Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0 |
Source: z1F_4_T_U_r_4_2024mfdfgryry5.msi, MSI71AA.tmp.1.dr, MSI714B.tmp.1.dr, MSI7277.tmp.1.dr, MSI71E9.tmp.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E |
Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA.crt0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0 |
Source: z1F_4_T_U_r_4_2024mfdfgryry5.msi, MSI71AA.tmp.1.dr, MSI714B.tmp.1.dr, MSI7277.tmp.1.dr, MSI71E9.tmp.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0 |
Source: z1F_4_T_U_r_4_2024mfdfgryry5.msi, MSI71AA.tmp.1.dr, MSI714B.tmp.1.dr, MSI7277.tmp.1.dr, MSI71E9.tmp.1.dr | String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C |
Source: abd1 .exe, 00000006.00000002.507443605.0000000000927000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.globalsign.net/root-r2.crl0 |
Source: z1F_4_T_U_r_4_2024mfdfgryry5.msi, MSI71AA.tmp.1.dr, MSI714B.tmp.1.dr, MSI7277.tmp.1.dr, MSI71E9.tmp.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0 |
Source: z1F_4_T_U_r_4_2024mfdfgryry5.msi, MSI71AA.tmp.1.dr, MSI714B.tmp.1.dr, MSI7277.tmp.1.dr, MSI71E9.tmp.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0 |
Source: z1F_4_T_U_r_4_2024mfdfgryry5.msi, MSI71AA.tmp.1.dr, MSI714B.tmp.1.dr, MSI7277.tmp.1.dr, MSI71E9.tmp.1.dr | String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/EVCodeSigning-g1.crl03 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0: |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/EVCodeSigning-g1.crl0K |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K |
Source: abd1 .exe.1.dr | String found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0 |
Source: z1F_4_T_U_r_4_2024mfdfgryry5.msi, MSI71AA.tmp.1.dr, MSI714B.tmp.1.dr, MSI7277.tmp.1.dr, MSI71E9.tmp.1.dr | String found in binary or memory: http://ocsp.digicert.com0A |
Source: z1F_4_T_U_r_4_2024mfdfgryry5.msi, MSI71AA.tmp.1.dr, MSI714B.tmp.1.dr, MSI7277.tmp.1.dr, abd1 .exe.1.dr, MSI71E9.tmp.1.dr | String found in binary or memory: http://ocsp.digicert.com0C |
Source: abd1 .exe.1.dr | String found in binary or memory: http://ocsp.digicert.com0H |
Source: abd1 .exe.1.dr | String found in binary or memory: http://ocsp.digicert.com0I |
Source: abd1 .exe.1.dr | String found in binary or memory: http://ocsp.digicert.com0O |
Source: z1F_4_T_U_r_4_2024mfdfgryry5.msi, MSI71AA.tmp.1.dr, MSI714B.tmp.1.dr, MSI7277.tmp.1.dr, MSI71E9.tmp.1.dr | String found in binary or memory: http://ocsp.digicert.com0X |
Source: abd1 .exe, 00000003.00000000.310275166.0000000000401000.00000020.00000001.01000000.00000003.sdmp, abd1 .exe.1.dr | String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/ |
Source: abd1 .exe, 00000003.00000000.310275166.0000000000401000.00000020.00000001.01000000.00000003.sdmp, abd1 .exe.1.dr | String found in binary or memory: http://stats.itopvpn.com/iusage.php |
Source: z1F_4_T_U_r_4_2024mfdfgryry5.msi, MSI71AA.tmp.1.dr, MSI714B.tmp.1.dr, MSI7277.tmp.1.dr, MSI71E9.tmp.1.dr | String found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0 |
Source: z1F_4_T_U_r_4_2024mfdfgryry5.msi, MSI71AA.tmp.1.dr, MSI714B.tmp.1.dr, MSI7277.tmp.1.dr, MSI71E9.tmp.1.dr | String found in binary or memory: http://t2.symcb.com0 |
Source: z1F_4_T_U_r_4_2024mfdfgryry5.msi, MSI71AA.tmp.1.dr, MSI714B.tmp.1.dr, MSI7277.tmp.1.dr, MSI71E9.tmp.1.dr | String found in binary or memory: http://tl.symcb.com/tl.crl0 |
Source: z1F_4_T_U_r_4_2024mfdfgryry5.msi, MSI71AA.tmp.1.dr, MSI714B.tmp.1.dr, MSI7277.tmp.1.dr, MSI71E9.tmp.1.dr | String found in binary or memory: http://tl.symcb.com/tl.crt0 |
Source: z1F_4_T_U_r_4_2024mfdfgryry5.msi, MSI71AA.tmp.1.dr, MSI714B.tmp.1.dr, MSI7277.tmp.1.dr, MSI71E9.tmp.1.dr | String found in binary or memory: http://tl.symcd.com0& |
Source: abd1 .exe.1.dr | String found in binary or memory: http://www.digicert.com/CPS0 |
Source: abd1 .exe.1.dr | String found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0 |
Source: abd1 .exe, 00000003.00000002.590563639.0000000002F20000.00000004.00000800.00020000.00000000.sdmp, abd1 .exe, 00000006.00000002.519324588.000000006A7F9000.00000040.00000001.01000000.00000004.sdmp, abd1 .exe, 00000006.00000002.518434684.0000000002EA0000.00000004.00000800.00020000.00000000.sdmp, abd1 .exe, 00000007.00000002.538859224.0000000002D70000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.indyproject.org/ |
Source: abd1 .exe, 00000006.00000002.507443605.0000000000927000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br |
Source: abd1 .exe, 00000006.00000002.507443605.0000000000927000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/ |
Source: abd1 .exe, 00000006.00000002.507443605.000000000096C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/9P |
Source: abd1 .exe, 00000006.00000002.507443605.000000000096C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/IP |
Source: abd1 .exe, 00000006.00000002.507443605.0000000000927000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionand |
Source: abd1 .exe, 00000007.00000002.521027541.0000000000195000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php |
Source: abd1 .exe, 00000003.00000002.592601515.00000000069D0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php% |
Source: abd1 .exe, 00000006.00000002.507443605.00000000008F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php2 |
Source: abd1 .exe, 00000003.00000002.592601515.00000000069D0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php4 |
Source: abd1 .exe, 00000003.00000002.592601515.00000000069D0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.php: |
Source: abd1 .exe, 00000003.00000002.592601515.00000000069D0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpC |
Source: abd1 .exe, 00000006.00000002.507443605.0000000000927000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpIBAD |
Source: abd1 .exe, 00000006.00000002.507443605.0000000000927000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpLMEMp |
Source: abd1 .exe, 00000003.00000002.592601515.00000000069D0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpR |
Source: abd1 .exe, 00000006.00000002.507443605.0000000000927000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpY9FD |
Source: abd1 .exe, 00000003.00000002.592601515.00000000069D0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpf |
Source: abd1 .exe, 00000006.00000002.507443605.0000000000927000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpgBcD |
Source: abd1 .exe, 00000006.00000002.507443605.0000000000927000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phporC: |
Source: abd1 .exe, 00000003.00000002.592601515.00000000069D0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpp |
Source: abd1 .exe, 00000006.00000002.507443605.00000000008FC000.00000004.00000020.00020000.00000000.sdmp, abd1 .exe, 00000006.00000002.507443605.00000000008F7000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phpt |
Source: abd1 .exe, 00000006.00000002.506925692.0000000000195000.00000004.00000010.00020000.00000000.sdmp, abd1 .exe, 00000007.00000002.521027541.0000000000195000.00000004.00000010.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/imagens/bo/inspecionando.phputllib.dll.DLL |
Source: abd1 .exe, 00000006.00000002.507443605.0000000000927000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/m |
Source: abd1 .exe, 00000006.00000002.507443605.0000000000927000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://ebaoffice.com.br/uCuE |
Source: abd1 .exe, 00000006.00000002.507443605.0000000000927000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://login.live.com |
Source: z1F_4_T_U_r_4_2024mfdfgryry5.msi, MSI71AA.tmp.1.dr, MSI714B.tmp.1.dr, MSI7277.tmp.1.dr, MSI71E9.tmp.1.dr | String found in binary or memory: https://www.advancedinstaller.com |
Source: abd1 .exe.1.dr | String found in binary or memory: https://www.digicert.com/CPS0 |
Source: z1F_4_T_U_r_4_2024mfdfgryry5.msi, MSI71AA.tmp.1.dr, MSI714B.tmp.1.dr, MSI7277.tmp.1.dr, MSI71E9.tmp.1.dr | String found in binary or memory: https://www.thawte.com/cps0/ |
Source: z1F_4_T_U_r_4_2024mfdfgryry5.msi, MSI71AA.tmp.1.dr, MSI714B.tmp.1.dr, MSI7277.tmp.1.dr, MSI71E9.tmp.1.dr | String found in binary or memory: https://www.thawte.com/repository0W |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\System32\msiexec.exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: NOGPFAULTERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Process information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C588B74 second address: 000000006C588BC4 instructions: 0x00000000 rdtsc 0x00000002 mov bh, 52h 0x00000004 dec dl 0x00000006 jno 00007FD2E4B0936Dh 0x00000008 jmp 00007FD2E4B09AC5h 0x0000000d bswap eax 0x0000000f not al 0x00000011 lea eax, dword ptr [esp+0000008Ch] 0x00000018 jmp 00007FD2E4B08EB5h 0x0000001d setnl bh 0x00000020 not esi 0x00000022 rcl ebx, cl 0x00000024 jnp 00007FD2E4B09315h 0x00000026 jmp 00007FD2E4B09248h 0x0000002b dec ah 0x0000002d btc dx, di 0x00000031 mov dl, B9h 0x00000033 jmp 00007FD2E4B0932Eh 0x00000035 bsr edx, ecx 0x00000038 call 00007FD2E4B09377h 0x0000003d rcr bh, cl 0x0000003f jnbe 00007FD2E4B093C2h 0x00000041 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C588FFF second address: 000000006C588FD0 instructions: 0x00000000 rdtsc 0x00000002 push di 0x00000004 xchg word ptr [esp], dx 0x00000008 sets dh 0x0000000b jmp 00007FD2E4AC448Bh 0x0000000d lea esp, dword ptr [esp+02h] 0x00000011 jmp 00007FD2E4AC4496h 0x00000013 inc esi 0x00000014 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C588FD0 second address: 000000006C589039 instructions: 0x00000000 rdtsc 0x00000002 bts eax, eax 0x00000005 jne 00007FD2E4B093C7h 0x00000007 mov ah, byte ptr [esp] 0x0000000a jmp 00007FD2E4B093D0h 0x0000000c mov edx, dword ptr [esp] 0x0000000f sub dx, di 0x00000012 mov edx, C2F83778h 0x00000017 jmp 00007FD2E4B0936Fh 0x00000019 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C58A361 second address: 000000006C58A363 instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C58A2EC second address: 000000006C58A2EE instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C596EB8 second address: 000000006C596F49 instructions: 0x00000000 rdtsc 0x00000002 sete dl 0x00000005 jmp 00007FD2E4AC44D6h 0x00000007 lea esp, dword ptr [esp+04h] 0x0000000b add bl, 00000059h 0x0000000e mov edx, dword ptr [esp] 0x00000011 inc ax 0x00000013 jmp 00007FD2E4AC44D7h 0x00000015 jnl 00007FD2E4AC449Ah 0x00000017 stc 0x00000018 call 00007FD2E4AC48B8h 0x0000001d bsf ax, cx 0x00000021 js 00007FD2E4AC40FFh 0x00000027 jns 00007FD2E4AC40F9h 0x0000002d jmp 00007FD2E4AC449Ah 0x0000002f ror bl, 00000000h 0x00000032 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C594925 second address: 000000006C5949F7 instructions: 0x00000000 rdtsc 0x00000002 pop word ptr [esp] 0x00000006 jmp 00007FD2E4B09455h 0x0000000b xchg eax, edx 0x0000000c lea esp, dword ptr [esp+02h] 0x00000010 bswap eax 0x00000012 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C594B85 second address: 000000006C594BE0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD2E4AC4BAFh 0x00000007 add esi, 04h 0x0000000a rol dx, cl 0x0000000d ja 00007FD2E4AC4249h 0x00000013 dec ax 0x00000015 jmp 00007FD2E4AC4139h 0x0000001a xchg ax, dx 0x0000001c xor ah, cl 0x0000001e and dx, 888Dh 0x00000023 jmp 00007FD2E4AC439Ah 0x00000028 bsr dx, bp 0x0000002c bts edx, esi 0x0000002f mov edx, dword ptr [esp] 0x00000032 lea eax, dword ptr [00000000h+eax*4] 0x00000039 call 00007FD2E4AC451Eh 0x0000003e neg dl 0x00000040 stc 0x00000041 mov dl, 6Ch 0x00000043 mov dx, ax 0x00000046 xchg dword ptr [esp], ebx 0x00000049 jmp 00007FD2E4AC4463h 0x0000004b rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C594BE0 second address: 000000006C594D62 instructions: 0x00000000 rdtsc 0x00000002 bts dx, bx 0x00000006 mov eax, esp 0x00000008 push ebx 0x00000009 lea ebx, dword ptr [ebx-0000002Ch] 0x0000000f neg eax 0x00000011 jmp 00007FD2E4B09369h 0x00000013 mov dl, byte ptr [esp] 0x00000016 mov dl, byte ptr [esp] 0x00000019 mov ax, 324Eh 0x0000001d xchg dword ptr [esp+04h], ebx 0x00000021 jmp 00007FD2E4B093C1h 0x00000023 lea edx, dword ptr [edi+ebp] 0x00000026 inc dx 0x00000028 mov eax, dword ptr [esp] 0x0000002b mov dh, 9Ch 0x0000002d mov dl, bl 0x0000002f push dword ptr [esp+04h] 0x00000033 retn 0008h 0x00000036 add ebx, 2BC9D459h 0x0000003c jmp 00007FD2E4B093F0h 0x0000003e rcl ah, cl 0x00000040 jnc 00007FD2E4B093E0h 0x00000042 mov eax, edx 0x00000044 bswap eax 0x00000046 jmp 00007FD2E4B09376h 0x00000048 ror ebx, 00000000h 0x0000004b mov dx, 2163h 0x0000004f stc 0x00000050 jne 00007FD2E4B093BAh 0x00000052 clc 0x00000053 call 00007FD2E4B093ACh 0x00000058 bsf ax, bx 0x0000005c jnl 00007FD2E4B09375h 0x0000005e inc dl 0x00000060 jmp 00007FD2E4B093B3h 0x00000062 lea esp, dword ptr [esp+04h] 0x00000066 neg ebx 0x00000068 rcl edx, 1Fh 0x0000006b jno 00007FD2E4B09505h 0x00000071 setnb dl 0x00000074 bsf eax, esi 0x00000077 xchg dl, dh 0x00000079 call 00007FD2E4B0923Ch 0x0000007e mov eax, dword ptr [esp] 0x00000081 mov dx, word ptr [esp] 0x00000085 call 00007FD2E4B0942Dh 0x0000008a rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C596078 second address: 000000006C596183 instructions: 0x00000000 rdtsc 0x00000002 inc bx 0x00000004 jmp 00007FD2E4AC4509h 0x00000006 jp 00007FD2E4AC4464h 0x00000008 jnp 00007FD2E4AC4462h 0x0000000a lea ebp, dword ptr [00000000h+ebx*4] 0x00000011 mov ecx, F2D1F7F8h 0x00000016 push esi 0x00000017 call 00007FD2E4AC44CAh 0x0000001c bsf si, bx 0x00000020 jmp 00007FD2E4AC44EBh 0x00000022 jp 00007FD2E4AC447Bh 0x00000024 xchg word ptr [esp], dx 0x00000028 pushfd 0x00000029 jmp 00007FD2E4AC44CAh 0x0000002b push edi 0x0000002c pushad 0x0000002d mov bh, byte ptr [esp+18h] 0x00000031 mov byte ptr [esp+0Ch], bl 0x00000035 push word ptr [esp+0Ch] 0x0000003a jmp 00007FD2E4AC44F5h 0x0000003c jnc 00007FD2E4AC45B8h 0x00000042 lea esp, dword ptr [esp+02h] 0x00000046 xchg bh, ah 0x00000048 lea ecx, dword ptr [edx+ebx] 0x0000004b lea edi, dword ptr [00000000h+edx*4] 0x00000052 bsr edx, esi 0x00000055 jmp 00007FD2E4AC4411h 0x0000005a add esp, 20h 0x0000005d jno 00007FD2E4AC4475h 0x0000005f pop ebp 0x00000060 mov dx, A2A1h 0x00000064 mov bx, 90C8h 0x00000068 jmp 00007FD2E4AC4487h 0x0000006a shr al, cl 0x0000006c jnle 00007FD2E4AC4498h 0x0000006e mov ah, byte ptr [esp] 0x00000071 jmp 00007FD2E4AC44EAh 0x00000073 add esp, 08h 0x00000076 jnbe 00007FD2E4AC4475h 0x00000078 pop edi 0x00000079 or ah, 0000006Dh 0x0000007c jmp 00007FD2E4AC4549h 0x00000081 jnl 00007FD2E4AC4435h 0x00000083 lea esi, dword ptr [00000000h+esi*4] 0x0000008a rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C595557 second address: 000000006C595541 instructions: 0x00000000 rdtsc 0x00000002 lea esp, dword ptr [esp+08h] 0x00000006 setnle bl 0x00000009 bsf dx, si 0x0000000d jmp 00007FD2E4B09396h 0x0000000f jnbe 00007FD2E4B09367h 0x00000011 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C595541 second address: 000000006C5955EC instructions: 0x00000000 rdtsc 0x00000002 mov ecx, esp 0x00000004 jmp 00007FD2E4AC4513h 0x00000006 pop esi 0x00000007 mov bx, si 0x0000000a cpuid 0x0000000c xchg ax, cx 0x0000000e call 00007FD2E4AC4472h 0x00000013 jmp 00007FD2E4AC44D0h 0x00000015 add esp, 08h 0x00000018 je 00007FD2E4AC448Fh 0x0000001a jne 00007FD2E4AC448Dh 0x0000001c pop ecx 0x0000001d btc dx, si 0x00000021 jnbe 00007FD2E4AC4507h 0x00000023 jmp 00007FD2E4AC4495h 0x00000025 pop edi 0x00000026 call 00007FD2E4AC44E2h 0x0000002b cmc 0x0000002c setnp bh 0x0000002f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C5955EC second address: 000000006C588B74 instructions: 0x00000000 rdtsc 0x00000002 xchg edx, ebx 0x00000004 jmp 00007FD2E4B09372h 0x00000006 xchg dword ptr [esp], edi 0x00000009 lea ebx, dword ptr [edi-000000C8h] 0x0000000f mov bx, word ptr [esp] 0x00000013 jmp 00007FD2E4B093A3h 0x00000015 lea ebx, dword ptr [edx-0000DC30h] 0x0000001b bswap edx 0x0000001d lea edi, dword ptr [edi-0000CA86h] 0x00000023 xchg dh, bh 0x00000025 jmp 00007FD2E4B0945Bh 0x0000002a stc 0x0000002b stc 0x0000002c add bx, sp 0x0000002f xchg dword ptr [esp], edi 0x00000032 mov bx, word ptr [esp] 0x00000036 inc ebx 0x00000037 jmp 00007FD2E4B09324h 0x00000039 mov dx, E18Dh 0x0000003d bts dx, si 0x00000041 bswap edx 0x00000043 push dword ptr [esp] 0x00000046 retn 0004h 0x00000049 mov ecx, esi 0x0000004b mov dx, bx 0x0000004e jmp 00007FD2E4B093C3h 0x00000050 mov dx, word ptr [esp] 0x00000054 lea edx, dword ptr [esp+edi] 0x00000057 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C5956AC second address: 000000006C5956BD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD2E4AC44B6h 0x00000004 push ebp 0x00000005 mov ebp, C0CB15B0h 0x0000000a sete bl 0x0000000d rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C596382 second address: 000000006C5963CA instructions: 0x00000000 rdtsc 0x00000002 call 00007FD2E4B093CFh 0x00000007 dec dl 0x00000009 mov ah, byte ptr [esp] 0x0000000c rol al, cl 0x0000000e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C599EB2 second address: 000000006C599EF8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD2E4AC44F1h 0x00000004 sub ebp, 04h 0x00000007 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C599EF8 second address: 000000006C598C4E instructions: 0x00000000 rdtsc 0x00000002 xchg dl, ah 0x00000004 jmp 00007FD2E4B09321h 0x00000006 mov dword ptr [ebp+00h], ebx 0x00000009 neg edx 0x0000000b jnc 00007FD2E4B093B4h 0x0000000d jc 00007FD2E4B080DEh 0x00000013 call 00007FD2E4B093FCh 0x00000018 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C598C4E second address: 000000006C598D00 instructions: 0x00000000 rdtsc 0x00000002 mov ax, E56Dh 0x00000006 adc edx, C4B6BEBAh 0x0000000c pushfd 0x0000000d xchg dword ptr [esp+04h], ecx 0x00000011 jmp 00007FD2E4AC4489h 0x00000013 btc ebx, ebp 0x00000016 neg ebx 0x00000018 bswap eax 0x0000001a lea eax, dword ptr [00000000h+ebx*4] 0x00000021 jmp 00007FD2E4AC4561h 0x00000026 mov dx, word ptr [esp] 0x0000002a lea ecx, dword ptr [ecx+27h] 0x0000002d bswap edx 0x0000002f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C5A17F9 second address: 000000006C59638A instructions: 0x00000000 rdtsc 0x00000002 dec ah 0x00000004 jmp 00007FD2E4B093ADh 0x00000006 js 00007FD2E4B093A6h 0x00000008 mov ebp, dword ptr [ebp+00h] 0x0000000b jmp 00007FD2E4B09396h 0x0000000d rol ebx, cl 0x0000000f jo 00007FD2E4B093C7h 0x00000011 jno 00007FD2E4B093AFh 0x00000013 btr dx, cx 0x00000017 sub esp, 03h 0x0000001a lea esp, dword ptr [esp+03h] 0x0000001e jmp 00007FD2E4B093A6h 0x00000020 jmp 00007FD2E4B093F8h 0x00000022 lea edx, dword ptr [edi+50h] 0x00000025 inc ah 0x00000027 js 00007FD2E4B09325h 0x00000029 mov bh, 74h 0x0000002b xchg ebx, eax 0x0000002d stc 0x0000002e jmp 00007FD2E4B093B0h 0x00000030 mov eax, dword ptr [esp] 0x00000033 push ebx 0x00000034 cmp ebp, edx 0x00000036 jne 00007FD2E4B093A5h 0x00000038 mov eax, esi 0x0000003a jmp 00007FD2E4B093D5h 0x0000003c mov ax, 7DDFh 0x00000040 mov eax, EAD00AD1h 0x00000045 lea esp, dword ptr [esp+04h] 0x00000049 jmp 00007FD2E4B0936Dh 0x0000004b ja 00007FD2E4AFDE05h 0x00000051 jmp 00007FD2E4B093CDh 0x00000053 movzx ebx, byte ptr [esi] 0x00000056 mov edx, dword ptr [esp] 0x00000059 cmc 0x0000005a je 00007FD2E4B09369h 0x0000005c jne 00007FD2E4B0936Fh 0x0000005e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C592FBD second address: 000000006C592FFA instructions: 0x00000000 rdtsc 0x00000002 setl dh 0x00000005 lea eax, dword ptr [edx+edx] 0x00000008 mov bx, 463Ch 0x0000000c bsf eax, esi 0x0000000f jmp 00007FD2E4AC44F5h 0x00000011 jo 00007FD2E4AC447Ah 0x00000013 mov eax, dword ptr [esp] 0x00000016 bsf ax, dx 0x0000001a jmp 00007FD2E4AC4481h 0x0000001c sete ah 0x0000001f jmp 00007FD2E4AC44DEh 0x00000021 pop ebp 0x00000022 jmp 00007FD2E4AC4483h 0x00000024 btr dx, bx 0x00000028 jbe 00007FD2E4AC454Ah 0x0000002e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C5D5BF6 second address: 000000006C5D5BF8 instructions: 0x00000000 rdtsc 0x00000002 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C5D5BF8 second address: 000000006C598C4E instructions: 0x00000000 rdtsc 0x00000002 xchg dword ptr [esp], edx 0x00000005 jmp 00007FD2E4AC44DEh 0x00000007 rcl ah, cl 0x00000009 inc bx 0x0000000b dec ax 0x0000000d mov bl, 0Ch 0x0000000f lea edx, dword ptr [edx+17h] 0x00000012 call 00007FD2E4AC4545h 0x00000017 mov eax, esi 0x00000019 jmp 00007FD2E4AC446Ch 0x0000001b xchg byte ptr [esp], al 0x0000001e mov bl, AEh 0x00000020 xchg dword ptr [esp+04h], edx 0x00000024 mov edx, 55D31757h 0x00000029 ror dh, cl 0x0000002b neg eax 0x0000002d call 00007FD2E4AC4486h 0x00000032 jmp 00007FD2E4AC449Ah 0x00000034 inc dx 0x00000036 push dword ptr [esp+08h] 0x0000003a retn 000Ch 0x0000003d bswap eax 0x0000003f mov edx, dword ptr [esp] 0x00000042 jmp 00007FD2E4A87486h 0x00000047 call 00007FD2E4AC451Ch 0x0000004c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C5AB33B second address: 000000006C5AB3DA instructions: 0x00000000 rdtsc 0x00000002 mov ax, EB19h 0x00000006 btr eax, edx 0x00000009 jmp 00007FD2E4B0949Eh 0x0000000e jnp 00007FD2E4B0929Fh 0x00000014 xchg dh, bh 0x00000016 add ebp, 02h 0x00000019 rol bx, cl 0x0000001c jmp 00007FD2E4B093EAh 0x0000001e jnl 00007FD2E4B093A7h 0x00000020 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C5AB3DA second address: 000000006C5AB3DE instructions: 0x00000000 rdtsc 0x00000002 xchg dh, bh 0x00000004 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C5AB3DE second address: 000000006C589B0C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD2E4AE7A0Dh 0x00000007 jmp 00007FD2E4B093AFh 0x00000009 mov eax, esi 0x0000000b movzx ebx, byte ptr [eax] 0x0000000e xchg edx, eax 0x00000010 add dx, ax 0x00000013 jmp 00007FD2E4B093A7h 0x00000015 jne 00007FD2E4B093AAh 0x00000017 mov ax, word ptr [esp] 0x0000001b mov ah, byte ptr [esp] 0x0000001e lea eax, dword ptr [edx+edi] 0x00000021 jmp 00007FD2E4B093DBh 0x00000023 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C59CFA8 second address: 000000006C59638A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FD2E4AC44EAh 0x00000004 lea edx, dword ptr [ebp+7Fh] 0x00000007 btr ebx, ebp 0x0000000a jnle 00007FD2E4AC4494h 0x0000000c mov eax, dword ptr [ebp+00h] 0x0000000f lea ebx, dword ptr [ecx+ecx] 0x00000012 jmp 00007FD2E4AC44E0h 0x00000014 xchg bh, bl 0x00000016 lea edx, dword ptr [00000000h+ecx*4] 0x0000001d mov edx, dword ptr [eax] 0x0000001f lea ebx, dword ptr [ecx-0000A136h] 0x00000025 setb bh 0x00000028 jmp 00007FD2E4AC4486h 0x0000002a not bh 0x0000002c shl bl, 1 0x0000002e ja 00007FD2E4AC4838h 0x00000034 jbe 00007FD2E4AC4832h 0x0000003a mov dword ptr [ebp+00h], edx 0x0000003d mov bx, word ptr [esp] 0x00000041 jmp 00007FD2E4AC42A5h 0x00000046 neg bh 0x00000048 jc 00007FD2E4AC4457h 0x0000004a mov bl, dl 0x0000004c jmp 00007FD2E4ABD6F4h 0x00000051 jmp 00007FD2E4AC44EDh 0x00000053 movzx ebx, byte ptr [esi] 0x00000056 mov edx, dword ptr [esp] 0x00000059 cmc 0x0000005a je 00007FD2E4AC4489h 0x0000005c jne 00007FD2E4AC448Fh 0x0000005e rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C599EF3 second address: 000000006C599EF8 instructions: 0x00000000 rdtsc 0x00000002 sub ebp, 04h 0x00000005 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C588B51 second address: 000000006C588B74 instructions: 0x00000000 rdtsc 0x00000002 bswap edi 0x00000004 jmp 00007FD2E4AC447Ah 0x00000006 sub esp, 000000BCh 0x0000000c mov edi, esp 0x0000000e btr dx, ax 0x00000012 jnp 00007FD2E4AC447Dh 0x00000014 mov eax, 90EB6236h 0x00000019 jmp 00007FD2E4AC44E2h 0x0000001b rcr ax, cl 0x0000001e cmp ah, 00000006h 0x00000021 mov ecx, esi 0x00000023 mov dx, bx 0x00000026 jmp 00007FD2E4AC44E3h 0x00000028 mov dx, word ptr [esp] 0x0000002c lea edx, dword ptr [esp+edi] 0x0000002f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C585E22 second address: 000000006C585DFD instructions: 0x00000000 rdtsc 0x00000002 mov eax, ebx 0x00000004 jmp 00007FD2E4B09367h 0x00000006 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C5D65B0 second address: 000000006C5D56B3 instructions: 0x00000000 rdtsc 0x00000002 neg ax 0x00000005 push dword ptr [esp+16h] 0x00000009 lea esp, dword ptr [esp+03h] 0x0000000d xchg dword ptr [esp+18h], ebp 0x00000011 jmp 00007FD2E4AC39FAh 0x00000016 shr eax, cl 0x00000018 lea edx, dword ptr [00000000h+ecx*4] 0x0000001f mov dh, byte ptr [esp] 0x00000022 push dword ptr [esp+18h] 0x00000026 retn 001Ch 0x00000029 movzx ebx, byte ptr [esi] 0x0000002c not dh 0x0000002e jmp 00007FD2E4AC46B4h 0x00000033 neg ax 0x00000036 jnp 00007FD2E4AC4405h 0x0000003c rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C588B74 second address: 000000006C588BC4 instructions: 0x00000000 rdtsc 0x00000002 mov bh, 52h 0x00000004 dec dl 0x00000006 jno 00007FD2E4B0936Dh 0x00000008 jmp 00007FD2E4B09AC5h 0x0000000d bswap eax 0x0000000f not al 0x00000011 lea eax, dword ptr [esp+0000008Ch] 0x00000018 jmp 00007FD2E4B08EB5h 0x0000001d setnl bh 0x00000020 not esi 0x00000022 rcl ebx, cl 0x00000024 jnp 00007FD2E4B09315h 0x00000026 dec ah 0x00000028 btc dx, di 0x0000002c mov dl, B9h 0x0000002e bsr edx, ecx 0x00000031 jmp 00007FD2E4B09169h 0x00000036 call 00007FD2E4B09377h 0x0000003b rcr bh, cl 0x0000003d jnbe 00007FD2E4B093C2h 0x0000003f rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C596EB8 second address: 000000006C596F49 instructions: 0x00000000 rdtsc 0x00000002 sete dl 0x00000005 jmp 00007FD2E4AC44D6h 0x00000007 lea esp, dword ptr [esp+04h] 0x0000000b add bl, 00000059h 0x0000000e mov edx, dword ptr [esp] 0x00000011 inc ax 0x00000013 jmp 00007FD2E4AC44D7h 0x00000015 jnl 00007FD2E4AC449Ah 0x00000017 stc 0x00000018 jmp 00007FD2E4AC4498h 0x0000001a call 00007FD2E4AC48B8h 0x0000001f bsf ax, cx 0x00000023 js 00007FD2E4AC40FFh 0x00000029 jns 00007FD2E4AC40F9h 0x0000002f jmp 00007FD2E4AC449Ah 0x00000031 ror bl, 00000000h 0x00000034 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | RDTSC instruction interceptor: First address: 000000006C5A17F9 second address: 000000006C59638A instructions: 0x00000000 rdtsc 0x00000002 dec ah 0x00000004 jmp 00007FD2E4B093ADh 0x00000006 js 00007FD2E4B093A6h 0x00000008 jns 00007FD2E4B093A4h 0x0000000a mov ebp, dword ptr [ebp+00h] 0x0000000d jmp 00007FD2E4B09396h 0x0000000f rol ebx, cl 0x00000011 jo 00007FD2E4B093C7h 0x00000013 jno 00007FD2E4B093AFh 0x00000015 btr dx, cx 0x00000019 sub esp, 03h 0x0000001c lea esp, dword ptr [esp+03h] 0x00000020 jmp 00007FD2E4B093A6h 0x00000022 jmp 00007FD2E4B093F8h 0x00000024 lea edx, dword ptr [edi+50h] 0x00000027 inc ah 0x00000029 js 00007FD2E4B09325h 0x0000002b mov bh, 74h 0x0000002d jmp 00007FD2E4B0935Ch 0x0000002f xchg ebx, eax 0x00000031 stc 0x00000032 jmp 00007FD2E4B09377h 0x00000034 mov eax, dword ptr [esp] 0x00000037 push ebx 0x00000038 cmp ebp, edx 0x0000003a jne 00007FD2E4B093A5h 0x0000003c mov eax, esi 0x0000003e jmp 00007FD2E4B093D5h 0x00000040 mov ax, 7DDFh 0x00000044 mov eax, EAD00AD1h 0x00000049 lea esp, dword ptr [esp+04h] 0x0000004d jmp 00007FD2E4B0936Dh 0x0000004f ja 00007FD2E4AFDE05h 0x00000055 jmp 00007FD2E4B093CDh 0x00000057 movzx ebx, byte ptr [esi] 0x0000005a mov edx, dword ptr [esp] 0x0000005d cmc 0x0000005e je 00007FD2E4B09369h 0x00000060 jne 00007FD2E4B0936Fh 0x00000062 rdtsc |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02529200 mov eax, dword ptr fs:[00000030h] | 3_2_02529200 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02529200 mov eax, dword ptr fs:[00000030h] | 3_2_02529200 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02529200 mov eax, dword ptr fs:[00000030h] | 3_2_02529200 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02529200 mov eax, dword ptr fs:[00000030h] | 3_2_02529200 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02529200 mov ecx, dword ptr fs:[00000030h] | 3_2_02529200 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02523A33 mov eax, dword ptr fs:[00000030h] | 3_2_02523A33 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02523A33 mov ecx, dword ptr fs:[00000030h] | 3_2_02523A33 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F3A37 mov eax, dword ptr fs:[00000030h] | 3_2_024F3A37 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F3A37 mov eax, dword ptr fs:[00000030h] | 3_2_024F3A37 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F3A37 mov eax, dword ptr fs:[00000030h] | 3_2_024F3A37 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F3A37 mov eax, dword ptr fs:[00000030h] | 3_2_024F3A37 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F4235 mov eax, dword ptr fs:[00000030h] | 3_2_024F4235 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F4235 mov eax, dword ptr fs:[00000030h] | 3_2_024F4235 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F4235 mov eax, dword ptr fs:[00000030h] | 3_2_024F4235 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_025402D5 mov eax, dword ptr fs:[00000030h] | 3_2_025402D5 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_025142DD mov eax, dword ptr fs:[00000030h] | 3_2_025142DD |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_025142DD mov eax, dword ptr fs:[00000030h] | 3_2_025142DD |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F92D0 mov eax, dword ptr fs:[00000030h] | 3_2_024F92D0 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F1AF9 mov eax, dword ptr fs:[00000030h] | 3_2_024F1AF9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F1AF9 mov eax, dword ptr fs:[00000030h] | 3_2_024F1AF9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F3A9F mov eax, dword ptr fs:[00000030h] | 3_2_024F3A9F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F3A9F mov eax, dword ptr fs:[00000030h] | 3_2_024F3A9F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F5A99 mov eax, dword ptr fs:[00000030h] | 3_2_024F5A99 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F5A99 mov eax, dword ptr fs:[00000030h] | 3_2_024F5A99 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F5A99 mov eax, dword ptr fs:[00000030h] | 3_2_024F5A99 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F5A99 mov eax, dword ptr fs:[00000030h] | 3_2_024F5A99 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F5A99 mov eax, dword ptr fs:[00000030h] | 3_2_024F5A99 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F5A99 mov eax, dword ptr fs:[00000030h] | 3_2_024F5A99 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E4AA9 mov eax, dword ptr fs:[00000030h] | 3_2_024E4AA9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0252A2AB mov eax, dword ptr fs:[00000030h] | 3_2_0252A2AB |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F737E mov eax, dword ptr fs:[00000030h] | 3_2_024F737E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F737E mov eax, dword ptr fs:[00000030h] | 3_2_024F737E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F737E mov eax, dword ptr fs:[00000030h] | 3_2_024F737E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F737E mov eax, dword ptr fs:[00000030h] | 3_2_024F737E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F737E mov eax, dword ptr fs:[00000030h] | 3_2_024F737E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F737E mov eax, dword ptr fs:[00000030h] | 3_2_024F737E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F3379 mov eax, dword ptr fs:[00000030h] | 3_2_024F3379 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F3379 mov eax, dword ptr fs:[00000030h] | 3_2_024F3379 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F3379 mov eax, dword ptr fs:[00000030h] | 3_2_024F3379 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F3379 mov eax, dword ptr fs:[00000030h] | 3_2_024F3379 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E2B79 mov ecx, dword ptr fs:[00000030h] | 3_2_024E2B79 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F9329 mov eax, dword ptr fs:[00000030h] | 3_2_024F9329 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F9329 mov eax, dword ptr fs:[00000030h] | 3_2_024F9329 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F9329 mov eax, dword ptr fs:[00000030h] | 3_2_024F9329 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02512327 mov eax, dword ptr fs:[00000030h] | 3_2_02512327 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251B329 mov eax, dword ptr fs:[00000030h] | 3_2_0251B329 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251B329 mov eax, dword ptr fs:[00000030h] | 3_2_0251B329 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02530B2F mov eax, dword ptr fs:[00000030h] | 3_2_02530B2F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02530B2F mov ecx, dword ptr fs:[00000030h] | 3_2_02530B2F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F53C8 mov ecx, dword ptr fs:[00000030h] | 3_2_024F53C8 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F53C8 mov eax, dword ptr fs:[00000030h] | 3_2_024F53C8 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F4BC0 mov eax, dword ptr fs:[00000030h] | 3_2_024F4BC0 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F4BC0 mov eax, dword ptr fs:[00000030h] | 3_2_024F4BC0 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024FA3D8 mov eax, dword ptr fs:[00000030h] | 3_2_024FA3D8 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024FA3D8 mov eax, dword ptr fs:[00000030h] | 3_2_024FA3D8 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024FA3D8 mov eax, dword ptr fs:[00000030h] | 3_2_024FA3D8 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02533BC9 mov eax, dword ptr fs:[00000030h] | 3_2_02533BC9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02533BC9 mov ecx, dword ptr fs:[00000030h] | 3_2_02533BC9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02533BC9 mov ecx, dword ptr fs:[00000030h] | 3_2_02533BC9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F1BAD mov eax, dword ptr fs:[00000030h] | 3_2_024F1BAD |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F1BAD mov eax, dword ptr fs:[00000030h] | 3_2_024F1BAD |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251E04F mov eax, dword ptr fs:[00000030h] | 3_2_0251E04F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251E04F mov ecx, dword ptr fs:[00000030h] | 3_2_0251E04F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024FA067 mov eax, dword ptr fs:[00000030h] | 3_2_024FA067 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024FA067 mov eax, dword ptr fs:[00000030h] | 3_2_024FA067 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251281D mov ecx, dword ptr fs:[00000030h] | 3_2_0251281D |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_025290D4 mov eax, dword ptr fs:[00000030h] | 3_2_025290D4 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_025290D4 mov ecx, dword ptr fs:[00000030h] | 3_2_025290D4 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_025128C1 mov eax, dword ptr fs:[00000030h] | 3_2_025128C1 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_025128C1 mov eax, dword ptr fs:[00000030h] | 3_2_025128C1 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024FA8E9 mov eax, dword ptr fs:[00000030h] | 3_2_024FA8E9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F3899 mov eax, dword ptr fs:[00000030h] | 3_2_024F3899 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F3899 mov eax, dword ptr fs:[00000030h] | 3_2_024F3899 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F3899 mov eax, dword ptr fs:[00000030h] | 3_2_024F3899 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F3899 mov eax, dword ptr fs:[00000030h] | 3_2_024F3899 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_025138B9 cmp dword ptr fs:[00000030h], ebx | 3_2_025138B9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_025138B9 mov eax, dword ptr fs:[00000030h] | 3_2_025138B9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_025138B9 mov eax, dword ptr fs:[00000030h] | 3_2_025138B9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_025138B9 mov eax, dword ptr fs:[00000030h] | 3_2_025138B9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E20B1 mov ebx, dword ptr fs:[00000030h] | 3_2_024E20B1 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E20B1 mov eax, dword ptr fs:[00000030h] | 3_2_024E20B1 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E20B1 mov ecx, dword ptr fs:[00000030h] | 3_2_024E20B1 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E20B1 mov eax, dword ptr fs:[00000030h] | 3_2_024E20B1 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F1979 mov eax, dword ptr fs:[00000030h] | 3_2_024F1979 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F1979 mov eax, dword ptr fs:[00000030h] | 3_2_024F1979 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251D106 mov eax, dword ptr fs:[00000030h] | 3_2_0251D106 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251D106 mov eax, dword ptr fs:[00000030h] | 3_2_0251D106 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251D92F mov eax, dword ptr fs:[00000030h] | 3_2_0251D92F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0254012B mov eax, dword ptr fs:[00000030h] | 3_2_0254012B |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_025331D3 mov eax, dword ptr fs:[00000030h] | 3_2_025331D3 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_025331D3 mov ecx, dword ptr fs:[00000030h] | 3_2_025331D3 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_025331D3 mov ecx, dword ptr fs:[00000030h] | 3_2_025331D3 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024EA9C9 mov eax, dword ptr fs:[00000030h] | 3_2_024EA9C9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0252A1CF mov eax, dword ptr fs:[00000030h] | 3_2_0252A1CF |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0252A1CF mov ecx, dword ptr fs:[00000030h] | 3_2_0252A1CF |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0252A1CF mov eax, dword ptr fs:[00000030h] | 3_2_0252A1CF |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_025121F5 mov eax, dword ptr fs:[00000030h] | 3_2_025121F5 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02512997 mov eax, dword ptr fs:[00000030h] | 3_2_02512997 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02512997 mov ecx, dword ptr fs:[00000030h] | 3_2_02512997 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E3989 mov eax, dword ptr fs:[00000030h] | 3_2_024E3989 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E3989 mov eax, dword ptr fs:[00000030h] | 3_2_024E3989 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E3989 mov eax, dword ptr fs:[00000030h] | 3_2_024E3989 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02533E71 mov ecx, dword ptr fs:[00000030h] | 3_2_02533E71 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02533E71 mov ecx, dword ptr fs:[00000030h] | 3_2_02533E71 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02531E6F mov eax, dword ptr fs:[00000030h] | 3_2_02531E6F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02531E6F mov eax, dword ptr fs:[00000030h] | 3_2_02531E6F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02531E6F mov eax, dword ptr fs:[00000030h] | 3_2_02531E6F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02531E6F mov ecx, dword ptr fs:[00000030h] | 3_2_02531E6F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02531E6F mov eax, dword ptr fs:[00000030h] | 3_2_02531E6F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02531E6F mov ecx, dword ptr fs:[00000030h] | 3_2_02531E6F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0253261C mov eax, dword ptr fs:[00000030h] | 3_2_0253261C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0253261C mov eax, dword ptr fs:[00000030h] | 3_2_0253261C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0253261C mov eax, dword ptr fs:[00000030h] | 3_2_0253261C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0253261C mov eax, dword ptr fs:[00000030h] | 3_2_0253261C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0253261C mov eax, dword ptr fs:[00000030h] | 3_2_0253261C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0253261C mov ecx, dword ptr fs:[00000030h] | 3_2_0253261C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024EBE3D mov ecx, dword ptr fs:[00000030h] | 3_2_024EBE3D |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024EBE3D mov eax, dword ptr fs:[00000030h] | 3_2_024EBE3D |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02532E2C mov eax, dword ptr fs:[00000030h] | 3_2_02532E2C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F4EC8 mov eax, dword ptr fs:[00000030h] | 3_2_024F4EC8 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F4EC8 mov eax, dword ptr fs:[00000030h] | 3_2_024F4EC8 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F4EC8 mov ecx, dword ptr fs:[00000030h] | 3_2_024F4EC8 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02513EF9 mov eax, dword ptr fs:[00000030h] | 3_2_02513EF9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02513EF9 mov eax, dword ptr fs:[00000030h] | 3_2_02513EF9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E1EFB mov eax, dword ptr fs:[00000030h] | 3_2_024E1EFB |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E1EFB mov eax, dword ptr fs:[00000030h] | 3_2_024E1EFB |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E1EFB mov eax, dword ptr fs:[00000030h] | 3_2_024E1EFB |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251C6EC mov eax, dword ptr fs:[00000030h] | 3_2_0251C6EC |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251C6EC mov eax, dword ptr fs:[00000030h] | 3_2_0251C6EC |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E8EB9 mov eax, dword ptr fs:[00000030h] | 3_2_024E8EB9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E8EB9 mov ecx, dword ptr fs:[00000030h] | 3_2_024E8EB9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024EBF04 mov eax, dword ptr fs:[00000030h] | 3_2_024EBF04 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024EBF04 mov ecx, dword ptr fs:[00000030h] | 3_2_024EBF04 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024EBF04 mov eax, dword ptr fs:[00000030h] | 3_2_024EBF04 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024EBF04 mov eax, dword ptr fs:[00000030h] | 3_2_024EBF04 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024EBF04 mov eax, dword ptr fs:[00000030h] | 3_2_024EBF04 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024EBF04 mov eax, dword ptr fs:[00000030h] | 3_2_024EBF04 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024ED700 mov eax, dword ptr fs:[00000030h] | 3_2_024ED700 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251BF08 mov eax, dword ptr fs:[00000030h] | 3_2_0251BF08 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251BF08 mov eax, dword ptr fs:[00000030h] | 3_2_0251BF08 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F8FD9 mov eax, dword ptr fs:[00000030h] | 3_2_024F8FD9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024FA7E9 mov ecx, dword ptr fs:[00000030h] | 3_2_024FA7E9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0253FF99 mov eax, dword ptr fs:[00000030h] | 3_2_0253FF99 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0253FF99 mov eax, dword ptr fs:[00000030h] | 3_2_0253FF99 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0253FF99 mov eax, dword ptr fs:[00000030h] | 3_2_0253FF99 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0253FF99 mov eax, dword ptr fs:[00000030h] | 3_2_0253FF99 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02531F9E mov eax, dword ptr fs:[00000030h] | 3_2_02531F9E |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024ECFA0 mov eax, dword ptr fs:[00000030h] | 3_2_024ECFA0 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024ECFA0 mov eax, dword ptr fs:[00000030h] | 3_2_024ECFA0 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024ECFA0 mov eax, dword ptr fs:[00000030h] | 3_2_024ECFA0 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024ECFA0 mov eax, dword ptr fs:[00000030h] | 3_2_024ECFA0 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024ECFA0 mov eax, dword ptr fs:[00000030h] | 3_2_024ECFA0 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02532FBC mov eax, dword ptr fs:[00000030h] | 3_2_02532FBC |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02532FBC mov ecx, dword ptr fs:[00000030h] | 3_2_02532FBC |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02532FBC mov ecx, dword ptr fs:[00000030h] | 3_2_02532FBC |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E2C09 mov eax, dword ptr fs:[00000030h] | 3_2_024E2C09 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E2C09 mov ecx, dword ptr fs:[00000030h] | 3_2_024E2C09 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E1C09 mov eax, dword ptr fs:[00000030h] | 3_2_024E1C09 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02527C3C mov eax, dword ptr fs:[00000030h] | 3_2_02527C3C |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251D425 mov eax, dword ptr fs:[00000030h] | 3_2_0251D425 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251D425 mov eax, dword ptr fs:[00000030h] | 3_2_0251D425 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F4433 mov eax, dword ptr fs:[00000030h] | 3_2_024F4433 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F4433 mov eax, dword ptr fs:[00000030h] | 3_2_024F4433 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F4433 mov eax, dword ptr fs:[00000030h] | 3_2_024F4433 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F4433 mov eax, dword ptr fs:[00000030h] | 3_2_024F4433 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E24E9 mov eax, dword ptr fs:[00000030h] | 3_2_024E24E9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E24E9 mov ecx, dword ptr fs:[00000030h] | 3_2_024E24E9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E24E9 mov eax, dword ptr fs:[00000030h] | 3_2_024E24E9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E1CF6 mov eax, dword ptr fs:[00000030h] | 3_2_024E1CF6 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E1CF6 mov eax, dword ptr fs:[00000030h] | 3_2_024E1CF6 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F2489 mov eax, dword ptr fs:[00000030h] | 3_2_024F2489 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F2489 mov eax, dword ptr fs:[00000030h] | 3_2_024F2489 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E3C89 mov eax, dword ptr fs:[00000030h] | 3_2_024E3C89 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E3C89 mov ecx, dword ptr fs:[00000030h] | 3_2_024E3C89 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E3C89 mov eax, dword ptr fs:[00000030h] | 3_2_024E3C89 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0253649B mov eax, dword ptr fs:[00000030h] | 3_2_0253649B |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0253649B mov ecx, dword ptr fs:[00000030h] | 3_2_0253649B |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02532484 mov eax, dword ptr fs:[00000030h] | 3_2_02532484 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02532484 mov eax, dword ptr fs:[00000030h] | 3_2_02532484 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251CCBA mov eax, dword ptr fs:[00000030h] | 3_2_0251CCBA |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251CCBA mov eax, dword ptr fs:[00000030h] | 3_2_0251CCBA |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251CCBA mov eax, dword ptr fs:[00000030h] | 3_2_0251CCBA |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02513CA1 mov eax, dword ptr fs:[00000030h] | 3_2_02513CA1 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02513CA1 mov eax, dword ptr fs:[00000030h] | 3_2_02513CA1 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F1CB5 mov eax, dword ptr fs:[00000030h] | 3_2_024F1CB5 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251B4AF mov eax, dword ptr fs:[00000030h] | 3_2_0251B4AF |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251B4AF mov ecx, dword ptr fs:[00000030h] | 3_2_0251B4AF |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F1D59 mov eax, dword ptr fs:[00000030h] | 3_2_024F1D59 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F1D59 mov eax, dword ptr fs:[00000030h] | 3_2_024F1D59 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251DD6F mov eax, dword ptr fs:[00000030h] | 3_2_0251DD6F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0251DD6F mov ecx, dword ptr fs:[00000030h] | 3_2_0251DD6F |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F5571 mov ecx, dword ptr fs:[00000030h] | 3_2_024F5571 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F5571 mov eax, dword ptr fs:[00000030h] | 3_2_024F5571 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E5500 mov eax, dword ptr fs:[00000030h] | 3_2_024E5500 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E5500 mov eax, dword ptr fs:[00000030h] | 3_2_024E5500 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024E5500 mov eax, dword ptr fs:[00000030h] | 3_2_024E5500 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F4D39 mov eax, dword ptr fs:[00000030h] | 3_2_024F4D39 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F4D39 mov eax, dword ptr fs:[00000030h] | 3_2_024F4D39 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F4D39 mov ecx, dword ptr fs:[00000030h] | 3_2_024F4D39 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F8D39 mov eax, dword ptr fs:[00000030h] | 3_2_024F8D39 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F8D39 mov eax, dword ptr fs:[00000030h] | 3_2_024F8D39 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_024F8D39 mov eax, dword ptr fs:[00000030h] | 3_2_024F8D39 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_0252C5AB mov esi, dword ptr fs:[00000030h] | 3_2_0252C5AB |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02523DA9 mov eax, dword ptr fs:[00000030h] | 3_2_02523DA9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02523DA9 mov eax, dword ptr fs:[00000030h] | 3_2_02523DA9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02523DA9 mov eax, dword ptr fs:[00000030h] | 3_2_02523DA9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02523DA9 mov eax, dword ptr fs:[00000030h] | 3_2_02523DA9 |
Source: C:\Users\user\AppData\Roaming\abd1 .exe | Code function: 3_2_02523DA9 mov ecx, dword ptr fs:[00000030h] | 3_2_02523DA9 |