edx, dword ptr [esp+1F709682h] 0x0000003d bswap edi 0x0000003f cpuid 0x00000041 jmp 00007F0B68C4F2FDh 0x00000043 sbb bx, si 0x00000046 xchg word ptr [esp], di 0x0000004a lea eax, dword ptr [00000000h+edi*4] 0x00000051 xchg word ptr [esp+03h], cx 0x00000056 xchg byte ptr [esp+04h], dl 0x0000005a cpuid 0x0000005c jmp 00007F0B68C4F30Ch 0x0000005e sub esp, 10h 0x00000061 push dword ptr [esp+06h] 0x00000065 lea esp, dword ptr [esp+15h] 0x00000069 lea esi, dword ptr [00000000h+esi*4] 0x00000070 jmp 00007F0B68C4F318h 0x00000072 lea esp, dword ptr [esp+08h] 0x00000076 bsr ebx, esi 0x00000079 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E3D7DE second address: 0000000002E3D861 instructions: 0x00000000 rdtsc 0x00000002 lea esi, dword ptr [eax+6F971120h] 0x00000008 xchg bx, si 0x0000000b jmp 00007F0B68A48A67h 0x0000000d mov dl, cl 0x0000000f std 0x00000010 mov bx, word ptr [esp] 0x00000014 xchg ebx, ebp 0x00000016 xchg ebp, edx 0x00000018 lea edi, dword ptr [edx+ebx] 0x0000001b jmp 00007F0B68A48A98h 0x0000001d xchg eax, ebp 0x0000001e mov di, ax 0x00000021 std 0x00000022 neg bx 0x00000025 setb ah 0x00000028 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E3D9FA second address: 0000000002E3D9D6 instructions: 0x00000000 rdtsc 0x00000002 dec cx 0x00000004 push dword ptr [esp+05h] 0x00000008 mov ebp, dword ptr [esp+33h] 0x0000000c lea edx, dword ptr [00000000h+ebp*4] 0x00000013 push dword ptr [esp+32h] 0x00000017 jmp 00007F0B68C4F2FEh 0x00000019 mov dword ptr [esp+25h], ecx 0x0000001d setnl dh 0x00000020 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E3D9D6 second address: 0000000002E3DA7E instructions: 0x00000000 rdtsc 0x00000002 xchg ecx, esi 0x00000004 lea ebx, dword ptr [ecx+edi] 0x00000007 xchg byte ptr [esp+19h], cl 0x0000000b call 00007F0B68A48A99h 0x00000010 jmp 00007F0B68A48A39h 0x00000012 push bp 0x00000014 xchg byte ptr [esp+11h], cl 0x00000018 pop edx 0x00000019 mov bh, dh 0x0000001b mov byte ptr [esp+2Dh], dh 0x0000001f mov ebp, ebx 0x00000021 jmp 00007F0B68A48A76h 0x00000023 pop word ptr [esp+13h] 0x00000028 mov word ptr [esp+2Ch], bx 0x0000002d bt ecx, ebp 0x00000030 mov edx, ebx 0x00000032 neg si 0x00000035 clc 0x00000036 jmp 00007F0B68A48A21h 0x00000038 sbb esi, E0A84136h 0x0000003e mov word ptr [esp+02h], di 0x00000043 lea esi, dword ptr [378A0432h] 0x00000049 xchg di, bp 0x0000004c xchg edi, ebp 0x0000004e jmp 00007F0B68A48A81h 0x00000050 push dword ptr [esp+29h] 0x00000054 mov ebp, DF4D6296h 0x00000059 pop bp 0x0000005b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002E3DDF5 second address: 0000000002E3DDBC instructions: 0x00000000 rdtsc 0x00000002 lea esp, dword ptr [esp+01h] 0x00000006 push word ptr [esp+02h] 0x0000000b mov esi, 2EED7EFDh 0x00000010 sub esp, 0Dh 0x00000013 jmp 00007F0B68C4F2F4h 0x00000015 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D44997 second address: 0000000002D449D9 instructions: 0x00000000 rdtsc 0x00000002 btc cx, bx 0x00000006 je 00007F0B68A48A0Ah 0x00000008 clc 0x00000009 jmp 00007F0B68A48A26h 0x0000000b xor dx, A906h 0x00000010 jmp 00007F0B68A48A9Fh 0x00000012 lea ecx, dword ptr [edi+50h] 0x00000015 mov dx, ax 0x00000018 mov dl, byte ptr [esp] 0x0000001b lea eax, dword ptr [eax+0000D183h] 0x00000021 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D4DCA2 second address: 0000000002D4DC76 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, 4D026007h 0x00000007 sub esi, 04h 0x0000000a jmp 00007F0B68C4F303h 0x0000000c lea edx, dword ptr [00000000h+ecx*4] 0x00000013 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D3F054 second address: 0000000002D3F276 instructions: 0x00000000 rdtsc 0x00000002 mov ax, CFB1h 0x00000006 push dword ptr [esp+10h] 0x0000000a retn 0014h 0x0000000d call 00007F0B68A489EEh 0x00000012 lea esp, dword ptr [esp+02h] 0x00000016 call 00007F0B68A48AFAh 0x0000001b mov cx, word ptr [esp] 0x0000001f sub esp, 09h 0x00000022 mov ah, D2h 0x00000024 dec edx 0x00000025 inc al 0x00000027 jmp 00007F0B68A48A2Eh 0x00000029 lea esp, dword ptr [esp+01h] 0x0000002d xchg dword ptr [esp+08h], eax 0x00000031 sets ch 0x00000034 mov edx, ebx 0x00000036 pushfd 0x00000037 jmp 00007F0B68A48A66h 0x00000039 lea esp, dword ptr [esp+01h] 0x0000003d lea ecx, dword ptr [A28040EFh] 0x00000043 lea esp, dword ptr [esp+03h] 0x00000047 jmp 00007F0B68A48F0Eh 0x0000004c lea eax, dword ptr [eax+6Bh] 0x0000004f mov dh, AEh 0x00000051 setp dh 0x00000054 push bx 0x00000056 lea ecx, dword ptr [00000000h+ecx*4] 0x0000005d lea esp, dword ptr [esp+02h] 0x00000061 jmp 00007F0B68A48732h 0x00000066 xchg dword ptr [esp+08h], eax 0x0000006a inc eax 0x0000006b mov al, 99h 0x0000006d sets cl 0x00000070 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D3F276 second address: 0000000002D3F106 instructions: 0x00000000 rdtsc 0x00000002 push dword ptr [esp+08h] 0x00000006 retn 000Ch 0x00000009 jmp 00007F0B68C4F3E2h 0x0000000e rol edi, 00000000h 0x00000011 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D3F106 second address: 0000000002D3F145 instructions: 0x00000000 rdtsc 0x00000002 mov ax, dx 0x00000005 shl al, cl 0x00000007 jc 00007F0B68A48A2Fh 0x00000009 jnc 00007F0B68A48A17h 0x0000000b mov ch, byte ptr [esp] 0x0000000e mov dl, 36h 0x00000010 jmp 00007F0B68A48B0Eh 0x00000015 lea esp, dword ptr [esp+18h] 0x00000019 neg edi 0x0000001b rol al, 00000006h 0x0000001e jns 00007F0B68A48A07h 0x00000020 bswap ecx 0x00000022 push esp 0x00000023 rol edi, 00000000h 0x00000026 lea eax, dword ptr [00000000h+ebp*4] 0x0000002d call 00007F0B68A48A2Ch 0x00000032 lea ecx, dword ptr [edx+edi] 0x00000035 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D50B44 second address: 0000000002D50BE4 instructions: 0x00000000 rdtsc 0x00000002 setnb ah 0x00000005 bsr ax, bx 0x00000009 jle 00007F0B68C4F34Fh 0x0000000b jnle 00007F0B68C4F34Dh 0x0000000d add esi, 04h 0x00000010 jmp 00007F0B68C4F346h 0x00000012 mov eax, A32D9BDBh 0x00000017 sub esp, 0Dh 0x0000001a jo 00007F0B68C4F36Eh 0x0000001c pop cx 0x0000001e jmp 00007F0B68C4F354h 0x00000020 xchg dword ptr [esp+04h], edx 0x00000024 lea esp, dword ptr [esp+03h] 0x00000028 jmp 00007F0B68C4F358h 0x0000002a push ebp 0x0000002b xchg al, cl 0x0000002d jmp 00007F0B68C4F37Ch 0x0000002f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D8867B second address: 0000000002D8870C instructions: 0x00000000 rdtsc 0x00000002 dec edx 0x00000003 lea ecx, dword ptr [00000000h+ebx*4] 0x0000000a xchg cx, dx 0x0000000d cmc 0x0000000e jmp 00007F0B68A48AC7h 0x00000010 xchg dword ptr [esp], ecx 0x00000013 not dx 0x00000016 bsr dx, bx 0x0000001a ror dh, cl 0x0000001c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D5726B second address: 0000000002D52051 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68C4A11Ch 0x00000007 neg al 0x00000009 jmp 00007F0B68C4F380h 0x0000000b jnle 00007F0B68C4F306h 0x0000000d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D51E2B second address: 0000000002D51E6B instructions: 0x00000000 rdtsc 0x00000002 sub esp, 1Fh 0x00000005 js 00007F0B68A48A2Eh 0x00000007 jns 00007F0B68A48A5Ah 0x00000009 add esp, 02h 0x0000000c xor dx, di 0x0000000f push dword ptr [esp+10h] 0x00000013 jmp 00007F0B68A48A8Bh 0x00000015 pop dword ptr [esp+12h] 0x00000019 lea esp, dword ptr [esp+01h] 0x0000001d jmp 00007F0B68A48A28h 0x0000001f lea esp, dword ptr [esp+1Ch] 0x00000023 inc cl 0x00000025 bswap edx 0x00000027 jmp 00007F0B68A48A88h 0x00000029 mov dl, D7h 0x0000002b sub cl, 0000005Ah 0x0000002e lea eax, dword ptr [esi+edi] 0x00000031 mov eax, 459BDAAEh 0x00000036 mov eax, 797942E0h 0x0000003b jmp 00007F0B68A48A08h 0x0000003d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D51E6B second address: 0000000002D51E99 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 setle al 0x00000006 mov word ptr [esp+01h], dx 0x0000000b jmp 00007F0B68C4F355h 0x0000000d lea esp, dword ptr [esp+04h] 0x00000011 add cl, FFFFFF8Ah 0x00000014 lea eax, dword ptr [00000000h+ecx*4] 0x0000001b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D57224 second address: 0000000002D52051 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68A43873h 0x00000007 neg al 0x00000009 jmp 00007F0B68A48A90h 0x0000000b jnle 00007F0B68A48A16h 0x0000000d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D5CB10 second address: 0000000002D5C193 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68C4E9BDh 0x00000007 mov ecx, edi 0x00000009 not al 0x0000000b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C6F6A1 second address: 0000000002C32051 instructions: 0x00000000 rdtsc 0x00000002 mov ax, D373h 0x00000006 mov dx, word ptr [esp] 0x0000000a xchg eax, edx 0x0000000b mov ax, 0531h 0x0000000f shl eax, 13h 0x00000012 jmp 00007F0B68A48AF5h 0x00000017 jbe 00007F0B68A489BCh 0x0000001d ja 00007F0B68A489B6h 0x00000023 inc cx 0x00000025 mov dx, word ptr [esp] 0x00000029 mov ax, word ptr [esp] 0x0000002d mov dl, byte ptr [esp] 0x00000030 jmp 00007F0B68A48A87h 0x00000032 sub cx, 635Ah 0x00000037 not dh 0x00000039 lea edx, dword ptr [eax+esi] 0x0000003c mov edx, dword ptr [esp] 0x0000003f mov dx, word ptr [esp] 0x00000043 jmp 00007F0B68A48A0Ah 0x00000045 xchg edx, eax 0x00000047 dec dl 0x00000049 jns 00007F0B68A48A6Bh 0x0000004b add cx, 108Ah 0x00000050 lea edx, dword ptr [edx+esi] 0x00000053 jmp 00007F0B68A48A87h 0x00000055 mov ah, 76h 0x00000057 mov dx, 6461h 0x0000005b call 00007F0B68A48A34h 0x00000060 mov word ptr [esi], cx 0x00000063 pushad 0x00000064 lea eax, dword ptr [00000000h+ebx*4] 0x0000006b jmp 00007F0B68A48A66h 0x0000006d lea ecx, dword ptr [esp+42h] 0x00000071 lea edx, dword ptr [00000000h+ebx*4] 0x00000078 jmp 00007F0B68A0B352h 0x0000007d neg al 0x0000007f jmp 00007F0B68A48A90h 0x00000081 jnle 00007F0B68A48A16h 0x00000083 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C65A2C second address: 0000000002C3C193 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68C4F315h 0x00000004 call 00007F0B68C4F328h 0x00000009 jmp 00007F0B68C4F35Dh 0x0000000b xchg eax, ecx 0x0000000c sets dh 0x0000000f lea edx, dword ptr [00000000h+edi*4] 0x00000016 bswap edx 0x00000018 jmp 00007F0B68C4F44Dh 0x0000001d cbw 0x0000001f mov dh, C8h 0x00000021 not dl 0x00000023 lea edx, dword ptr [eax+ebx] 0x00000026 sub esp, 1Eh 0x00000029 jmp 00007F0B68C4F279h 0x0000002e jnc 00007F0B68C4F3A4h 0x00000030 lea esp, dword ptr [esp+02h] 0x00000034 xchg eax, ecx 0x00000035 mov dx, word ptr [esp] 0x00000039 jmp 00007F0B68C4F2B2h 0x0000003e mov edx, esp 0x00000040 lea edx, dword ptr [edi-31FB5232h] 0x00000046 bswap edx 0x00000048 mov word ptr [esi], cx 0x0000004b setle dl 0x0000004e jmp 00007F0B68C4F31Ah 0x00000050 lea edx, dword ptr [00000000h+edi*4] 0x00000057 btc edx, esi 0x0000005a jle 00007F0B68C4F38Bh 0x0000005c mov dx, word ptr [esp] 0x00000060 jmp 00007F0B68C25A8Fh 0x00000065 mov ecx, edi 0x00000067 not al 0x00000069 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D5024C second address: 0000000002D50402 instructions: 0x00000000 rdtsc 0x00000002 not cx 0x00000005 mov dx, di 0x00000008 neg ax 0x0000000b jmp 00007F0B68A48BF2h 0x00000010 jnc 00007F0B68A488C9h 0x00000016 mov bx, sp 0x00000019 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D50402 second address: 0000000002D3EF12 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68C4F2B9h 0x00000007 lea edx, dword ptr [esi+2B069A91h] 0x0000000d jmp 00007F0B68C4F23Ah 0x00000012 lea eax, dword ptr [00000000h+edi*4] 0x00000019 sets bl 0x0000001c neg dx 0x0000001f jmp 00007F0B68C4F350h 0x00000021 jl 00007F0B68C4F369h 0x00000023 mov ebx, dword ptr [esp] 0x00000026 lea esp, dword ptr [esp+04h] 0x0000002a jmp 00007F0B68C3DECCh 0x0000002f mov ebx, edi 0x00000031 jmp 00007F0B68C4F31Ah 0x00000033 xor cx, 1B47h 0x00000038 jno 00007F0B68C4F325h 0x0000003a lea ecx, dword ptr [00000000h+edx*4] 0x00000041 mov edx, dword ptr [esp] 0x00000044 jmp 00007F0B68C4F38Ah 0x00000046 mov dx, word ptr [esp] 0x0000004a sub esp, 0Eh 0x0000004d pop dword ptr [esp+02h] 0x00000051 jmp 00007F0B68C4F31Fh 0x00000053 add esp, 06h 0x00000056 push bp 0x00000058 cmc 0x00000059 jnbe 00007F0B68C4F3B9h 0x0000005b xchg dword ptr [esp], edx 0x0000005e lea esp, dword ptr [esp+02h] 0x00000062 call 00007F0B68C4F377h 0x00000067 lea ecx, dword ptr [ebp-0E4DF243h] 0x0000006d xchg dx, cx 0x00000070 mov eax, esi 0x00000072 jmp 00007F0B68C4F373h 0x00000074 or ch, FFFFFFA1h 0x00000077 dec eax 0x00000078 xchg dword ptr [esp], edi 0x0000007b dec dl 0x0000007d mov ax, bx 0x00000080 lea eax, dword ptr [D78CC83Fh] 0x00000086 jmp 00007F0B68C4F380h 0x00000088 lea edx, dword ptr [esi+ebp] 0x0000008b lea edi, dword ptr [edi+4Ch] 0x0000008e pushfd 0x0000008f bswap edx 0x00000091 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D51475 second address: 0000000002D515DC instructions: 0x00000000 rdtsc 0x00000002 lea edx, dword ptr [ecx+67h] 0x00000005 push ebx 0x00000006 clc 0x00000007 jle 00007F0B68A48AA3h 0x00000009 bswap ebp 0x0000000b lea ebp, dword ptr [esi+edi] 0x0000000e xchg dl, cl 0x00000010 call 00007F0B68A48B65h 0x00000015 mov bh, byte ptr [esp] 0x00000018 mov ch, bh 0x0000001a btc dx, bx 0x0000001e jmp 00007F0B68A48A89h 0x00000020 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D93DA9 second address: 0000000002D93DAB instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D94726 second address: 0000000002D94652 instructions: 0x00000000 rdtsc 0x00000002 stc 0x00000003 jmp 00007F0B68A488B4h 0x00000008 mov dl, byte ptr [esp] 0x0000000b not ax 0x0000000e push dword ptr [esp+08h] 0x00000012 retn 000Ch 0x00000015 mov ecx, 49808F39h 0x0000001a lea ecx, dword ptr [edx+esi] 0x0000001d lea esp, dword ptr [esp+02h] 0x00000021 jmp 00007F0B68A48AAEh 0x00000023 mov edx, esi 0x00000025 mov ecx, dword ptr [edx] 0x00000027 mov dh, byte ptr [esp] 0x0000002a call 00007F0B68A48ACFh 0x0000002f setl dh 0x00000032 jmp 00007F0B68A489FFh 0x00000034 mov edx, dword ptr [esp+01h] 0x00000038 add esi, 04h 0x0000003b call 00007F0B68A48A31h 0x00000040 push dword ptr [esp] 0x00000043 je 00007F0B68A48A87h 0x00000045 jne 00007F0B68A48A6Fh 0x00000047 bsf dx, dx 0x0000004b call 00007F0B68A48B64h 0x00000050 lea edx, dword ptr [00000000h+edi*4] 0x00000057 mov ax, word ptr [esp] 0x0000005b mov dx, word ptr [esp] 0x0000005f bts ax, dx 0x00000063 xchg ax, dx 0x00000065 jmp 00007F0B68A4898Ch 0x0000006a xchg dword ptr [esp], edi 0x0000006d push edx 0x0000006e pop dx 0x00000070 xchg al, dh 0x00000072 bt eax, ecx 0x00000075 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D8DB28 second address: 0000000002D5C193 instructions: 0x00000000 rdtsc 0x00000002 mov cl, byte ptr [esp] 0x00000005 mov ecx, 6AB4FF8Eh 0x0000000a mov cl, al 0x0000000c jmp 00007F0B68C4F6BBh 0x00000011 sub esi, 08h 0x00000014 bsf ecx, ebp 0x00000017 je 00007F0B68C4F012h 0x0000001d lea ecx, dword ptr [B11B85EFh] 0x00000023 sub esp, 1Ch 0x00000026 jmp 00007F0B68C4EFDEh 0x0000002b mov dword ptr [esi], edx 0x0000002d sub esp, 10h 0x00000030 jmp 00007F0B68C4F466h 0x00000035 jg 00007F0B68C4F220h 0x0000003b lea ecx, dword ptr [97B3A23Bh] 0x00000041 jmp 00007F0B68C4F415h 0x00000046 mov dword ptr [esi+04h], eax 0x00000049 mov ax, word ptr [esp] 0x0000004d not ax 0x00000050 mov dh, CEh 0x00000052 lea eax, dword ptr [00000000h+ebx*4] 0x00000059 jmp 00007F0B68C1D874h 0x0000005e mov ecx, edi 0x00000060 not al 0x00000062 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D7FC3D second address: 0000000002D7FC27 instructions: 0x00000000 rdtsc 0x00000002 sub esp, 18h 0x00000005 mov eax, 1C7ADB84h 0x0000000a jmp 00007F0B68A48A2Dh 0x0000000c mov ecx, dword ptr [ebp+08h] 0x0000000f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D7FF18 second address: 0000000002D7FF1E instructions: 0x00000000 rdtsc 0x00000002 bsf ax, di 0x00000006 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D5A0A5 second address: 0000000002D5A101 instructions: 0x00000000 rdtsc 0x00000002 rol cl, 00000006h 0x00000005 jns 00007F0B68A48B5Ah 0x0000000b xchg eax, edx 0x0000000c sub esi, 04h 0x0000000f xchg dx, ax 0x00000012 adc cx, si 0x00000015 jnl 00007F0B68A48975h 0x0000001b inc cl 0x0000001d cmc 0x0000001e jmp 00007F0B68A48985h 0x00000023 mov cx, ss 0x00000025 mov al, byte ptr [esp] 0x00000028 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002DA7A67 second address: 0000000002DA7AE8 instructions: 0x00000000 rdtsc 0x00000002 mov eax, dword ptr [esp] 0x00000005 mov ah, ch 0x00000007 jmp 00007F0B68C4F362h 0x00000009 sub esi, 02h 0x0000000c xchg eax, edx 0x0000000d stc 0x0000000e jmp 00007F0B68C4F389h 0x00000010 jle 00007F0B68C4F2FDh 0x00000012 jnle 00007F0B68C4F2FBh 0x00000014 or word ptr [esi+04h], cx 0x00000018 mov edx, esp 0x0000001a call 00007F0B68C4F367h 0x0000001f mov al, B4h 0x00000021 jmp 00007F0B68C4F31Ch 0x00000023 pushfd 0x00000024 jmp 00007F0B68C4F37Bh 0x00000026 pop dword ptr [esi] 0x00000028 mov al, C9h 0x0000002a mov edx, esp 0x0000002c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002DA7AE8 second address: 0000000002D5208D instructions: 0x00000000 rdtsc 0x00000002 xchg dl, al 0x00000004 jmp 00007F0B689F2FADh 0x00000009 neg al 0x0000000b jmp 00007F0B68A48A90h 0x0000000d jnle 00007F0B68A48A16h 0x0000000f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D88778 second address: 0000000002D88788 instructions: 0x00000000 rdtsc 0x00000002 bsf dx, di 0x00000006 jmp 00007F0B68C4F346h 0x00000008 jo 00007F0B68C4F316h 0x0000000a neg edx 0x0000000c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C7B257 second address: 0000000002C7B294 instructions: 0x00000000 rdtsc 0x00000002 xchg cl, dl 0x00000004 xchg cl, ch 0x00000006 jmp 00007F0B68A48A81h 0x00000008 lea ebp, dword ptr [ebp+00000096h] 0x0000000e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002C703BA second address: 0000000002C703BA instructions: 0x00000000 rdtsc 0x00000002 xor dx, E322h 0x00000007 mov dword ptr [esp+1Ch], ecx 0x0000000b popad 0x0000000c sub esp, 19h 0x0000000f jmp 00007F0B68C4F2C8h 0x00000011 lea esp, dword ptr [esp+01h] 0x00000015 shr eax, 10h 0x00000018 lea esp, dword ptr [esp+18h] 0x0000001c test ax, ax 0x0000001f jmp 00007F0B68C4F2D5h 0x00000021 je 00007F0B68C4F1C0h 0x00000027 inc edx 0x00000028 jmp 00007F0B68C4F439h 0x0000002d push bp 0x0000002f lea esp, dword ptr [esp+02h] 0x00000033 jmp 00007F0B68C4F35Ah 0x00000035 inc edx 0x00000036 dec esi 0x00000037 jne 00007F0B68C4F266h 0x0000003d movzx eax, word ptr [edx] 0x00000040 jmp 00007F0B68C4F72Ch 0x00000045 cmc 0x00000046 add ecx, eax 0x00000048 xor ax, ax 0x0000004b pushad 0x0000004c jmp 00007F0B68C4F14Bh 0x00000051 xchg dx, bp 0x00000054 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D8F6A1 second address: 0000000002D52051 instructions: 0x00000000 rdtsc 0x00000002 mov ax, D373h 0x00000006 mov dx, word ptr [esp] 0x0000000a xchg eax, edx 0x0000000b mov ax, 0531h 0x0000000f shl eax, 13h 0x00000012 jmp 00007F0B68A48AF5h 0x00000017 jbe 00007F0B68A489BCh 0x0000001d ja 00007F0B68A489B6h 0x00000023 inc cx 0x00000025 mov dx, word ptr [esp] 0x00000029 mov ax, word ptr [esp] 0x0000002d mov dl, byte ptr [esp] 0x00000030 jmp 00007F0B68A48A87h 0x00000032 sub cx, 635Ah 0x00000037 not dh 0x00000039 lea edx, dword ptr [eax+esi] 0x0000003c mov edx, dword ptr [esp] 0x0000003f mov dx, word ptr [esp] 0x00000043 jmp 00007F0B68A48A0Ah 0x00000045 xchg edx, eax 0x00000047 dec dl 0x00000049 jns 00007F0B68A48A6Bh 0x0000004b add cx, 108Ah 0x00000050 lea edx, dword ptr [edx+esi] 0x00000053 jmp 00007F0B68A48A87h 0x00000055 mov ah, 76h 0x00000057 mov dx, 6461h 0x0000005b call 00007F0B68A48A34h 0x00000060 mov word ptr [esi], cx 0x00000063 pushad 0x00000064 lea eax, dword ptr [00000000h+ebx*4] 0x0000006b jmp 00007F0B68A48A66h 0x0000006d lea ecx, dword ptr [esp+42h] 0x00000071 lea edx, dword ptr [00000000h+ebx*4] 0x00000078 jmp 00007F0B68A0B352h 0x0000007d neg al 0x0000007f jmp 00007F0B68A48A90h 0x00000081 jnle 00007F0B68A48A16h 0x00000083 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D85A2C second address: 0000000002D5C193 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0B68C4F315h 0x00000004 call 00007F0B68C4F328h 0x00000009 jmp 00007F0B68C4F35Dh 0x0000000b xchg eax, ecx 0x0000000c sets dh 0x0000000f lea edx, dword ptr [00000000h+edi*4] 0x00000016 bswap edx 0x00000018 jmp 00007F0B68C4F44Dh 0x0000001d cbw 0x0000001f mov dh, C8h 0x00000021 not dl 0x00000023 lea edx, dword ptr [eax+ebx] 0x00000026 sub esp, 1Eh 0x00000029 jmp 00007F0B68C4F279h 0x0000002e jnc 00007F0B68C4F3A4h 0x00000030 lea esp, dword ptr [esp+02h] 0x00000034 xchg eax, ecx 0x00000035 mov dx, word ptr [esp] 0x00000039 jmp 00007F0B68C4F2B2h 0x0000003e mov edx, esp 0x00000040 lea edx, dword ptr [edi-31FB5232h] 0x00000046 bswap edx 0x00000048 mov word ptr [esi], cx 0x0000004b setle dl 0x0000004e jmp 00007F0B68C4F31Ah 0x00000050 lea edx, dword ptr [00000000h+edi*4] 0x00000057 btc edx, esi 0x0000005a jle 00007F0B68C4F38Bh 0x0000005c mov dx, word ptr [esp] 0x00000060 jmp 00007F0B68C25A8Fh 0x00000065 mov ecx, edi 0x00000067 not al 0x00000069 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 0000000002D903BA second address: 0000000002D903BA instructions: 0x00000000 rdtsc 0x00000002 xor dx, E322h 0x00000007 mov dword ptr [esp+1Ch], ecx 0x0000000b popad 0x0000000c sub esp, 19h 0x0000000f jmp 00007F0B68A489D8h 0x00000011 lea esp, dword ptr [esp+01h] 0x00000015 shr eax, 10h 0x00000018 lea esp, dword ptr [esp+18h] 0x0000001c test ax, ax 0x0000001f jmp 00007F0B68A489E5h 0x00000021 je 00007F0B68A488D0h 0x00000027 inc edx 0x00000028 jmp 00007F0B68A48B49h 0x0000002d push bp 0x0000002f lea esp, dword ptr [esp+02h] 0x00000033 jmp 00007F0B68A48A6Ah 0x00000035 inc edx 0x00000036 dec esi 0x00000037 jne 00007F0B68A48976h 0x0000003d movzx eax, word ptr [edx] 0x00000040 jmp 00007F0B68A48E3Ch 0x00000045 cmc 0x00000046 add ecx, eax 0x00000048 xor ax, ax 0x0000004b pushad 0x0000004c jmp 00007F0B68A4885Bh 0x00000051 xchg dx, bp 0x00000054 rdtsc |